Mobile: +964(0)7504731854
جرائم الامن السيبراني في ضوء التشريعات الوطنية والمواثيق الدولية -دراسة تحليلية-
https://doi.org/10.23918/ilic9.35
Keywords: cybersecurity, national security, cybersecurity crimes, cybersecurity challenges, National legislation, international agreements.
PROCEEDINGS OF 9th INTERNATIONAL LEGAL ISSUES CONFERENCE
Faculty of Law, Tishk International University
Date:27-28. February 2025
Venue: Kurdistan Region- Erbil, Iraq
ISBN: 979-8-9890269-3-7
———————————————————————–———————————————————————–——————————–
Kocher Mohammed Ahmed Ardalan Abdulrahman Muhammad
University of Halabja/ College of Law Garmian University / Faculty of Law and Administration/ Department of Law
Hawraman Jalal Ahmed
University of Halabja/ College of Law and Administration/ Department of Law
———————————————————————–———————————————————————–——————————–
Abstract
In general, security is of great importance to society and the state, and it is a dynamic concept that develops with the development of local, regional and international conditions and tools. The state does not stop at a certain level of security or reach a certain level of stability, but rather continues to achieve the best for fear of threats in the future. Therefore, security is a relative and not absolute state. The word cyber is derived from the English word cyber, which means communication networks, the Internet, information networks and various digital systems. Cyber security is a package of operations and procedures that aim to secure and protect networks, computers, programs and data from attack, damage, theft and unauthorized access, as well as from disruption or obstruction of the services they provide. Regarding the challenges of cyber security, it is found that there are several challenges facing cyber security, including: weak infrastructure, weak development planning, weak electronic security. The concept of security has many dimensions, the most prominent of which are: the military dimension, the economic dimension, the social dimension, and the legal dimension. There is no doubt that cyber security crimes have three pillars, represented by each of: the material pillar, the moral pillar and the supposed pillar. The Budapest Convention is the first and most prominent convention on cybercrimes. It is European in origin but has a global character. It has been signed by (21) countries. In the same context, it is noted that this convention stipulated the designation of a group of terrorist acts through illegal cyber means. Regarding the legislative framework for confronting cybersecurity crimes and their safety in Iraq and the Kurdistan Region, and when following the position of the Iraqi and Kurdish legislators, we notice that the Iraqi and Kurdish criminal legislation system is devoid of any criminal law specific to combating cybersecurity crimes. However, the Iraqi and Kurdish legislators have taken a number of measures indirectly to confront cybersecurity crimes and state security and safety crimes in Iraq. For example: Iraqi Penal Code, Anti-Terrorism Law in Iraq, Iraqi Counter-Terrorism Service Law, Law on Preventing the Misuse of Communications Devices in the Kurdistan Region – Iraq, Anti-Terrorism Law in the Kurdistan Region – Iraq.
المصادر والمراجع
أولاً: الموسوعات
ثانياً: الكتب القانونية
ثالثاً: الأطاريح والرسائل الجامعية
رابعاً: البحوث القانونية
خامساً: القوانين
سادساً: الاتفاقيات والمعاهدات
سابعاً: المصادر الاجنبية