OFFSTONE JAN EDITION 2023

29 To protect against these cyber threats, it is important for users to practice safe online behaviour, such as using strong passwords and two-factor authentication and adhering to best practices for using social media and other web-based services. These best practices align with the principles of authoritative and integrity, where users are responsible for protecting their own data and systems and should not abuse their power for their own gain, which can disrupt communication. In addition, organizations and companies also have a responsibility to protect user data and systems, aligning with the principles of confidentiality and availability. This can include implementing security protocols and training employees on safe online behaviour, in order to maintain the flow of communication. Closing In conclusion, Islamic teachings provide a valuable framework for understanding and addressing the challenges of cybersecurity in communication. By adhering to the principles of integrity, availability, authoritative, and confidentiality, individuals and organizations can better protect themselves and their users from cyber threats, while also upholding their ethical responsibilities in communication. BIBLIOGRAPHY Alhazmi, A.A. (2019). An Islamic Perspective on Cybersecurity Compliance. International Journal of Digital Information and Wireless Communications , 9(2), 1-7. El-Haddad, F., & Alhazmi, A.A. (2018). An Islamic Perspective on Cybersecurity. International Journal of Digital Information and Wireless Communications , 8(3), 1-7. Gantz, J., & Smith, J. (2019). Government cyber security policy: A comprehensive review. Computer, 52(2), 58-68. Gates, S., & Sasse, A. (2018). Cybersecurity: A pervasive challenge in the internet age. Communications of the ACM, 61(7), 36-40.

RkJQdWJsaXNoZXIy NzMyMDE=