International Perspective on Securing Cyberspace Against Terrorist Acts

International Perspective on Securing Cyberspace Against Terrorist Acts

Maya Hasan Khater
Copyright: © 2023 |Pages: 11
DOI: 10.4018/IJSKD.318706
Article PDF Download
Open access articles are freely available for download

Abstract

This research reviews the legal framework for protecting the security of cyberspace from terrorist acts, using the following approaches: the legal approach, the descriptive approach, and the analytical approach. This is achieved by gathering knowledge and data on the protection of cybersecurity and analyzing the different tools and methods that terrorist organizations use to implement their cybercrimes. The goal is to find ways to overcome the various challenges that terrorists pose to regional (Arab-wide) and international cybersecurity systems to find mechanisms and solutions to deal with this phenomenon effectively and to reduce its increasing risks to people and the security, stability, and economies of nations. The most significant conclusion that was reached is the need to continue international efforts to strengthen the fight against cyberterrorism and to establish a binding legal treaty in this regard so as to prevent further harm to the safety of the international community.
Article Preview
Top

Literature Review

Cyberspace is a pervasive network that connects every field of contemporary culture. Cyberattacks have become prevalent. Securing cyberspace is, therefore, a major concern of governments around the world. Researchers have been developing standards and innovative methods to strengthen cybersecurity policy, enhancing the security of critical infrastructures and implementing national defensive countermeasures (Vaseashta et al., 2014). Effective frameworks are required to facilitate the use of data analytics to anticipate attacks, identify optimal countermeasures to respond to attacks, and optimize the allocation of resources after an attack (Shahin et al., 2020).

Cyberattacks are classified based on a range of actions. Some attacks involve data and information theft. Others shut down entire systems. Attacks may be motivated by political unrest or social or economic problems. Cyberattacks can even involve espionage that promotes political and financial agendas (Karlidag & Bulut, 2020).

Many authors have identified cyberterrorism and cyberattacks as armed attacks that pose a threat to international security. These authors have attempted to understand the applicability of the rules and provisions of the UN charter to cyberattacks, as well as how these attacks violate domestic and international law. They suggest appropriate responses that countries can use to reduce or eliminate the risks associated with cyberterrorism and cyberattacks. One important strategy is to finalize a multilateral treaty to maintain international peace and security by preventing the use of cyberattacks and removing loopholes that can be exploited by terrorists (Mahnoor & Noor, 2022).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing