Abstract
Over the last few years, MENA region became an attractive target for cyber-attacks perpetrators. Hackers focus on governmental high valued sectors (i.e. oil and gas) alongside with other critical industries. MENA nations are increasingly investing in Information and Communication Technologies (ICTs) sector, social infrastructure, economic sector, schools and hospitals in the area are now completely based on the Internet. Currently, the position of ICTs became an essential phase of the domestic future and global security structure in the MENA Region, emphasizing the real need for a tremendous development in cybersecurity at a regional level. This environment raises questions about the developments in cybersecurity and offensive cyber tactics; this paper examines and investigates (1) the essential cybersecurity threats in MENA region, (2) the major challenges that faces both governments and organizations (3) the main countermeasures that governments follow to achieve the protection and business continuity in the region. It stresses the need for the importance of cybercrime legislation and higher defenses techniques towards cyberterrorism for MENA nations. It argues for the promotion of a cybersecurity awareness for the individuals as an effective mechanism for facing the current risks of cybersecurity in MENA region.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barnett, D., Sell, T., Lord, R., Jenkins, C., Terbush, J., Burke, T.: Cyber security threats to public health. World Med. Health Policy 5(1), 37–46 (2013)
Symantec.com: Internet Security Threat Report 2019 | Symantec (2019). https://www.symantec.com/security-center/threat-report. Accessed 11 June 2019
IstiZada: MENA Region Countries List 2018 | IstiZada (2019). http://istizada.com/mena-region/. Accessed 11 July 2019
Meri, J.: Software and technology review: multilingual computing in middle east studies. Middle East Stud. Assoc. Bull. 34(1), 14–19 (2000)
Zeng, Q., Pu, S., Zhang, X.: Statistical tests for integrity attacks on cyber-physical systems. Asian J. Control (2018). https://doi.org/10.1002/asjc.1945
Efg, A.: The impact of cybercrimes on global trade and commerce. Int. J. Inform. Secur. Cybercr. 5(2), 31–50 (2016)
Parodi, F.: The concept of cybercrime and online threats analysis. Int. J. Inform. Secur. Cybercr. 2(1), 59–66 (2013)
Alshathry, S.: Cyber attack on saudi aramco. Int. J. Manage. Inform. Technol. 11(5), 3037–3039 (2016)
Strikwerda, L.: Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension. Inform. Commun. Technol. Law 23(1), 31–60 (2014)
Internetworldstats.com: Middle East Internet Statistics and Telecommunications Reports(2019). https://internetworldstats.com/stats5.htm. Accessed 09 June 2019
Statista: Middle East: internet penetration 2019 | Statista (2019). https://www.statista.com/statistics/265171/comparison-of-global-and-middle-eastern-internet-penetration-rate/. Accessed 03 June 2019
2018.semantics.cc: SEMANTiCS 2018 (2019). https://2018.semantics.cc/. Accessed 08 June 2019
World Internet Users Statistics and World Population Stats. In: Internetworldstats.com. https://internetworldstats.com/stats.htm. Accessed 07 Jun. 2019
Kabakus, A.: What static analysis can utmost offer for android malware detection. Inform. Technol. Control 48, 235–240 (2019). https://doi.org/10.5755/j01.itc.48.2.21457
Thomsen, D.: IP spoofing and session hijacking. Netw. Secur. 1995, 6–11 (1995). https://doi.org/10.1016/s1353-4858(00)80045-8
Singh, A., Singh, B., Joseph, H.: Vulnerability Analysis and Defense for the Internet. Springer, New York (2008)
Bahtiyar, Ş.: Anatomy of targeted attacks with smart malware. Secur. Commun. Netw. 9, 6215–6226 (2016). https://doi.org/10.1002/sec.1767
Nagothu, D., Chen, Y., Blasch, E., et al.: Detecting malicious false frame injection attacks on surveillance systems at the edge using electrical network frequency signals. Sensors 19, 2424 (2019). https://doi.org/10.3390/s19112424
Kaveyeva, A., Gurin, K.: “VKontakte” fake accounts and their influence on the users’ social network. Zhurnal Sotsiologii i Sotsialnoy Antropologii (J. Sociol. Soc. Anthropol.) 21, 214–231 (2018). https://doi.org/10.31119/jssa.2018.21.2.8
Mondragón, O., Mera Arcos, A., Urcuqui, C., Navarro Cadavid, A.: Security control for website defacement. Sistemas Telemática 15, 45–55 (2017). https://doi.org/10.18046/syt.v15i41.2442
Patel, K.: Recognizing spam domains by extracting features from spam emails. Int. J. Comput. Appl. 90, 25–30 (2014). https://doi.org/10.5120/15595-4341
Guo, Y., Zhang, Z.: LPSE: lightweight password-strength estimation for password meters. Comput. Secur. 73, 507–518 (2018). https://doi.org/10.1016/j.cose.2017.07.012
Liu, Y., Peng, W., Su, J.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7, 2201–2210 (2013). https://doi.org/10.1002/sec.738
Jee, S., Kim, S., Lee, J.: A study to efficiently overcome GPS jamming and GPS spoofing by using data link system. J. Korea Inst. Milit. Sci. Technol. 18, 37–45 (2015). https://doi.org/10.9766/kimst.2015.18.1.037
Zhao, J., Shetty, S., Pan, J., et al.: Transfer learning for detecting unknown network attacks. EURASIP J. Inform. Secur. (2019). https://doi.org/10.1186/s13635-019-0084-4
Rajamohan, D.S., Subha, K.K.: Information technology in financial inclusion. Paripex - Indian J. Res. 3, 1–2 (2012). https://doi.org/10.15373/22501991/july2014/37
Torten, R., Reaiche, C., Boyle, S.: The impact of security awarness on information technology professionals’ behavior. Comput. Secur. 79, 68–79 (2018). https://doi.org/10.1016/j.cose.2018.08.007
Middle East: internet penetration | Statista. In: Statista. https://www.statista.com/statistics/265171/comparison-of-global-and-middle-eastern-internet-penetration-rate/. Accessed 08 July 2019
Kaspersky Security Analyst Summit (SAS) – Singapore, 8–11 April 2019. In: Kaspersky Security Summit (SAS) – Singapore, 8–11 April 2019. https://sas.kaspersky.com/. Accessed 11 July 2019
Bennett, C., Clement, A., Milberry, K.: Introduction to cyber-surveillance. Surveill. Soc. 9, 339–347 (2012). https://doi.org/10.24908/ss.v9i4.4339
Tasevski, P.: IT and cyber security awareness – raising campaigns. Inform. Secur.: Int. J. 34, 7–22 (2016). https://doi.org/10.11610/isij.3401
Restricting cybersecurity, violating human rights: cybercrime laws in MENA region. In: OpenGlobalRights (2019). https://www.openglobalrights.org/restricting-cybersecurity-violating-human-rights/. Accessed 22 Jan 2019
Hakmeh, J.: Cybercrime Legislation in the GCC Countries, International Security Department, Chatham House (The Royal Institute of International Affairs), July 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mawgoud, A.A., Taha, M.H.N., Khalifa, N.E.M., Loey, M. (2020). Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures. In: Hassanien, A., Shaalan, K., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019. AISI 2019. Advances in Intelligent Systems and Computing, vol 1058. Springer, Cham. https://doi.org/10.1007/978-3-030-31129-2_83
Download citation
DOI: https://doi.org/10.1007/978-3-030-31129-2_83
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31128-5
Online ISBN: 978-3-030-31129-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)