Cyber War and Cyber Peace Cyber War and Cyber Peace
Middle East Institute Policy Series

Cyber War and Cyber Peace

Digital Conflict in the Middle East

    • £18.99
    • £18.99

Publisher Description

The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics.



With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online.



The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided.

GENRE
History
RELEASED
2022
2 June
LANGUAGE
EN
English
LENGTH
224
Pages
PUBLISHER
I.B. Tauris
SIZE
1.2
MB

More Books Like This

Cyber Attacks, Attribution, and Deterrence: Case Studies – Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security Cyber Attacks, Attribution, and Deterrence: Case Studies – Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security
2017
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
2016
Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data
2017
Cyber Conflict Cyber Conflict
2013
Cyberwar and Information Warfare Cyberwar and Information Warfare
2012
Conflicts, Crimes and Regulations in Cyberspace Conflicts, Crimes and Regulations in Cyberspace
2021

Other Books in This Series

The Economic Statecraft of the Gulf Arab States The Economic Statecraft of the Gulf Arab States
2022
American Diplomacy Toward Lebanon American Diplomacy Toward Lebanon
2024
Energy Transitions in the Middle East Energy Transitions in the Middle East
2024
Escaping the Conflict Trap Escaping the Conflict Trap
2022