What is it about?
this paper examines and investigates 1) the essential cybersecurity threats in MENA region, 2) the major challenges that faces both governments and organizations 3) the main countermeasures that governments follow to achieve the protection and business continuity in the region. It stresses the need for the importance of cybercrime legislation and higher defenses techniques towards cyber-terrorism for MENA nations. It argues for the promotion of a cybersecurity awareness for the individuals as an effective mechanism for facing the current risks of cybersecurity in MENA region.
Featured Image
Photo by Markus Spiske on Unsplash
Why is it important?
This paper presents a descriptive analysis of cyber-attack techniques for the cyber threats facing MENA nations with their negative impact on the countries. Finally, raising awareness and setting a cyber-security law will protect many different sectors in MENA nations as well as preventing the cyber operations in the region; as a necessary move for to expand the cyber security culture to raise the citizens awareness about safe methods of using the internet and protecting their own data from being hacked.
Perspectives
Over the last few years, MENA region became an attractive target for cyber-attacks perpetrators. Hackers focus on governmental high valued sectors (i.e. oil and gas) alongside with other critical industries. MENA nations are increasingly investing in Information and Communication Technologies (ICTs) sector, social infrastructure, economic sector, schools and hospitals in the area are now completely based on the Internet. Currently, the position of ICTs became an essential phase of the domestic future and global security structure in the MENA Region, emphasizing the real need for a tremendous development in cybersecurity at a regional level. This environment raises questions about the developments in cyber-security and offensive cyber tactics
Mr. Ahmed A. Mawgoud
Read the Original
This page is a summary of: Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures, October 2019, Springer Science + Business Media,
DOI: 10.1007/978-3-030-31129-2_83.
You can read the full text:
Contributors
The following have contributed to this page







