Cyber attacks and their impact on changing the concept of sovereignty over state borders from a geopolitical point of view
DOI:
https://doi.org/10.58564/ma.v14iالعدد%20الخاص%20بمؤتمر%20قسم%20الجغرافية.1459Keywords:
Keywords: Cyber attacks / Sovereign borders / Geographic evolution / Information securityAbstract
Geography is characterized as a dynamic science due to the changes that occur on geographical phenomena as a result of time affected by a group of natural and human factors, and this feature was reflected in the political geography and its concepts, especially sovereignty and borders, it was affected by the technological progress that the world is witnessing, and this development contributed to the violation of the sovereignty of countries and the data and information of countries became porous, because the ability of each country is no longer certain in maintaining its communications, leadership, control and computing capabilities against new threats from the Internet facing the world In its entirety, such as terrorist attacks and organized crime gangs, the virtual space occupied by the Internet can threaten the sovereignty and interests of the state because of its global scope and the possibility of transferring information outside the control of states, without penetrating their land, sea or air borders, so cyberspace is one of the types of borders of the state and an important part of its national security and international status in light of what is known as electronic power, and thus cyberspace is one of the types of invisible borders of the state, The research highlighted the most prominent of these transformations in redefining the concept of political borders to include the cyberspace that concerns the information security of the state, the research has reviewed a set of agreements that will regulate the work of these security units specialized in protecting their countries with a review of the patterns of cyber attacks in terms of the severity of the attack, and did not neglect the research in the study of a model of cyber attacks taken from the Gulf Cooperation Council countries as an example in the type of attacks, whether economic, sabotage or security And ways to confront them..
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.