النسخة العربية

Oman National CERT Towards a safe cyber environment

Safer Internet Day 2017

Safer Internet Day 2017

Over the years, Safer Internet Day (SID) has become a landmark event in the online safety calendar. In the Sultanate, Oman National CERT as the official SID National Committee is taking the initiative nationally...

View
ITU Arab Regional Cyber Security Center and Oman Oil Company organize a workshop on protecting O&G

ITU Arab Regional Cyber Security Center and Oman Oil Company organize a workshop on protecting O&G

ITU Arab Regional Cyber Security Center and Oman Oil Company (OOC) in collaboration with Oman National CERT...

View
Arab Regional Cyber Drill (ALERT) – Fifth edition

Arab Regional Cyber Drill (ALERT) – Fifth edition

The ITU Arab Regional Cybersecurity Centre (ARCC) is organizing the fifth Arab Regional Cyber Drill-Applied Learning for Emergency Response Teams (ALERT) for the Arab Region.

View
3rd National Cyber Drill 2016

3rd National Cyber Drill 2016

The exercise aims to Enhance the Collaboration between Governments and critical national infrastructure Sector to better respond to cyber threats ...

View
5th Regional CyberSecurity summit

5th Regional CyberSecurity summit

The sultanate, represented by the Information Technology Authority (ITA) participates in the 5th Regional CyberSecurity Summit which started today morning, Sunday 30th October 2016, in Sharm ElSheikh, Egypt.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Articles Library

Articles Library

Category: Email Security

E-mail security threatsAttachments. E-mail attachments are the most frequently used hacking method, so don’t open attach ...

Category: Wireless Security

Wifi or wireless is one of the dominant communication technologies that we commonly use these days. It was first release ...

Category: Networking Security

The Cloud, one of the current technology trends and buzz words which vendors and solution providers are trying to push t ...

Category: Ethical Hacking

Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good. Do viruses, DDoS at ...

Category: Online Child Protection

Quite infinite are currently  the opportunities offered by the world wide web (internet) to people around the world, par ...

Category: Mobile Security

Due to the fact that mobile devices are conveniently light and small but it also makes them more vulnerable to theft or ...

Category: Mobile Security

There are many different security threats when it comes to mobile security, but we’ll try to categorize them to make it ...

Category: Mobile Security

Encryption is the process of converting your personal and confidential information into unreadable format using special ...

Category: Mobile Security

Our children are exposed to many different online material and it’s a good idea to limit them to certain trusted and ...

Category: Mobile Security

Nowadays the big buzz word is “the Cloud”, so what is the Cloud? The Cloud is the use of computing resources (hardw ...

1