Sherif Elhennawy

Sherif Elhennawy
Cairo University | CU · Department of Information System (IS)

About

8
Publications
13,284
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36
Citations
Introduction
Skills and Expertise

Publications

Publications (8)
Conference Paper
Cloud computing services are one of the IT solutions whose popularity has grown across various industries. Big challenges face cloud computing services, like how to secure them and raise awareness of their usage. Furthermore, these concerns and obstacles are linked to cloud computing services, which may result in several critical risk areas. The ad...
Chapter
The covid-19 pandemic causes a lot of changes in our lifestyles. Usage of information technology (IT) increased in all fields (government, business, industry, and academia). Despite its virtues, information technology has contributed to the repercussions. With advancements in the fields of information, communications, and technology, new types of I...
Article
Organizations receive several cyberattacks on their daily operations, thus the need for auditing. However, there is no unified tool to perform cybersecurity audit tasks which are expensive and tedious. In this paper, we build a cybersecurity framework to perform cybersecurity auditing process in organizations. It covers several types of threats and...
Article
Full-text available
Each organization faces threats and risks in daily operations. One of the main risks is how to assess the security level to protect from the increasing risks associated with technology evolution. So, organizations can specify the required approaches and skills. In this paper, we propose a security maturity model that classifies the organizations in...
Chapter
Full-text available
In a practical sense, Information Systems (IS) have contributed to the success of most of the institutions. The importance of information systems stems from being the main factor in facilitating decision-making and any subsequent emerging problems. Therefore, it is important to verify their efficiency and accuracy by complying with quality standard...
Conference Paper
Full-text available
Every organization needs to constitute a strong information system (IS) and security management in order to improve its business processes with the best practices. Information system processes must be reviewed and audited by IS auditors. IS auditors use a set of tools and techniques to perform the auditing process on the organizations. In this pape...
Conference Paper
Full-text available
In a time of growing threats and advancing circumstances, receiving and keeping up a strong cybersecurity profile in the enterprises are crucial. Important data and resources must be protected. Nowadays, cybersecurity became a predominant issue facing most organizations. It is recognized by organizations as an enterprise-wide issue requiring protec...

Network

Cited By