
The role of information technology in national security
Author(s) -
Kamran Yeganegi,
Zahra Arbabi,
Asma Ibrahim Hussein
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1530/1/012112
Subject(s) - computer security , context (archaeology) , national security , business , homeland security , function (biology) , information technology , information sharing , information and communications technology , order (exchange) , dissemination , interdependence , internet privacy , computer science , political science , telecommunications , paleontology , finance , evolutionary biology , world wide web , terrorism , law , biology , operating system
The use of information and communication technologies has been increasing day-today throughout the world since the 1980s, as these technologies seem to reduce the complexity of issues for governments and at the same time reduce the context. Provided for the complex interdependencies between governments. This dual function of information and communication technologies has caused security problems for countries, especially underdeveloped countries, in terms of lower access or, in other words, the digital divide of advanced countries. The growing challenge in the security of nations is a major concern for everyone, in order to tackle this challenge a great amount of effort must be dedicated. Multiple related questions are asked in this article: Are we capable of IT and Ensure Homeland Security Strategy in Different Countries Do Intelligence Agencies Have the Right IT Infrastructure for the Purposes of Collecting, Sharing, and Disseminating Information? Is there Enough Monitoring Equipment? Information technology plays a significant role and will continue to strengthen the national security against future upcoming threats and cyber-attacks. Particularly, information technology can help countries to identify potential threats, share information easily, and protect mechanisms in them. Provide and develop capabilities.