The impact of cyber threats in regional conflicts (selected models)
DOI:
https://doi.org/10.36327/ewjh.v1i32.13117Keywords:
cyber security, regional cyber security, the evolution of the characteristics of cyber attacksAbstract
Since the beginning of the current century, the contemporary world has witnessed a race between the various major and regional powers to exploit cyberspace and take advantage of the great advantages it provides in achieving vital strategic gains that those powers did not expect to achieve through the use of conventional military force. The issue of "cyber attacks" has become one of the most important and complex issues that concern the major technologically advanced countries before other less developed countries of the world, because of the serious effects and repercussions that threaten their national security and higher interests, and that the emergence of cyberspace as a new force in relations International and an influential actor in those relations, relying on technological progress, and as a result of the transfer of a large part of the conflicts to the field of cyberspace, and the entry of the regional community into a new phase in which countries try to enhance their ability to exercise hegemony, control and influence in the regional and international environment in which threats called cyber threats appeared, And cyber security aims to ensure the improvement of security that would defend organizations from being attacked by hackers through the Internet, and this is due to the fact that the world has become more connected by means of Internet networks to carry out public transactions and cyber security maintains them.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Prof. Dr. Bahae Adnan Yahya, Shahad Hamza Mir Ali

This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.







