Strategi Keamanan Siber Nasional Qatar (Qatar’s National Cyber Security Strategy)
Keywords:
Cyber Security Strategy, Cyber Threats, SovereigntyAbstract
Along with the development of technology, cyber threats that occur in modern countries has been switched from traditional to non-traditional. That development of technology bears the advancement of science and bring a variety of the interstate. Currently, the country prioritizes in social, economic, law, security, defense and other aspect to Information and Communication Technology. Increasing the cyber threat of Qatar, the governance draws up National Cyber Security Strategy (NCSS) with the aim of building and
maintaining a safe cyberspace for protecting national interest and preserves fundamental rights and Qatar’s community value. Collectively this aim gives protection and preparing cyber threats with proactive approach. This paper aims to deeply understand Qatar National Cyber Security Strategic by conducting a qualitative analysis of the context of document through the concept of
sovereignty approach, nation and contained aspects. The description of aspects that can be seen from the data security relationship, technology development, policies, capabilities, strategic approaches, cyber threats and challenges. Qatar pays special attention to cybersecurity and protection of its vital national information infrastructure as dependence on Information and Communication Technology (ICT) and the internet grows in the country.
Downloads
Published
Issue
Section
License
Please read and understand the copyright terms for submissions to this journal.
Copyright Notice
The Jurnal Keamanan Nasional is under the Creative Commons Attribution 4.0 International (CC-BY 4.0) License, according to which:
1) Authors retain copyright and grant the journal the right to first publication, with the work simultaneously licensed under the Creative Commons Attribution (CC-BY 4.0) that allows the sharing of articles published with the acknowledgement of authorship and the initial publication in this journal.
2) The authors are authorized to make additional contracts separately for distribution of the version of the work published in this journal (for example, publication in an institutional repository or as a chapter of the book), as long as there is recognition of authorship and initial publication in this journal.
3) Authors are authorized and encouraged to publish and distribute their work online (for example, in institutional repositories or on their personal pages) at any time before or during the editorial process, as it increases the impact and reference of the published work.