Cyber Intelligence & Moroccan National Security: What Strategy for Managing & Mitigating Cyber Threats against Future Sporting Events
Kezzoute Mhammed
Published: 2025
Abstract
Cyber intelligence currently presents itself as a key solution to strengthen cybersecurity practices and the resilience of vital infrastructures. For this, in our study, we explore the interactions between this new concept and national security, as well as the existing frameworks organizing national cybersecurity in the face of the rise of mutating and transformative cyber threats. Critiquing the existing frameworks, we hope to provide effective recommendations in existing legislation and regulatory frameworks, in funding methods, in modalities of international cooperation and collaboration, and in the development of key technologies and industries in this process, to overcome the current gaps and voids in the critical situation and strengthen measures for better national cybersecurity. Based on previous experiences regarding the application of these practices in conjunction with technologies to strengthen our argumentation process, we have observed that these measures are essential and important for the consolidation and securing of critical digital infrastructures and the preservation of cyber sovereignty, especially those that are aligned with international standards and technological advancements in cyber stability. For this reason, we call in this study for additional re-search on Morocco's National Cyber Strategy for 2030, exploring the possibilities of strengthening national cybersecurity against evolving cyber threats through the integration of cyber intelligence into detection, analysis, and decision-making processes.
Keywords
How to Cite the Article
Mhammed, K. (2025). Cyber Intelligence & Moroccan National Security: What Strategy for Managing and Mitigating Cyber Threats against Future Sporting Events. Journal of Cyber Security and Risk Auditing, 2025(4), 366–383. https://doi.org/10.63180/jcsra.thestap.2025.4.12
Cyber Intelligence & Moroccan National Security: What Strategy for Managing & Mitigating Cyber Threats against Future Sporting Events is licensed under CC BY 4.0
References
- Chouraik, C., El-Founir, R., & Taybi, K. (2024). Cyber-securing Morocco's smart cities: A case review. International Journal of Science and Research Archive, 13(1), 102–112. https://doi.org/10.30574/ijsra.2024.13.1.1619
- Airaj, S. (2024). The increase of cybercrime amidst the COVID-19 pandemic: A spotlight on the Moroccan context. Quantum Journal of Social Sciences and Humanities, 5(2), 204–212. https://doi.org/10.55197/qjssh.v5i2.388
- Youssef, E. H. (2024). The crime of "electronic terrorism" and the role of the Moroccan legislator in addressing it. Arid International Journal of Communication & Information Sciences, 5(9), 6–31. https://doi.org/10.36772/arid.aijmscs.2024.591
- Security Conclave. (2024). Cybersecurity discussions on critical infrastructure and countering cyber criminality. https://securityconclave.com/
- Kezzoute, M. (2024). The geopolitics of cyberspace: Issues & challenges for Morocco by 2050 (Doctoral thesis). Mohammed Premiere University, Faculty of Law, Economy and Social Sciences.
- Perl, R., & Malisevic, N. (2013). A comprehensive approach to cyber security – trends, challenges and the way forward. In A Comprehensive Approach to Cyber Security (pp. 47–49). https://connections-qj.org/system/files/ctwg_04_cybersecurity.pdf
- Elder, R. J. (2020). Cyberwarfare as realized conflict. In T. Holt & A. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan. https://doi.org/10.1007/978-3-319-78440-3_64
- Kenza, R., Zakia, E., Rajaa, R., et al. (2024). Cybersecurity and the automotive supply chain in Morocco: An exploratory study. European Journal of Economic and Financial Research, 8(4), 224–236. http://dx.doi.org/10.46827/ejefr.v8i4.1790
- Lewis, J. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic and International Studies, 13 p.
- Kumar, R. (2015). The problem of attribution in cyber security. International Journal of Computer Applications, 131(7), 34–36. http://dx.doi.org/10.5120/ijca2015907386
- Yacob, M. N., Idrus, S., & Idris, L. (2023). Managing cybersecurity risks in emerging technologies. International Journal of Business and Technopreneurship, 13(3). http://dx.doi.org/10.58915/ijbt.v13i3.297
- Trim, P. R. J., & Lee, Y. I. (2025). Cyber security management and strategic intelligence. Taylor & Francis Group.
- Kolade, T. M., Obioha-Val, O., & Balogun, A. Y. (2025). AI-driven open source intelligence in cyber defense: A double-edged sword for national security. Asian Journal of Research in Computer Science, 18(1), 133–153. http://dx.doi.org/10.9734/ajrcos/2025/v18i1554
- Kezzoute, M. (2025). Cyber governance in Morocco: Between the consolidation of Internet status and the enhancement of global positioning. Journal of Cyberspace Studies, 9(1), 223–242. http://dx.doi.org/10.22059/jcss.2025.385012.1114
- Patil, D. (2025). Artificial intelligence in cybersecurity: Enhancing threat detection and prevention mechanisms through machine learning and data analytics. ResearchGate. https://www.researchgate.net/publication/385881488_Artificial_intelligence_in_cybersecurity_Enhancing_threat_detection_and_prevention_mechanisms_through_machine_learning_and_data_analytics
- Zang, F. (2020, September 23). China’s military employment of artificial intelligence and its security implications. The International Affairs Review. https://www.iar-gwu.org/print-archive/blog-post-title-four-xgtap
- Homeland Security. U.S. Department of Homeland Security using AI to secure the homeland. https://www.dhs.gov/ai/using-ai-to-secure-the-homeland
- Ruhl, C., Hollis, D., & Maurer, T. (2020). Cyberspace and geopolitics: Assessing global cybersecurity norm processes at a crossroads. Carnegie Endowment for International Peace. https://carnegieendowment.org/research/2020/02/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-a-crossroads?lang=en
- Sowmya, N. (2024). A study on the role of artificial intelligence in detecting and preventing cyber crimes in India. International Journal of Advanced Research in Science, Communication, and Technology. http://dx.doi.org/10.48175/IJARSCT-22635
- CENJOWS. (2024, July 9). Strengthening national cybersecurity of India with the use of artificial intelligence. https://cenjows.in/strengthening-national-cybersecurity-of-india-with-the-use-of-artificial-intelligence/
- Qudus, L. (2025). Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges. International Journal of Science and Research Archive, 14(1), 1146–1163. https://doi.org/10.30574/ijsra.2025.14.1.0225
- Hurzhii, S. (2024). Features of ensuring cyber resilience of national information resources, communication and technological systems that ensure the functioning of government authorities under the conditions of martial law. http://dx.doi.org/10.37750/2616-6798.2024.4(51).317993
- Eltaeib, T., Abuzneid, A., & Elleithy, K. (2024). Proposed framework for a comprehensive cybersecurity risk management strategy. http://dx.doi.org/10.1109/LISAT63094.2024.10808119
- Sandhia, G. K., Ranjani, M., & Nithiyanandam, N. (2024). Cybersecurity: The part played by artificial intelligence. In Analyzing privacy and security difficulties in social media (pp. 213–246). http://dx.doi.org/10.4018/979-8-3693-9491-5.ch010
- General Direction of the Security of Digital Systems. Moroccan cyber strategy 2030. https://www.dgssi.gov.ma/fr/publications/strategie-nationale-de-cybersecurite
- Chang, L., & Coppel, N. (2020). Building cyber security awareness in a developing country: Lessons from Myanmar. Computers & Security, 97, 101959. http://dx.doi.org/10.1016/j.cose.2020.101959
- Uzoka, A., Cadet, E., & Ojukwu, P. U. (2024). Applying artificial intelligence in cybersecurity to enhance threat detection, response, and risk management. Computer Science & IT Research Journal, 5(10), 2511–2538. https://doi.org/10.51594/csitrj.v5i10.1677
- Admas, W., Munaya, Y., & Diro, A. (2024). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
- Nyame, L., Marfo-Ahenkorah, E., & Abrahams, A. (2024). Rise in cyber threats in the United States and the need for advanced cyber risk mitigation tools and adequate skills to combat cyber threats. Preprints. https://www.preprints.org/manuscript/202409.1813/v1
- Goswani, S., Mondal, S., & Ashish, J. (2024). Cyber security and digital economy: Opportunities, growth and challenges. Journal of Technology Innovations and Energy, 3(2), 1–21. http://dx.doi.org/10.56556/jtie.v3i2.907
- Balisane, H., Egho-Promise, E., & Lyada, E. (2024). The effectiveness of a comprehensive threat mitigation framework in networking: A multi-layered approach to cyber security. International Research Journal of Computer Science, 11(6), 529–538. http://dx.doi.org/10.26562/irjcs.2024.v1106.03
- Abbadi, M. (2025). Cybersecurity policy and legal challenges in Morocco: A comparative analysis. International Journal of Cyber Law, 12(1), 45–63. https://doi.org/10.54878/acgprq10
- Kuznetsov, O., Sernani, P., Romeo, L., Frontoni, E., & Mancini, A. (2025). On the integration of artificial intelligence and blockchain technology: A perspective about security. IEEE Access. http://dx.doi.org/10.1109/ACCESS.2023.3349019
- Ahn, K. T. (2024). The human factor in cybersecurity: An analysis of emerging trends and challenges. In Proceedings of the 4th International Conference on Marketing in the Connected Age (MICA-2024). https://www.researchgate.net/publication/384471305_The_Human_Factor_in_Cybersecurity_An_Analysis_of_Emerging_Trends_and_Challenges
- Abrahams, T. O., et al. (2024). Cybersecurity awareness and education programs: A review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100–119. http://dx.doi.org/10.51594/csitrj.v5i1.708