moohsen janparvar; reyhane salehabadi; seirous Ahmadi
Volume 8, Issue 2 , February 2019, , Pages 99-126
Abstract
Today, cyberspace development has led to the emergence of virtual boundaries. In this sense, a realistic understanding of the security threats depends upon software factors that serve ...
Read More
Today, cyberspace development has led to the emergence of virtual boundaries. In this sense, a realistic understanding of the security threats depends upon software factors that serve as a link between security environment of the states and hardware. In the age of communications and globalization, cyberspace and cyberterrorism pose as two major security threats to the states. This paper intends to study the impact of cyberterrorism on the nation’s virtual boundaries. It is an applied work in terms of objectives. This paper is based on a documentary research method, using library resources and note cards. Findings of this study indicate that high cyberspace capacities and potentials make it promising for terrorist groups to realize their plans such as attacking sensitive infrastructures, illegal access to classified information, information gathering, etc. in cyberspace environment. On this basis, given the very high number of internet users in the country on one hand, and manipulations by enemies outside the country on the other hand, the Islamic Republic of Iran needs to embark on management of strategic cyberspace boundaries to control cyberterrorism and abuse of this environment by terrorist groups. To that end, the government should promote the awareness of individuals and officials, strengthen cyberspace boundaries, reinforce local cyberspace infrastructures and most important of all, create the culture required for using cyberspace