Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

Publishing model:

: Open access
open accessOpen Access

Article

Cyber Intelligence & Moroccan National Security: What Strategy for Managing & Mitigating Cyber Threats against Future Sporting Events

by 

Kezzoute Mhammed

PDF logoPDF

Published: 2025

Abstract

Cyber intelligence currently presents itself as a key solution to strengthen cybersecurity practices and the resilience of vital infrastructures. For this, in our study, we explore the interactions between this new concept and national security, as well as the existing frameworks organizing national cybersecurity in the face of the rise of mutating and transformative cyber threats. Critiquing the existing frameworks, we hope to provide effective recommendations in existing legislation and regulatory frameworks, in funding methods, in modalities of international cooperation and collaboration, and in the development of key technologies and industries in this process, to overcome the current gaps and voids in the critical situation and strengthen measures for better national cybersecurity. Based on previous experiences regarding the application of these practices in conjunction with technologies to strengthen our argumentation process, we have observed that these measures are essential and important for the consolidation and securing of critical digital infrastructures and the preservation of cyber sovereignty, especially those that are aligned with international standards and technological advancements in cyber stability. For this reason, we call in this study for additional re-search on Morocco's National Cyber Strategy for 2030, exploring the possibilities of strengthening national cybersecurity against evolving cyber threats through the integration of cyber intelligence into detection, analysis, and decision-making processes.

Keywords

Moroccan Cyber StrategyMoroccan Cyber PolicyMoroccan Smart citiesCyber GovernanceCyber Security

How to Cite the Article

Mhammed, K. (2025). Cyber Intelligence & Moroccan National Security: What Strategy for Managing and Mitigating Cyber Threats against Future Sporting Events. Journal of Cyber Security and Risk Auditing, 2025(4), 366–383. https://doi.org/10.63180/jcsra.thestap.2025.4.12

References

  1. Chouraik, C., El-Founir, R., & Taybi, K. (2024). Cyber-securing Morocco's smart cities: A case review. International Journal of Science and Research Archive, 13(1), 102–112. https://doi.org/10.30574/ijsra.2024.13.1.1619
  2. Airaj, S. (2024). The increase of cybercrime amidst the COVID-19 pandemic: A spotlight on the Moroccan context. Quantum Journal of Social Sciences and Humanities, 5(2), 204–212. https://doi.org/10.55197/qjssh.v5i2.388
  3. Youssef, E. H. (2024). The crime of "electronic terrorism" and the role of the Moroccan legislator in addressing it. Arid International Journal of Communication & Information Sciences, 5(9), 6–31. https://doi.org/10.36772/arid.aijmscs.2024.591
  4. Security Conclave. (2024). Cybersecurity discussions on critical infrastructure and countering cyber criminality. https://securityconclave.com/
  5. Kezzoute, M. (2024). The geopolitics of cyberspace: Issues & challenges for Morocco by 2050 (Doctoral thesis). Mohammed Premiere University, Faculty of Law, Economy and Social Sciences.
  6. Perl, R., & Malisevic, N. (2013). A comprehensive approach to cyber security – trends, challenges and the way forward. In A Comprehensive Approach to Cyber Security (pp. 47–49). https://connections-qj.org/system/files/ctwg_04_cybersecurity.pdf
  7. Elder, R. J. (2020). Cyberwarfare as realized conflict. In T. Holt & A. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan. https://doi.org/10.1007/978-3-319-78440-3_64
  8. Kenza, R., Zakia, E., Rajaa, R., et al. (2024). Cybersecurity and the automotive supply chain in Morocco: An exploratory study. European Journal of Economic and Financial Research, 8(4), 224–236. http://dx.doi.org/10.46827/ejefr.v8i4.1790
  9. Lewis, J. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic and International Studies, 13 p.
  10. Kumar, R. (2015). The problem of attribution in cyber security. International Journal of Computer Applications, 131(7), 34–36. http://dx.doi.org/10.5120/ijca2015907386
  11. Yacob, M. N., Idrus, S., & Idris, L. (2023). Managing cybersecurity risks in emerging technologies. International Journal of Business and Technopreneurship, 13(3). http://dx.doi.org/10.58915/ijbt.v13i3.297
  12. Trim, P. R. J., & Lee, Y. I. (2025). Cyber security management and strategic intelligence. Taylor & Francis Group.
  13. Kolade, T. M., Obioha-Val, O., & Balogun, A. Y. (2025). AI-driven open source intelligence in cyber defense: A double-edged sword for national security. Asian Journal of Research in Computer Science, 18(1), 133–153. http://dx.doi.org/10.9734/ajrcos/2025/v18i1554
  14. Kezzoute, M. (2025). Cyber governance in Morocco: Between the consolidation of Internet status and the enhancement of global positioning. Journal of Cyberspace Studies, 9(1), 223–242. http://dx.doi.org/10.22059/jcss.2025.385012.1114
  15. Patil, D. (2025). Artificial intelligence in cybersecurity: Enhancing threat detection and prevention mechanisms through machine learning and data analytics. ResearchGate. https://www.researchgate.net/publication/385881488_Artificial_intelligence_in_cybersecurity_Enhancing_threat_detection_and_prevention_mechanisms_through_machine_learning_and_data_analytics
  16. Zang, F. (2020, September 23). China’s military employment of artificial intelligence and its security implications. The International Affairs Review. https://www.iar-gwu.org/print-archive/blog-post-title-four-xgtap
  17. Homeland Security. U.S. Department of Homeland Security using AI to secure the homeland. https://www.dhs.gov/ai/using-ai-to-secure-the-homeland
  18. Ruhl, C., Hollis, D., & Maurer, T. (2020). Cyberspace and geopolitics: Assessing global cybersecurity norm processes at a crossroads. Carnegie Endowment for International Peace. https://carnegieendowment.org/research/2020/02/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-a-crossroads?lang=en
  19. Sowmya, N. (2024). A study on the role of artificial intelligence in detecting and preventing cyber crimes in India. International Journal of Advanced Research in Science, Communication, and Technology. http://dx.doi.org/10.48175/IJARSCT-22635
  20. CENJOWS. (2024, July 9). Strengthening national cybersecurity of India with the use of artificial intelligence. https://cenjows.in/strengthening-national-cybersecurity-of-india-with-the-use-of-artificial-intelligence/
  21. Qudus, L. (2025). Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges. International Journal of Science and Research Archive, 14(1), 1146–1163. https://doi.org/10.30574/ijsra.2025.14.1.0225
  22. Hurzhii, S. (2024). Features of ensuring cyber resilience of national information resources, communication and technological systems that ensure the functioning of government authorities under the conditions of martial law. http://dx.doi.org/10.37750/2616-6798.2024.4(51).317993
  23. Eltaeib, T., Abuzneid, A., & Elleithy, K. (2024). Proposed framework for a comprehensive cybersecurity risk management strategy. http://dx.doi.org/10.1109/LISAT63094.2024.10808119
  24. Sandhia, G. K., Ranjani, M., & Nithiyanandam, N. (2024). Cybersecurity: The part played by artificial intelligence. In Analyzing privacy and security difficulties in social media (pp. 213–246). http://dx.doi.org/10.4018/979-8-3693-9491-5.ch010
  25. General Direction of the Security of Digital Systems. Moroccan cyber strategy 2030. https://www.dgssi.gov.ma/fr/publications/strategie-nationale-de-cybersecurite
  26. Chang, L., & Coppel, N. (2020). Building cyber security awareness in a developing country: Lessons from Myanmar. Computers & Security, 97, 101959. http://dx.doi.org/10.1016/j.cose.2020.101959
  27. Uzoka, A., Cadet, E., & Ojukwu, P. U. (2024). Applying artificial intelligence in cybersecurity to enhance threat detection, response, and risk management. Computer Science & IT Research Journal, 5(10), 2511–2538. https://doi.org/10.51594/csitrj.v5i10.1677
  28. Admas, W., Munaya, Y., & Diro, A. (2024). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031. https://doi.org/10.1016/j.csa.2023.100031
  29. Nyame, L., Marfo-Ahenkorah, E., & Abrahams, A. (2024). Rise in cyber threats in the United States and the need for advanced cyber risk mitigation tools and adequate skills to combat cyber threats. Preprints. https://www.preprints.org/manuscript/202409.1813/v1
  30. Goswani, S., Mondal, S., & Ashish, J. (2024). Cyber security and digital economy: Opportunities, growth and challenges. Journal of Technology Innovations and Energy, 3(2), 1–21. http://dx.doi.org/10.56556/jtie.v3i2.907
  31. Balisane, H., Egho-Promise, E., & Lyada, E. (2024). The effectiveness of a comprehensive threat mitigation framework in networking: A multi-layered approach to cyber security. International Research Journal of Computer Science, 11(6), 529–538. http://dx.doi.org/10.26562/irjcs.2024.v1106.03
  32. Abbadi, M. (2025). Cybersecurity policy and legal challenges in Morocco: A comparative analysis. International Journal of Cyber Law, 12(1), 45–63. https://doi.org/10.54878/acgprq10
  33. Kuznetsov, O., Sernani, P., Romeo, L., Frontoni, E., & Mancini, A. (2025). On the integration of artificial intelligence and blockchain technology: A perspective about security. IEEE Access. http://dx.doi.org/10.1109/ACCESS.2023.3349019
  34. Ahn, K. T. (2024). The human factor in cybersecurity: An analysis of emerging trends and challenges. In Proceedings of the 4th International Conference on Marketing in the Connected Age (MICA-2024). https://www.researchgate.net/publication/384471305_The_Human_Factor_in_Cybersecurity_An_Analysis_of_Emerging_Trends_and_Challenges
  35. Abrahams, T. O., et al. (2024). Cybersecurity awareness and education programs: A review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100–119. http://dx.doi.org/10.51594/csitrj.v5i1.708