• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Research Units
  • Gulf Studies Center
  • The Annual International Conference of the Gulf Studies Center
  • The 6th Annual International Conference of the Gulf Studies Centre
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Research Units
  • Gulf Studies Center
  • The Annual International Conference of the Gulf Studies Center
  • The 6th Annual International Conference of the Gulf Studies Centre
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Emergence of Cyber Conflict and Cyber Security Resilient in Gulf region

    Thumbnail
    Date
    2021
    Author
    Bukhari, Asiya
    Metadata
    Show full item record
    Abstract
    As conventional warfare grows increasingly obsolete, the future of combat will undoubtedly shift towards the domain of cyberspace. Cyber-attack is a new contrivance of national supremacy. It offers a means of intimidation, power, and warfare. The Gulf has become a flashpoint for cyber conflict. Cyberspace has become an arena for covert struggle, with the United States, Israel and other nations on one side, and Iran and Russia on the other. Iran has far outpaced the GCC states in developing its cyber capabilities, both for monitoring internal dissent and deploying hackers to disrupt or attack foreign targets. In the absence of international cyber treaties and agreements, states are actively booming out persistent surveillance against friends and foes and launching devastating cyber-attacks. Terrorists are using cyberspace for recruitment, funding and propaganda. Sabotaging of nuclear facilities through cyber-attacks is a vigorous terrorism approach between nuclear states (Recent example of Israel and Iran Cyber-attacks on Iran Nuclear facilities) and the past example of (the landmark Shamoon cyber-attack in Saudi Arabia and Qatar in 2012). With the growing volume and complexity of cyber-attacks, the volume of these attacks reaches to thousands daily. Cyber security researchers have been working for many years to prevent computers, databases, programs, systems and networks from unauthorized access, attack, change or destruction. This research emphasis Lack of Cooperation between states regarding Cyber space attacks are threaten dilemma which is need to understand for Cyber security Environment. The paper expound on the nature of Middle East Cyber Conflict and Cyber warfare with particular focus on cyber threats, Cyber security and how to strengthen the Cyber Security culture and Nuclear facilities of the region. How the Country enable to enhance the security and promote the importance of security in emerging cyber- technology. The paper dissects the implication and challenges in Cyber security. This profound research will highlight the analysis of the governments and large organizations in almost every vital sector of the region sustained damage from cyber-attacks.
    DOI/handle
    http://hdl.handle.net/10576/48900
    Collections
    • Gulf Studies Center Research [‎112‎ items ]
    • The 6th Annual International Conference of the Gulf Studies Centre [‎22‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video