Border Management of Cyberspace, First Step of Cyber Defense

Janparvar, Mohsen, Ghasri, Mohammad, Hosseinpour Motlagh, Mahdi

Abstract


Ability to alter according to progress in political, social, technological in society and world is the secret of survival of government. This rule coordinates with "gradual" rule or principle (evolution) of live phenomenon. In the meantime, forming development and progress of information technology and communication transformed human life in different communities and has been made environment as "cyberspace". With forming this space, capacity and high positive and negative potential has been available for users. Here, negative potentials that make challenge, damage and insecurity in society is important. This negative potential is such vandalism and damage through this space that can include worldwide instantly and abuse of computer technologies and internet can endanger national security, public peace and existence of society and impose a lot of negative effects on individual and social life and even existence of country. So, governments react in different way to reaction and defense cyber to challenges and insecurities of cyber space in security and inside space. In this way border management of cyber space is the first step in cyber defense and prominent and important role in controlling and preventing the challenges that come from cyberspace to real space of country. So, this article tries to investigate the position of cyberspace border on cyber defense for the first time according political geography approach and theatrical and analytical studies.

Keywords: cyberspace, border, cyber defense


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: RHSS@iiste.org

ISSN (Paper)2224-5766 ISSN (Online)2225-0484

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org