You are on page 1of 9

‫‪New America‬‬

‫‪:vul‬‬
‫ﻣ ﺎ ﺫ ﺍﻳ ﻜ ﻮﻧ ﺎ ﻝ ﺗ ﻘﺮ ﻳﺮ ﺟ ﺰ ﺀ ﻟ ﻘﺐ‬ ‫‪nerabilities‬‬
‫ﺍ ﻟﺴ ﻮ ﻕ؟‬
‫ﺗﻘﺮﻳﺮﺍﻟﻌﻨﻮﺍﻥ ﺍﻷﺧﻄﺎﺀﻓﻴﺎﻟﻨﻈﺎﻡ‬ ‫‪:‬‬
‫‪:‬‬
‫ﺍ ﺍ ﻟ ﺘ ﻤ ﻬ ﻴ ﺪ ﻳ ﻌ ﻠ ﯩ ﺎﻻ ﻟ ﺒ ﺮ ﻣ ﺠ ﻴ ﺎ ﺗ ﺎ ﻟ ﻀ ﻌ ﻔ ﺎ ﻟ ﻨ ﻈ ﺎ ﻡ ﺍ ﻟ ﺒ ﻴ ﺌ ﻴ ﻮ ﻓ ﺈ ﻧ ﻬ ﺴ ﺴ ﻴ ﺎ ﺳ ﺔ ﺁ ﺛ ﺎ ﺭ ﺗ ﻘ ﺮ ﻳ ﺮ ﺍ ﻟ ﻌ ﻨ ﻮ ﺍ ﻥ ﺍ ﻟ ﻔ ﺮ ﻋ ﻲ‬
‫( )‪:‬‬
‫‪schulman‬‬
‫‪،‬ﺗﻘﺮﻳﺮﻣﺆﻟﻒ ﺱ ﺍﻧﺪﯨﻮﻳﻠﺴﻮﻥ‬ ‫)‪bankston (2016‬‬ ‫ﻭﺗﺮﻳﻬﻴﺮﺟﺪﻳﺪﺃﻣﺮﻳﻜﺎ ‪،‬ﺭﻭﺱ‬ ‫ﻛﻴﻔﻴﻦ‬
‫‪http://www.jstor.com/stable/resrep10484.11‬ﻣﺴﺘﻘﺮﺓﺍﻟﻌﻨﻮﺍﻥ‪:‬‬
‫ﻳﻜﻮﻧﺎﻻ ﻣﻘﺎﺑﻞ ﺍﻟﺮﺑﺤﺎﻟﺨﺪﻣﺔﺃﻧﻴﺴﺎﻋﺪﺍﻟﻌﻠﻤﺎﺀ‪،‬ﺍﻟﺒﺎﺣﺜﻮﻥ‪،‬ﻭﺍﻟﻄﻼﺑﺎﺳﺘﻜﺸﻒ‪،‬ﺍﻻﺳﺘﺨﺪﺍﻡ‪،‬ﻭﺑﻨﺎﺀﺑﻨﺎﺀ ﻋﻠﯩﺎﺟﻤﻴﻊ ﺃﻧﺤﺎﺀﻧﻄﺎﻗﻤﻨﺎﻟﻤﺤﺘﻮﯨﻔﻴﺎﻣﻮﺛﻮﻕ ‪jstor‬‬
‫‪،‬ﻟ ﻠ ﺤ ﺼ ﻮ ﻝ ﻋ ﻠ ﯩ ﺎ ﻟ ﻤ ﺰ ﻳ ﺪ ﻣ ﻌ ﻠ ﻮ ﻣ ﺎ ﺗ ﺤ ﻮ ﻝ ‪.jstor‬ﺯ ﻳ ﺎ ﺩ ﺓ ﺍﻹﻧ ﺘ ﺎ ﺟ ﻴ ﺔ ﻭ ﺗ ﺴ ﻬ ﻴ ﻠ ﺠ ﺪﻳ ﺪ ﺃ ﺷ ﻜ ﺎ ﻟ ﻤ ﻨ ﻤ ﻨ ﺤ ﺔ ﺩ ﺭ ﺍ ﺳ ﻴ ﺔ ‪o‬ﻧ ﺤ ﻨ ﺎ ﺳ ﺘ ﻌ ﻤ ﺎ ﻟ ﻤ ﻌ ﻠ ﻮ ﻣ ﺎ ﺗ ﺎ ﻟ ﺘ ﻜ ﻨ ﻮ ﻟ ﻮ ﺟ ﻴ ﺎ ﻭ ﺃ ﺩ ﻭ ﺍ ﺗ ﺖ ‪.‬ﺑ ﻬ ﺎ ﻟ ﺮ ﻗ ﻤ ﻴ ﺔ ﺃ ﺭ ﺷ ﻴ ﻒ‬
‫ﻣﻦ ﻓﻀﻠﻜﻴﺨﺪﻋﺒﺮﺍﻋﺔ ‪support@jstor.org.‬‬
‫‪/‬ﺍ ﻟ ﻤ ﺆ ﺳ ﺴ ﺔ ‪.jstor.‬ﺣ ﻮ ﻝ ‪https: //‬ﺍﻟﺨﺎﺹ ﺑﻜﺎﺳﺘﻌﻤﺎﻟﻤﻨﺎﻝ ‪jstor‬ﺃﺭﺷﻴﻔﻴﺸﻴﺮﺍﻟﺨﺎﺹ ﺑﻜﻘﺒﻮﻟﻤﻨﺎﻟﺸﺮﻭﻁ&ﺍﻟﻈﺮﻭﻓﻤﻨﺎﻻﺳﺘﺨﺪﺍﻡ‪،‬ﻣﺘﻮﻓﺮﺓﻓﻲ‬
‫ﺛ ﺎ ﻟ ﺜ ﺎ ﺍﻵ ﻧ ﺴ ﺔ‬

‫ﺇﻟ ﯩﺎ ﻟﻤ ﻠ ﻒ‬ ‫ﺣﻔﺎﻅ ﻋﻠﯩﻌﻠﯩﺪﺗﻤﺪﻳﺪﺍﻟﻮﺻﻮﻹﻟﯩﻬﺬﻫﺎﻟﻤﺤﺘﻮﻯ ‪،.‬ﺟﺪﻳﺪﺃﻣﺮﻳﻜﺎﻳﻜﻮﻧﺘﺘﻌﺎﻭﻧﻤﻊ ‪jstor‬‬

‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪197.53.153.65،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬
‫ﻧ‪87‬ﻘﺎﻁ‪y‬ﺍﻟﻔﺎﺣﺼﺎﺗﺎﺳﺘﺄﺟﺮﺗﺒﻮﺍﺳﻄﺔﺍﺷﺮﻛﺔﺇﻟﻰ‪identif‬‬ ‫ﺍ ﻟﻘ ﺴﻤﻤﻨﺎ ﻟﺘﺠﺎﺭﺓﺗﻤﺘ ﺴﺤﺒﺪ ﻭﺭﺗﻬﺎ‬
‫ﻭﻟﺬﻟﻚ‪ ،‬ﺍﺳﺘﻌﻤﺎﻻﻟﺒﺎﻟﻀﺒﻄﻨﻔﺴﺄﺩﻭﺍﺕ ‪،.‬ﺿﻌﻔﻔﻴﺪﻭﺭﺗﻬﺎﺃﻧﻈﻤﺔ‬ ‫ﺍﻟﻤﻘﺘﺮﺣﺔﺍﻟﺘﻨﻔﻴﺬﻓﻴﺎﻻﻟﻮﺟﻬﻤﻨﺤﺮﺝ‬
‫ﻋ ﻠﯽ ﺭﻏﻤﺎ ﻟﺠﺪﻳﺪﺃ ﺣ ﻜﺎﻣﻤﻨﺎ ﻟﺘﺮﺗﻴﺐ‬ ‫ﻭ ﺍ ﻟﺪ ﻭ ﻟﺔ ﻗ ﺴﻤﺘﻤﺖ ‪،88‬ﻋﺎﻣﺔﺗ ﻌ ﻠﻴﻖ‬
‫ﻫﻠﺠﻴﺪﺍ ‪- meaning‬ﺗﺮﻛﺰﻋﻠﯩﺤﻔﻈﺎﻟﻘﺮﺻﻨﺔ‬ ‫ﺃﺷﺎﺭﺗﺪﻭﺭﺗﻬﺎﻧﻴﺔﺇ ﻟﯩﺈﻋﺎﺩﺓ ﺍ ﻟﺘﻔﺎﻭﺿﺎ ﻟ ﻠﻐﺔﻣﻦ‬
‫‪،‬ﺍﻟﺒﺮﻣﺠﻴﺎﺗﺨﺎﺭﺟﻤﻨﺎﻻﻟﻴﺪﺳﻤﻨﺎﻟﻘﻤﻌﻴﺔﺍﻷﻧﻈﻤﺔ‪-‬ﺍﻟﺘﻔﺎﺻﻴﻞ‬ ‫‪.‬‬‫ﻓﺈﻧﻬﺒﻘﺎﻳﺎﺇﻟﯩﻜﻨﺮﺃﻳﺖ ‪،‬ﻭﻣﻊ ﺫﻟﻚ ‪89‬ﺍﻻﻟﺘﺮﺗﻴﺐ‬
‫ﺧﺼﻮﺻﺎﻓﻴﺎﻻﻟﻄﺮﻳﻘﻔﺈﻧﻬﻮﻛﺎﻧﺎﻗﺘﺮﺍﺣﺪ‬ ‫ﻛﻴﻔﺎ ﻟﻔﺎﺳﻨﺎﺭﺗﺮﺗﻴﺒﻤﺎﻳ ﻮ ﻓﻲ ﻧﻬﺎﻳﺔ ﺍ ﻟﻤﻄﺎﻑ‬ ‫‪ly‬‬
‫ﺇﻟﯩﻜﻨﻨﻔﺬﺗﻔﻴﺎﻷﻣﺮﻳﻜﻴﺔﺍﻟﻘﺎﻧﻮﻥ‪،‬ﺳﻴﻜﻮﻧﻴﻤﻠﻚ‬ ‫‪-‬‬ ‫‪-‬‬
‫ﺣﺮﺟﺎﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻴﻌﻤﻞ ﻭﻗﺸﻌﺮﻳﺮﺓ ﺗﻄﺒﻴﻘﺈﻟﻰ‬ ‫‪.‬‬
‫‪.‬‬
‫ﺗﺠﺮﻳﻤﺎﻟﻜﺜﻴﺮﻣﻨﺎﻟﻌﻤﻠﻤﻨﺎﻷﻣﻨﺎﻟﺒﺤﺚ‬

‫ﻣﺎﺫﺍﻳﻜﻮﻧﺎﻟﻨﻘﺎﻁ ﺍﻟﻀﻌﻒ‬
‫ﺍﻟﺴﻮﻕ؟‬

‫ﻧﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔﻬ ﻠ ﺸﺮﺍﺀ ﻭﺑﻴﻊ ‪،‬ﻣ ﺴﺘﺄ ﺟﺮﺓ ﻭ‬


‫ﻓﻘﻂ ﺃﻋﺠﺒﺘﻚ ﺃﻳﺄﺧﺮﯨﺒﺎﻻﺗﺼﺎﻻﺕ‪،‬ﺍﻟﻤﺘﺪﺍﻭﻟﺔ‬ ‫‪.‬‬ ‫‪• odity-‬‬
‫ﺃﻋﻤﺎ ﻟﻮ‬ ‫‪contr‬‬ ‫ﺃ ﺣﻴﺎﻧﺎﻣ ﺎ ﺑ ﻴ ﻨ ﺎ ﻟ ﺸ ﺮ ﻛ ﺎ ﺗ ﻤ ﻌ ﺎ ﻟ ﻘ ﺎ ﻧ ﻮ ﻧ ﻴ ﺔ‬ ‫ﺍﻷﺳﻌﺎﺭﻟﻠﺤﺼﻮﻝ ﻋﻠﯩﻨﻘﺎﻁ ﺍﻟﻀﻌﻒ‬
‫ﻓﻲ ﺑ ﻌ ﺾ ﺍﻷ ﺣﻴﺎﻧﻤﺎ ﺑﻴﻨﻤﺠﻬ ﻮﻻ ﻟﻘﺮ ﺍﺻﻨﺔﻣﻦ ﺧﻼﻻﻹ‬
‫‪.‬‬
‫ﻧﺘﺮﻧﺘﻤﻨﺘﺪﻳﺎﺕ ﺍ ﻟ ﺴ ﻮ ﻗﻴ ﻜ ﻮﻧﺎ ﺍ ﻟﺮﺋﻴ ﺴﻴﺔﻣ ﻜ ﻮﻧﻤﻨﺎ ﻟ ﻨ ﻘ ﺎ ﻁ‬
‫ﻳﺴﺘﺤﻖ؟‪nerability‬ﻣﺎﺫﺍﻳﻜﻮﻧﺎﺟﻮﺟﻠﻜﺮﻭﻡ‪vul‬‬
‫ﻭﻳﻜﻮﻧﺘﺘﺄﻟﻔﻤﻨﺎﺗﺸﻜﻴﻠﺔﻣﻨﻤﺨﺘﻠﻔﺎﻟﻼ‪،‬ﺍﻟﻀﻌﻔﺎﻟﻨﻈﺎﻡ ﺍﻟﺒﻴﺌﻲ‬ ‫‪90‬ﺟﻮﺟﻠﻴﺪﻓﻊ‪15،000$-500$:‬‬
‫ﻋﺒ ﻮﻧﺄﻧ ﻜ ﻠﺘﻔﺎﻋ ﻠ ﻮ‬
‫ﺗﺆﺛﺮﺍﻷﻭﺳﻌﺎﻟﺼﻮﺭﺓ ﺭﺳﻢ ﺧﺮﺍﺋﻄﻬﺬﻫﺎﻟﻨﻈﺎﻡ ﺍﻟﺒﻴﺌﻴﻴ ﺴﺎﻋﺪ ﺍ ﻟ ﻮ‬ ‫‪.‬‬ ‫‪0،00091‬ﺟﻮﺟﻠﻌﺮﺿﺖ‪vupen:$6‬‬
‫‪dri‬‬ ‫ﻻﻳﺎﺕ ﺍ ﻟﻤﺘﺤﺪﺓﺇ ﻟﯩﻔﻬﻤﺎ ﻟﺤﻮﺍ ﻓﺰﺃﻥ‬ ‫‪ve‬‬ ‫‪-$200،00092‬ﺍﻷﺳﻮﺩﺳﻮﻗﻴﺪﻓﻊ‪80،000$:‬‬
‫ﺍ ﻟﻤ ﻜﺘ ﺸﻔ ﻮﻧﺈﻣﺎﺇ ﻟﯩ ﻜ ﺸﻔﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔﺈ ﻟﯩﺎ ﻟﺒﺎﺋ ﻌﺈ ﻟ ﯩ ﻜ ﻨ ﻤ ﺼﺤﺤﺔ ‪،‬‬
‫‪.‬‬
‫ﻭ‪،‬ﻭﺑﺎﻟﺘﺎﻟﻴﻤﻦ ﺍﻟﺬﯨﻴﺸﺘﺮﻱ ﺃﻭﺇﻟﯩﻴﺒﻴﻌﻤﻨﻬﻤﺈﻟﯩﺎﻷﻋﻠﯩﻤﺰﺍﻳﺪ‬ ‫ﻣﺎﺫﺍﻳﻜﻮﻧﻌﻠﯩﺪﺍﺋﺮﺓ ﺍﻟﺮﻗﺎﺑﺔ ﺍﻟﺪﺍﺧﻠﻴﺔ‪9‬ﺍﻟﻀﻌﻔﻴﺴﺘﺤﻖ؟‬
‫‪w‬‬ ‫ﻫ ﻮﻳﺒﻴ ﻌﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌ ﻒ؟‬
‫‪y:‬ﺗﻤﺘﻤﻠﺘﺰﻣﺈﻟﯩﺎﻟﺴﻠﻄﺔ ﺍﻟﻔﻠﺴﻄﻴﻨﻴﺔ‪zerodium‬‬
‫ﻓﻲ ﻭﻗﺖ ﺳﺎﺑﻘﻔﻴﺎﻟﻮﺭﻗﺔﻧﺤﻨﻤﻨﺎﻗﺸﺔﺍﻷ‬ ‫‪$1،000،00093‬‬
‫‪:‬‬
‫ﺭﺑﻌﺔﺍﻟﻔﺌﺎﺗﻤﻨﺎﻟﻤﻜﺘﺸﻔﻮﻥ ﺍﻟﻤﺴﺘﻘﻠﺔﻭﻛﻼﺀ‪،‬ﺻﻐﻴﺮﻓﺮﻕ‪،‬‬
‫‪c‬‬‫ﺃﻛﺒﺮ ﻓﺮ ﻗﻔﻲ ﻏ ﻀ ﻮﻧﺮﺍﺋﺪﺍ ﻟﺘ ﻜﻨ ﻮ ﻟ ﻮ ﺟﻴﺎ‬ ‫‪ompanies‬‬ ‫ﻭ‪،‬‬
‫ﺍ ﻟﺤ ﻜﻮﻣﺎﺕ‬ ‫‪.vuln‬‬ ‫ﻫﺬﻫﻤﺠﻤﻮﻋﺎﺗﺘﺠﺪ‬ ‫‪erabilities‬‬ ‫ﻓﻲ ‪،‬ﻭ‬ ‫ﺍﻟﺤﻜﻮﻣﺎﺕ‬
‫‪،‬ﺑﻌﺾ ﺍﻷﺣﻴﺎﻥ‬
‫‪.‬‬
‫ﻣﻨﺬﻧﺤﻨﻴﻤ ﻠ ﻜ ﺴﺎﺑﻘﺎﻭﻭﺻﻔﻬﺬﻫﺎ ﻟﺒﺎﺋﻌﻴﻦ ﻳﺒﻴﻌﻤﻨﻬﻤﻌ ﻠﯩﺎ ﻟ ﺴﻮﻕ‬ ‫ﺍﻟﺤﻜﻮﻣﺎﺗﻬﻠﻮﺍﺣﺪﻣﻨﺎﻻﻟﺮﺋﻴﺴﻴﺔﺍﻟﺴﺎﺋﻘﻴﻨﻤﻨﺎﻝ‬
‫‪،‬ﺍ ﻟ ﻤ ﻔ ﻀ ﻠ ﻴ ﻦ‬ ‫‪،‬ﻧﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔ ﺴ ﻮ ﻕ‬‫‪intera‬‬‫ﻟﻜﻨﻬﻢ‬ ‫‪ction‬‬‫ﻣﻊ‬
‫ﻧﺤﻨﻴﻤ ﻜﻨﺐ‬ ‫‪etter.‬‬ ‫ﻓ ﻬ ﻤ ﺎ ﻟ ﺴ ﻮ ﻗ ﺒ ﻮ ﺍ ﺳ ﻄ ﺔ ﺃ ﺑ ﺤ ﺜ ﻔ ﻴ ﺈ ﻟ ﯩ ﻤ ﻨ ﻬ ﻤ ﻬﻠﺒﻴﻊ‬ ‫‪.‬‬
‫ﻓﺈﻧﻬﻴ ﻜ ﻮﻧﻤﺒﻬﻤﺔ ﺗﺤ ﻠﻴ ﻠ ﺴ ﻮﺍﺀﻫﺬﻫﻤ ﺸﺘﺮﻳﺎﺕ‬

‫‪:‬‬
‫ﺍﺍﻟﺘﻤﻬﻴﺪﻳﻌﻠﯩﺎﻻﻟﺒﺮﻣﺠﻴﺎﺗﺎﻟﻀﻌﻔﺎﻟﻨﻈﺎﻡ ﺍﻟﺒﻴﺌﻴﻮﺩﻭﺭﺗﻬﺎﺳﻴﺎﺳﺔﻋﻔﺮﻳﺖ ﺍﻷﺧﻄﺎﺀﻓﻴﺎﻟﻨﻈﺎﻡ‬ ‫‪lications15‬‬
‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪197.53.153.65‬‬‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬
‫‪ "،‬ﺍﻟﺴﻮﻕ ‪"black‬ﻫﻠﺠﺰﺀﻣﻨﺎﻟﺒﺤﺘﺔﺍﻟﺠﻨﺎﺋﻴﺔ‬ ‫ﺃﻟﻒ‪،‬ﺍﻷﺭﺩﻥ‪،‬‬ ‫‪.ethiopi‬‬ ‫•‬
‫ﺃ ﻗﻼ ﻟﻤﺘﻘﺪﻣﺔﺍ ﻟﺪ ﻭﻝ ﺃﻋﺠﺒﺘﻚ‬
‫‪ "،‬ﺭﻣﺎﺩﻳﺎﻟﺴﻮﻕ"‪guous‬ﺃﻭﺍﻻﻟﻤﺰﻳﺪﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ‪ambi‬‬ ‫ﻫﻼ ‪105‬ﻭﻣﺎﻟﻴﺰﻳﺎ‪،‬ﺗﺮﻛﻴﺎ ‪،‬ﺍﻟﺴﻌﻮﺩﻳﺠﺰﻳﺮﻩ ﺍﻟﻌﺮﺏ ‪،‬ﻛﺎﺯﺍﺧﺴﺘﺎﻥ‬
‫ﻳ ﻜ ﻮﻥ‬ ‫ﻟﻤﺰﻳﺪ ﻣﻦ ﺍ ﻟﻤﺤ ﺘﻤ ﻺ ﻟ ﯩ ﻴ ﺸ ﺘﺮﯨﺎ ﻟﻤﺮ ﺍ ﻗ ﺒﺔ ﺃ ﺩ ﻭ ﺍﺗﻤﻦ ﻋ ﻨﺪ‬
‫ﻳﺘﺤﺪﯨﻼﻧﻤﻨﺎ ﻟﺘﻨ ﻮﻋﻤﻨﺒ ﻠﺪﺍﻥ‬ ‫ﻣ ﻘ ﺎ ﺑ ﻞ ﺍ ﻭ ﺿ ﺪ ﻣ ﻜ ﻠ ﻔ ﺔ ﺻ ﻔ ﺮ ‪،‬ﻭ ﺳ ﻄ ﺎ ﺀ‬ ‫‪-days.‬‬‫ﻟ ﻠﺤ ﺼ ﻮ ﻝ ﻋ ﻠﻰ‬
‫‪transa‬‬ ‫ﻣﺘﻮﺭ ﻃﻔﻴﺎﻝ‬ ‫‪ctions.‬‬ ‫ﻟﻠﺤﺼﻮﻝ ﻋﻠﯩﻤﺜﺎﻻﻝ‬ ‫‪،‬ﻣﺜﺎﻝ‬ ‫‪finfisher-‬‬ ‫ﺧ ﻠ ﻘ ﺪ ﻭﺗﻢ ﺍ ﻟﺒﻴ ﻌﺒ ﻮ ﺍ ﺳﻄﺔﻏﺎﻣﺎ‬
‫ﺷﺮﻛﺔ ﺍ ﻟﻘﺮﺻﻨﺔ ﻓﺮﻳﻖ ‪ ،‬ﺍ ﻟﺬﻳ ﻮﻛﺎﻧﺒﺤﺪ‬ ‫ﺍ ﻟﺪ ﻭ ﻟﻴﺔ‬‫‪-surveillan ce‬‬ ‫ﺃ ﺩ ﺍ ﺓﻣ ﺴﺘ ﻌﻤ ﻠﺔ ﻟ ﻠﺤ ﺼ ﻮ ﻝ ﻋ ﻠﯩ ﻌﻦ ﻳ ﻜ ﻮ ﻧ ﺎ‬
‫‪،‬‬‫‪2015‬‬ ‫ﺫﺍﺗﻬﺎﺍﻟﻬﺪﻓﻤﻨﺎﺿﺨﻤﺔﺍﻟﺒﻴﺎﻧﺎﺗﺨﺮﻗﻔﻴﺎﻻﻟﺼﻴﻔﻤﻦ‬
‫ﻭﻛﺎﻧﺄﻇﻬﺮﺗﺈﻟﯩﻴﻤﻠﻜﺘﻢ ﺍﻟﺒﻴﻌﺪﻭﺭﺗﻬﺎﺍﻟﻤﻨﺘﺠﺎﺗﺈﻟﯩﺎﺟﻤﻴﻊ ﺃﻧﺤﺎﺀ ‪94‬‬
‫ﺃ ﻧ ﺎ ﻟ ﺒ ﺎ ﺋ ﻌ ﺎ ﺩ ﻋ ﯩ ﺎ ﺳﺘﻄﺎﻋ ﻮ ﺣﺘﯩﺎ ﺳﺘﻤ ﻌﻔﻴ ﻌ‬ ‫‪keylogging‬‬ ‫ﺑ ﻌﺪﺭ ﺻ ﺪ ﻭ‬
‫ﻠ ﯩﺎ ﻓﻲ ﺍ ﻟﻬﺪ ﻓ ﺴ ﻜﺎﻳ ﺒﺎ ﻟﻤ ﻜﺎ ﻟﻤﺎﺗﻔﻲ‬
‫ﻧﻄﺎ ﻗﻤﻨﺪﻭ ﻟﺔﺍ ﻟﺠﻬﺎﺕ‬ ‫‪.‬‬
‫ﺍﻷ ﺩ ﺍ ﺓﺗﻤﺘﺘﺤ ﻮ ﻟﺘﻔ ﻮ ﻗﻔﻴ ﻌﺸﺮﺍﺗﻤﻦ ‪ 106‬ﺍ ﻟ ﻮ ﻗﺖ ﺍ ﻟﻔ ﻌ ﻠﻲ‬
‫ﺍ ﻟﻔﺎﻋ ﻠﺔ ﺍ ﻟ ﺼﺪﺭﺍ ﻟﺒﻴﺎﻧﺎﺗﻴ ﻮﺿﺤﺄﻧﺎ ﻟ ﺸﺮﻛﺔﺗﻢ‬ ‫‪.‬‬ ‫ﺍ ﻟﺒ ﻠﺪﺍﻥ ‪ ،‬ﻭ ﻭﻳ ﻜﻴ ﻠﻴ ﻜ ﺴﺎ ﻟ ﻮﺛﺎﺋﻘﻴﻤ ﻠ ﻜﺎﺳﺘ ﺸﻬﺪ‬
‫ﺍ ﻟ ﺒ ﻴ ﻌﺎ ﻟ ﻤ ﻨ ﺘﺠﺎﺗﺈ ﻟ ﯩﺎ ﻟ ﻤﻮ ﺣﺪﺍ ﻟﺪﻭﻝ‬ ‫ﺍ ﻟﺤ ﻜ ﻮﻣﺎﺗﺘﺘﺮ ﺍ ﻭ ﺣﻤﻦ‬
‫ﺍﻟﺠﻴﺶ‪،‬ﻭﺍﻻﻟﻤﺨﺪﺭﺍﺗﺈﻧﻔﺎﺫﺍﻟﻮﻛﺎﻟﺔ‬ ‫‪.‬‬‫ﻓﺈﻧﻬﻴﻜﻮﻧﺈﻟﻰ ‪107‬ﻋﻨﺪﺑﺎﻛﺴﺘﺎﻧﺈﻟﯩﺒﻠﺠﻴﻜﺎﻣﺜﻠﻮﺃﻛﺪﺍﻟﻤﺸﺘﺮﻳﻦ‬
‫‪.‬‬‫‪95‬ﻫﺬﻫﺎﺳﺘﻄﺎﻋﻜﻨﺎﻋﺘﺒﺮﺍﻟﻤﺒﻴﻌﺎﺗﻌﻠﯩﺎﻟﺮﻣﺎﺩﻳﺎﻟﺴﻮﻕ‬ ‫ﺣﺪ ﻛ ﺒ ﻴﺮ ﻫﺬ ﻫ ﺴ ﻮ ﻗﺄﻥ‬
‫ﻟ ﻜ ﻨﻔﺈﻧﻬﺄﻳ ﻀﺎﺗﻤ ﺘ ﺘ ﻢ ﺍ ﻟ ﺒ ﻴ ﻌﺪ ﻭﺭﺗﻬﺎ ﺍ ﻟ ﺘﺮﻛ ﻴ ﺒﺎﺗﺈ ﻟ ﯩ ﻨ ﻴﺠ ﻴﺮﻳﺎ ‪ ،‬ﺍ ﻟ ﺒﺤﺮﻳﻦ ‪،‬‬ ‫‪arrangement'sexport‬‬
‫ﺿﻮﺍﺑﻂ‬ ‫‪108‬ﺍﻟﻔﺎﺳﻨﺎﺭ‬
‫‪-‬‬ ‫‪wh‬‬
‫ﺑ ﻠ ﺪ ﺍ ﻥ ﺑ ﻴ ﺌ ﺔ ﻧ ﻈ ﺎ ﻡ ﺍ ﻟ ﺘ ﺸ ﻐ ﻴ ﻞ ﺍ ﻟ ﺴ ﻮ ﺩ ﺍ ﻧ ﻮ ﺑ ﺎ ﻛ ﺴ ﺘ ﺎ ﻥ ‪،‬ﺇ ﺛ ﻴ ﻮ ﺑ ﻴ ﺎ‬ ‫‪stifli‬‬ ‫‪ng‬‬
‫‪،‬ﺍ ﻟ ﻬ ﺪ ﻓ ﺈ ﻟ ﯩ ﺘ ﺆ ﺛ ﺮ‬ ‫ﺍﻝ ﻣ ﻌﺎ ﻟﻨﻴﺔﻣﻦ‬
‫ﺍ ﻟﺤ ﻜ ﻮﻣﺎﺗﻬﻼ ﻟ ﻜﺜﻴﺮﺃ ﻗ ﻠﻤﻦ ﺍ ﻟﻤﺤﺘﻤﻺ‬ ‫‪sof‬‬ ‫‪tware‬‬
‫ﺗﺪ ﻓﻘﻤﻨﺎ ﻟﻤﺮ ﺍ ﻗﺒﺔ ﺃ ﺩ ﻭ ﺍﺗ ﻮﺗﺪ ﺧﻞ‬
‫ﻟﯩﺎﺣﺘﺮﺍﻣﺒﺸﺮﻳﺎﻟﺤﻘﻮﻗﻮﺍﺳﺘﻄﺎﻋﻜﻨﺎﻋﺘﺒﺮﺟﺰﺀﻣﻨﺎﻻﻷﺳﻮﺩ‬ ‫‪.while‬‬
‫ﺇ ﻟﯩﺎ ﻟﻘﻤﻌﻴﺔﺍ ﻟﺤ ﻜﻮﻣﺎﺕ‬ ‫ﻫﺬ ﻫﺮﺑﻤﺎ ﺍ‬
‫‪.‬‬‫‪،‬ﺑﻌﻀﻤﻨﻬﺬﻫﺒﻠﺪﺍﻧﻬﻠﺤﺎﻟﻴﺎﻓﻲ ﻇﻼ ﻟ ﻌﻘ ﻮﺑﺎﺕ ‪96‬ﺍﻟﺴﻮﻕ‬ ‫ﻭ ﺍ ﻋ ﺪ ﺓ ﻳ ﻌ ﻨ ﻴ ﺈ ﻟ ﯩ ﺎ ﻟ ﺠ ﺬ ﻋ ﻴ ﺔ ﺗ ﻮ ﻗﺎ ﻝ ﺍﻧﻬﺘﺨﻔﻴ ﺾ ﺍ ﻟ ﺴ ﻌﺮﻣﻨﻴ ﺴﺘ ﻐ ﻠﻔﻲ‬
‫ﺻ ﻨ ﻌﺎ ﻟ ﻤ ﺒ ﻴ ﻌﺎﺗﺈ ﻟ ﯩ ﻤﻨﻬﻤ ﻠﻴ ﺴﻔﻘﻄﺄ ﺧﻼ‬ ‫ﺍﻻﻟﺤﻜﻮﻣﺔﺍﻟﺴﻮﻕ‪،‬ﻫﻨﺎﻛﻬﻸﻳﻀﺎﺃﺻﻠﻲ‬
‫ﺃﻳ ﻮﻧﺎﺗﻤﻦ‬ ‫‪violat‬‬ ‫ﻗﻴﺎﻣ ﺸ ﻜ ﻮﻛ ﻠ ﻜﻨ ﻮﺍﺿﺢ‬ ‫‪e‬‬ ‫ﺍﻫﺘﻤﺎﻣﺎﺗﺤﻮﻟﺴﻮﺍﺀﺍﻝ‬ ‫‪xport‬‬ ‫ﻣﺮﺍ ﻗﺒﺔ ﻗ ﻮﺍﻋﺪﻣﺜ ﻠ ﺸﻴﺪﺕ‬ ‫‪unn‬‬
‫‪.‬‬‫‪97‬ﺍﻟﺪﻭﻟﻴﺔﺍﻟﻘﺎﻧﻮﻥ‬ ‫‪ecessarily‬‬ ‫‪ 109‬ﺧﻨﻘﺎﻟﻤﺸﺮﻭﻋﺔﺍﻷﻣﻨﺎﻟﺒﺤﺚ‬ ‫‪.‬‬
‫ﻋﻠﯽ ﺭﻏﻤﺎﻟﻤﻌﻈﻤﺎﻟﻤﺘﻘﺪﻣﺔ‬
‫ﺍﻟﺪﻭﻝ ﺃﻋﺠﺒﺘﻚ ﺍﻻﻟﻤﻤﻠﻜﺔ ﺍﻟﻤﺘﺤﺪﺓ‪،‬ﺭﻭﺳﻴﺎ‪،‬‬ ‫‪.‬‬ ‫•‬ ‫ﺍﻟﺠﻨﺎﺋﻴﺔﺍﻟﺠﻬﺎﺕ ﺍﻟﻔﺎﻋﻠﺔ‬
‫ﺍﻻﻷﺳﻮﺩﺳﻮﻗﻠﻠﺤﺼﻮﻝ ﻋﻠﯩﻨﻘﺎﻁ ﺍﻟﻀﻌﻒ‪،‬‬
‫ﺇﺳﺮﺍﺋﻴﻞ‪،‬ﺍﻟﻤﻮﺣﺪﺍﻟﺪﻭﻝ‪،‬ﺍﻟﺼﻴﻦ‪،‬ﻭ‬
‫ﻣﺮﺓﺍﻣﺘﻨﻮﻋﺎﻟﻤﻨﺎﻇﺮ ﺍﻟﻄﺒﻴﻌﻴﻬﻤﻨﺎﻹﻋﻼﻧﻤﺨﺼﺼﺸﺒﻜﺎﺗﻤﻨﺎﻷ‬
‫ﻓﺮﻧﺴﺎﻓﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷ‬
‫‪nd‬‬
‫ﺍﺳﺘﻜﺸﻔﻨﻘﺎﻁ ﺣﻴﺎﻧﺘﻄﻮﻳﺮﺍ‬
‫ﻓﺮﺍ ﺩ‬
‫)‬ ‫(‬
‫ﺩﻭﺍﻓﻌﺒﻮﺍﺳﻄﺔﺍﻷﻧﺎ‪،‬ﺳﻤﻌﺔ ﺳﻴﺌﺔ‪،‬ﻭ ﻣﻨﺒﺎﻟﻄﺒﻊ‬
‫ﺍﻟﻀﻌﻔﺒﺪﻭﻧﻤﻨﺘﺠﻌﺠﻴﺈﻟﯩﺎﻻﻟﺴﻮﻕ‪،‬ﻫﻤﻬﻸﻳﻀﺎﺍﻝ‬ ‫‪،‬ﺍ ﻟ ﻤ ﺎ ﻝ ‪ ،‬ﺗ ﻤ ﺘ ﺘ ﻄ ﻮ ﺭ ﺗ ﺈ ﻟ ﯩ ﺎ ﻧ ﺎ ﺿ ﺠ ﺔ ﺳ ﻮ ﻗ ﻤ ﻨ ﻠ ﻠ ﻐ ﺎ ﻳ ﺔ ﻧ ﻈ ﻤ ﺘ ﻤ ﺠ ﻤ ﻮ ﻋ ﺎ ﺕ‬
‫ﺃﻏﻨﯩﺎﻟﻤﺸﺘﺮﻳﻨﻮﻃﻠﺒﺨﺎﺭﺟﺬﺍﺕ ﺍﻟﻘﻴﻤﺔ‬ ‫‪traditiona‬‬ ‫ﻓﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷﺣﻴﺎﻧﻤﻦ ﺿﻤﻨﻬﺎ‬ ‫‪l‬‬
‫‪.‬‬ ‫‪.‬‬ ‫•‬
‫ﺍ ﻟﺠﻨﺎﺋﻴﺔﺍ ﻟﺠﻬﺎﺕ ﺍ ﻟﻔﺎﻋ ﻠﺔ ﺃﻋﺠﺒﺘﻚ ﺍ ﻟﻤﺨﺪﺭﺍﺗ ﻌ ﺼﺎﺑﺎﺕ ‪،‬‬
‫ﺍﻟﻌﺎﻟﻴﺔﺍﻟﻤﻨﺘﺠﺎﺕ‬ ‫‪mafias‬‬ ‫ﻭ‪،‬‬
‫‪.‬‬
‫ﺑﺎﻟﻨﺴﺒﺔ ﺍﻟﯩﺈﻟﯩﺎﻷﻣﻨﺨﺒﻴﺮﻣﻘﻮﺱ‪ 110‬ﺍﻹﺭﻫﺎﺑﻴﺔﺍﻟﺨﻼﻳﺎ‬
‫ﺩﻭﻟﺔﺍﻟﻤﺸﺘﺮﻳﻨﺘﻤﻴﻺﻟﯩﻴﻤﻠﻜﺎﻟﻤﺰﻳﺪﺍﻟﺘﻌﺮﻳﺒﺘﻺﻟﯩﻴﻘﻀﻲ‬ ‫‪80‬‬
‫ﻧﺴﺒﻪ ﻣﺌﻮﻳﻬﻤﻨﺎﻷﺳﻮﺩﻗﺒﻌﺔﺍﻟﻘﺮﺍﺻﻨﺔﻫﻞ ‪،‬ﻏﻮﺩﻣﺎﻥ‬
‫‪.‬‬
‫ﻋﻠﯽ ﺭﻏﻤﺎﻟﻤﻮﺳﺘ ‪ 98‬ﻓﻴﺎﻟﻨﻘﺎﻁ ﺍﻟﻀﻌﻔﺴﻮﻕ‬ ‫‪.‬‬‫ﺍﻟﺘﻌﺎﻣﻼﺗﻔﻲ‪111‬ﺍﻵﻧﺎﻟﺘﺎﺑﻌﺔﻣﻌﻨﻈﻤﺘﺎﻟﺠﺮﻳﻤﺔ‬
‫‪.‬‬
‫ﺎﻟﻤﺘﻘﺪﻣﺔﺍﻟﺪﻭﻝ ﺃﻋﺠﺒﺘﻚ ﺍﻻﻟﻤﻤﻠﻜﺔ ﺍﻟﻤﺘﺤﺪﺓ‪،‬ﺭﻭﺳﻴﺎ‪،‬‬ ‫•‬ ‫‪slig htly‬‬
‫ﻭ ‪،‬ﻫ ﺬ ﻫ ﺎ ﻟ ﻜ ﺜ ﻴ ﺮ ﺃ ﻛ ﺒ ﺮ‬ ‫ﺍﻟﻤﺰﻳﺪﺍﻟﻌﺎﻣﺔ‪،‬ﺍﻷﺳﻮﺩ‬
‫ﺇ ﺳﺮ ﺍﺋ ﻴﻞ ‪ ،‬ﺍ ﻝ‬ ‫‪.‬‬‫ﺳﻮﻗﺘﺄﺧﺬﻣﻜﺎﻧﻤﻦ ﺧﻼﻻﺗﺸﻜﻴﻠﺔﻣﻨﺎﻟﻘﻨﻮﺍﺕ‬
‫ﻣﻮﺣﺪﺍﻟﺪﻭﻝ‪،‬ﺍﻟﺼﻴﻦ‪،‬ﻭﻓﺮﻧﺴﺎﻓﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷ‬ ‫‪irect‬‬
‫ﺑ ﻌ ﻀﻬ ﻠﻤ ﺼﻨ ﻮﻋﻤﻦ ﺧﻼ ﻟﺪ‬ ‫ﺍ ﻟﻤﻌﺎﻣﻼﺗﻤﻊ‬
‫ﺣﻴﺎﻧﺘﻄ ﻮﻳﺮ ﻭ ﺍ ﺳ ﺘ ﻜ ﺸ ﻔ ﻨ ﻘ ﺎ ﻁ ﺍ ﻟ ﻀ ﻌ ﻔ ﻤ ﻌﺨﺎﺭ ﺟﺎ ﻟ ﻠﺠ ﻮﺀ ﺇ ﻟﯩﺎﻝ‬ ‫ﺍﻟﻀﻌﻔﺎﻟﻤﻜﺘﺸﻔﻮﻥ‪،‬ﺃﺧﺮﯨﻤﻦ ﺧﻼﻷﻗﻞ‬
‫ﺍ ﻟ ﺴ ﻮ ﻕ ‪ ،‬ﻫﻤﻬﻸﻳ ﻀﺎ ﺍﻷﻏﻨﯩﺎ ﻟﻤ ﺸﺘﺮﻳﻨ ﻮ ﻃﻠﺒﺨﺎﺭﺟﺬﺍﺕ ﺍﻟﻘﻴﻤﺔ‬ ‫‪usi ng‬‬
‫ﺍ ﻭﺑﻌﺾ ‪،112‬ﺍﻟﺴﻤﻌﺔﻭﺳﻄﺎﺀ‬
‫‪.‬‬ ‫•‬
‫ﺍ ﻟ ﻌﺎ ﻟﻴﺔ ﺍ ﻟﻤﻨﺘﺠﺎﺕ ﺃﻋﺠﺒﺘﻚ ﺻﻔﺮ‬ ‫‪،‬ﻭ‬‫‪darkode .‬‬ ‫•‬
‫ﺷﺒ ﻜﺔﻣﻨﺎ ﻟ ﻮﻳﺒﺎ ﻟﻤﻨﺘﺪﻳﺎﺕ ﺃﻋﺠﺒﺘ ﻚ ﺃﻏ ﻮﺭ ﺍ ‪،‬‬
‫ﺃﻳﺎﻣﻮﺍﻟﻤﺘﻘﺪﻣﺔﺍﻟﻘﺮﺻﻨﺔﺃﺩﻭﺍﺗﻤﺴﺘﻌﻤﻠﺔﺇﻟﯩﻬﺪﻓﺄﺧﺮﯨﺎﻟﺪﻭﻷﻭﺍ‬ ‫‪abraxas .‬‬ ‫•‬
‫ﺃ ﺩﺍﺀﺍ ﻟ ﻜﺜﻴﺮ ﺃﻋﺠﺒﺘﻚ ﺍ ﻟ ﺴﺮﻳﺔ ‪،‬‬
‫‪.‬‬
‫ﻫﺬﻫﺎﻟﻤﺸﺘﺮﻳﻨﻴﻤﻠﻜﺘﻤﻬﻮ ﻣﺒﻴﻨﺈﻟﯩﻔﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷ ﻷﻓﺮﺍﺩ‬ ‫ﻋ ﻠﻰ ﺍﻻﻧﺘﺮﻧﺘﺎ ﻟﺒﺎﺯ ﺍﺭ ﺍﺗﻤﻦ ﺧﻼﻻ ﻟﺬﻳﺎﻟﻤﺨﺪﺭﺍﺗﻮﺃﺧﺮﯨﻐﻴﺮ‬
‫‪.‬‬ ‫•‬
‫ﺣﻴﺎﻧﻌﻤﻠﻤﻦ ﺧﻼﻟﻮﺳﻄﺎﺀ ﺃﻋﺠﺒﺘﻚ ﻏﺎﻣﺎ‬ ‫‪.‬‬‫ﺍﻟﺒﺎﺋﻌﻴﻦ ‪113‬ﺍﻟﻤﺸﺮﻭﻋﺔﺃﺩﻭﺍﺗﻬﻠﺒﻴﻊ‬
‫‪vupen‬‬
‫‪،99‬ﺍﻟﻤﺠﻤﻮﻋﺔ‬ ‫ﻭ‪،101‬ﺍﻟﻘﺮﺻﻨﺔﻓﺮﻳﻖ‪،100‬‬ ‫‪bu‬‬
‫ﺍ ﻟﻤﻔﻀ ﻠﻴﻨﻔﻴﻬﺬﻫ ﺴﻮ ﻗ ﻜ ﺴﺒ ﺴ ﻤ ﻌ ﺔ ﺑ ﻮ ﺍ ﺳ ﻄ ﺔ ﻛ ﻠ ﻤ ﺔ ﻣ ﻨ ﻔ ﻢ ﺗﻬ ﻨﺎﻛﻬ‬
‫‪revuln (netragard‬‬
‫‪102‬‬ ‫ﺗﻢ ‪104‬ﻭﺍﻟﻤﺮﺣﻠﺔ ﺍﻟﻨﻬﺎﺋﻴﺔ ‪103‬‬ ‫ﺍﻵ‬‫‪syste‬‬ ‫ﻸﻳ ﻀﺎﺍ ﻟﻤﺰﻳﺪﺭﺳﻤﻴﺔﺗ ﺼﻨﻴﻔ ﻮﺭ ﺩ ﻭ ﺩ ﺍ ﻟﻔ ﻌﻞ‬
‫ﻟ ﻜ ﻨ ﻜ ﻼ‪،‬ﺍﻟﺒﻴﻌﻴﺴﺘﻐﻠﻔﻴﺘﻮﻗﺎﻝ ﺍﻧﻬﺎ ﻟ ﻤﺎ ﺿﻲ‬ ‫ﻧ ﺴﺔﻣ ﺴﺘ ﻌﻤ ﻠﺔ ﺇ ﻟﻰ‬
‫)‬
‫ﻫ ﻤ ﺎ ﻳ ﻤ ﻠ ﻜ ﺄ ﻋ ﻠ ﻨ ﺄ ﻧ ﻬ ﻤ ﺴ ﻮ ﻓ ﻼ ﻳ ﻌﺪ ﻓ ﻌ ﻠ ﻠﺬ ﺍ ﺑﺪﻻﻣﻨ ﺸﺮ ﺍﺀﻣﺒﺎﺷﺮ ﺓﻣﻦ‬ ‫ﺗ ﻌﺮ ﻳ ﻔ ﺎ ﻟ ﺬ ﻳ ﺎ ﻟ ﺒ ﺎ ﺋ ﻌ ﻴﻦ ﺍ ﻟ ﻤ ﻔ ﻀ ﻠ ﻴ ﻨ ﻴ ﻤ ﻠ ﻜ ﺈ ﻋ ﺎ ﺩ ﺓ ﻋﺮﺿﺔ ﻭﻋﺎ ﻟﻴﺔ‬
‫ﻋﻨﺪ‬ ‫ﺍﻟﺠﻮﺩﺓﺍﻟﻤﻨﺘﺠﺎﺕ ﺍﻻﻟﻤﺸﺘﺮﻳﻨﻔﻴﻬﺬﻫﺴﻮﻗﻬﻠﻔﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷ‬ ‫‪.‬‬
‫‪.‬‬‫ﺷﺨﺼﻴﺒﺎ ﺣﺜﺲ‬ ‫ﺣﻴﺎﻧﺄ ﻗﻞ‬

‫‪e‬ﺕ‪ologyinstitu‬ﻓﺘﺢ‪16techn‬‬
‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪197.53.153.65،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬
‫ﺣ ﺴﻨﺎ ﺍ ﻟﻤﻮﺍﺭﺩﻣﻨﺎ ﻟﺤ ﻜﻮﻣﺎﺕ ‪،‬ﻭﺗﻤﻴﻺ ﻟﯩ ﻜﻨﺄﺑﺤﺜ ﻠ ﻠﺤﺼﻮﻝ ﻋ ﻠﯩ‬ ‫‪116‬ﻣﺴﺘﻌﻤﻠﺔﺇﻟﯩﺘﺴﻠﻴﻤﺄﻧﺎﻟﺒﺮﻣﺠﻴﺎﺕ ﺍﻟﺨﺒﻴﺜﺔﻋﻠﯩﺎﺁﻟﺔ‪.‬‬
‫‪investme‬‬ ‫‪nt‬‬
‫ﻣﻦ ﺍﻟﻀﺮﻭﺭﻳﺈﻟﯩﻴﺤﻘﻘﻬﻤﺎﻷ ﺎﻻﻟﺤﺪ ﺍﻷﺩﻧﻰ‬ ‫ﻫ ﺆﻻﺀﺑﺮﺍﻣﺠﻴﻤ ﻜﻨ ﺴﺮ ﻗﺔﺍ ﻟ ﺸﺨ ﺼﻴﺔﺍ ﻟﻤ ﻌ ﻠ ﻮﻣﺎﺕ ‪،‬‬
‫‪.‬‬‫ﻫﺪﺍﻑ‬ ‫ﻻﺑﺘﺰ ﺍﺯﻧﻘ ﻮ ﺩﻣﻦ ﻋﻨﺪﺿﺤﺎﻳﺎﺑ ﻮ ﺍﺳﻄﺔﺑﺎﺳﺘﺨﺪ ﺍﻣﻔﺪﻳﺔ ﺃ ﻭ‬
‫‪scareware‬‬ ‫ﺇﻋﺎﺩﺓ ﺗﻮﺟﻴﻬﺎﻟﻤﺴﺘﺨﺪﻣﻴﻨﺈﻟﯩﺎﻟﺘﺼﻴﺪﺍﻟﻤﻮﺍﻗﻊ‪،117 ،‬‬
‫ﺍﺳﺘ ﻌﻤﺎﻝ‬
‫ﻋﻠﻰ ﻋﻜﺴﺎﻟﺤﻜﻮﻣﺎﺕ‪،‬ﻣﻦ‬ ‫ﺍ ﻟﺨﺎﺹ ﺑ ﻜﺎ ﻟ ﻜﻤﺒﻴ ﻮﺗﺮﻣﺜﻼﺳﺮﺱ‬ ‫‪erver‬‬
‫ﺇ ﻟﯩﺎ ﻟﺒﺚ‬
‫‪،‬ﺍﻟﺪﻓﺎﻉ‪،‬ﺍﻟﺬﯨﻌﺎﺩﺓﻳﺸﺘﺮﯨﺄﺩﻭﺍﺗﻤﺴﺘﻌﻤﻠﺔﺇﻟﯩﺎﻟﻬﺠﻮﻡ‬ ‫ﺃﻭﺇﻛﺴﺠﺬﺍﺑﺎﻟﻌﺪﻳﺪ ﻣﻨﺄﺧﺮﯨﺎﻟﺪﺍﻻﺗ‪،‬ﺍﻟﻤﻮﺍﺩ ﺍﻹﺑﺎﺣﻴﺔﺍﻟﻤﻠﻔﺎﺕ‬
‫ﺃﻭﺟﻤﻌﻤﻌﻠﻮﻣﺎﺗﻌﻠﯩﺎﻷﻫﺪﺍﻑ‪،‬ﺍﻟﻌﺪﻳﺪ ﻣﻨﺄﺩﻭﺍﺗﺘﻢ‬ ‫‪.‬‬‫‪118‬ﺈﻟﯩﺎﻟﺪﻋﻤﺄﻭﺻﻨﺪﻭﻗﺎﻟﺠﻨﺎﺋﻴﺔﺍﻟﻨﺸﺎﻁ‬

‫ﺃﻳﻨﺎﻻﻟﺠﻬﺎﺕ ﺍﻟﻔﺎﻋﻠﺔﺍﻟﻬﺪﻓﺈﻟﯩﺠﻌ‬ ‫ﺍﻟﺒﻴﻌﺈﻟﻰ‬ ‫‪crim‬‬


‫ﻼﺍﻟﺮﺑﺤﻠﻠﺤﺼﻮﻝ‬ ‫ﻭﺳﻄﺎﺀ‬
‫‪.‬‬
‫ﻋﻠﯩﺎﻟﻤﺠﻤﻮﻋﺎﺗﺒﺎﺳﺘﺨﺪﺍﻣﻤﻨﻬﻢ‬ ‫ﻫﻨﺎﻛﻴ ﻜ ﻮﻧﺄﻳ ﻀﺎ ﺍﻧﻄﺎ ﻗﻤﻨ ﻮ ﺳﻴﻄﻤﺠﻤ ﻮﻋﺎﺗﻔﻲ‬
‫•‬ ‫‪.‬‬
‫ﺍﻻﻟﻀﻌﻔﺎﻟﻨﻈﺎﻡ ﺍﻹﻳﻜﻮﻟﻮﺟﻲ ﻣﺜﻼﻟﻤﺬﻛﻮﺭﺓﺃﻋﻼﻩ‪،‬ﺍﻟﺸﺮﻛﺎﺕ‬
‫‪focuse‬‬ ‫‪.‬‬ ‫‪vupen‬‬
‫‪119‬ﺃﻋﺠﺒﺘﻚ ﻏﺎﻣﺎﺍﻟﻤﺠﻤﻮﻋﺔ‪،‬‬ ‫‪،‬ﺍﻟﻘﺮﺻﻨﺔﻓﺮﻳﻖ‪،120‬‬
‫ﺩ‬
‫‪-‬‬
‫ﺍﻟﺠﻨﺎﺋﻴﺔﺍﻟﺠﻬﺎﺕ ﺍﻟﻔﺎﻋﻠﺔﻫﻠﻔﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷﺣﻴﺎﻥ‬ ‫‪121‬‬‫‪revuln netragard‬‬
‫‪،122‬‬ ‫ﻭﺍﻟﻤﺮﺣﻠﺔ ﺍﻟﻨﻬﺎﺋﻴﺔﺧﺮﻳﻒ‪،123‬‬
‫ﺍ ﻟﻤﺰﻳﺪﻋ ﻠ ﯩ ﺸﺮ ﺍﺀﻏ ﻴ ﺮ‬
‫‪vulnerabil‬‬ ‫‪ities‬‬ ‫ﺻﻔﺮﺍ ﻟﻴﻮﻡ‬ ‫ﺃﻧﻴﻤ ﻜﻨ ﻜﻨﻤ ﺴﺘ ﻌﻤ ﻠﺔﻋ ﻠﻰ‬
‫‪.‬‬ ‫‪th‬‬
‫ﻋﻠﻰ ﺍﻟﺮﻏﻢ ﻳﺤﺮﺛﻬﻼﻟﻌﺪﻳﺪ ﻣﻨﺎﻵﺧﺮﻳﻦ ‪،‬ﺇﻟﯩﻬﺬﻫﻔﺌﺔ‬
‫ﺍﻛﺒﺮ ﺳﻨﺎ ﺃ ﻭﻏﻴﺮ ﺍ ﻟﻤ ﺼ ﻠﺤﺔ ﺃﻧﻈﻤﺔ ‪،‬ﻻﻧﻬﻤﻬﻞ‬ ‫ﻫﻤﻬ ﻠ ﺸﺎ ﻫﺪ ﻭ ﺍﺑ ﻮ ﺍﺳﻄﺔﺑ ﻌ ﻀﻤﺜ ﻠﺠﺰﺀﻣﻨﺎ ﻟﺮﻣﺎ ﺩﻳﺎ ﻟ ﺴ ﻮ ﻕ ‪،‬‬
‫ﺃﻗﻠﻤﻜﻠﻔﺔﻭﺍﻻﺳﺘﻐﻼﻟﻤﻨﻤﻨﻬﻤﺎﺳﺘﻄﺎﻋﺘﺄﺛﻴﺮ ﺃﻭ‬ ‫‪th‬‬ ‫‪ey‬‬
‫ﻳﻤﻠﻜﺄﻳﻀﺎﺗﻤﻤﺘﻬﻤﻤﻨﺈﺷﺮﺍﻛﻤﻌﺎﻻﻷﺳﻮﺩﻋ ﻟ ﻜﻨﻔﻴ ﻌﺪ ﺓ ﺣﺎﻻﺕ‬
‫ﻼ ﻣ ﺔ ﻭ ﺁ ﺧﺮ ﻭﻧﻤﻨﺎ ﻟﺠﻨﺎﺋﻴﺔ‬
‫ﺗ ﺼﺎ ﺩﻣﺎ ﻟﻤﺰﻳﺪﺍ ﻟﻤ ﺴﺘﺨﺪﻣﻴﻦ ‪،‬‬
‫(‬ ‫‪.‬‬
‫ﺍﻟﺠﻬﺎﺕ ﺍﻟﻔﺎﻋﻠﺔﻭﺍﻟﻘﻤﻌﻴﺔﺍﻟﺤﻜﻮﻣﺎﺕ ﻫﻨﺎﻛﻬﻸﻳﻀﺎﺍﻷ‬
‫)‬
‫ﻣ ﺜ ﻠﺤ ﺴ ﻨ ﺎ ﻣ ﺜ ﻠ ﻌ ﻠ ﯩ ﺎ ﻟ ﻤ ﺸ ﺘﺮ ﻳ ﺎ ﺗ ﺄ ﻗ ﻠ ﻤ ﻌﻘﺪ ﻭ ﻭﺑﺎ ﻟﺘﺎ ﻟﻴﺎ ﻟﻤﺰﻳﺪﺑﺄﺳ ﻌﺎﺭ‬
‫ﻣ ﻌﻘ ﻮ ﻟﺔ‬ ‫ﺱ‪،‬‬ ‫‪intermediarie‬‬ ‫ﻓﺮﺍ ﺩﻣﻦ ﺍ ﻟﺬﯨﻴﺨﺪﻣﻤﺜﻞ‬
‫‪.‬‬ ‫‪-‬‬
‫ﺍ ﻟ ﺴﻤ ﺴﺮ ﺓ ﺍ ﻟ ﻤ ﺒ ﻴ ﻌ ﺎ ﺗ ﻤ ﺎ ﺑ ﻴ ﻨ ﺎ ﻟ ﻤ ﻜ ﺘ ﺸ ﻔ ﻮ ﻧ ﻮ ﻋ ﺎ ﻟﻲ‬
‫ﺍ ﻟ ﺒﺮ ﺍ ﻣﺞ ﺍ ﻟ ﻀﺎﺭ ﺓ ﻫﺬ ﻫﺄ ﺳ ﻮ ﺍ ﻗﺄﻳ ﻀﺎﻋﺮ ﺿﺨﺪ ﻣﺎﺗ ﻠ ﻴ ﺲ‬
‫ﻣﺒﺎﺷﺮﺓﻳ ﺴﺘﻨﺪ ﻓﻴﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌ ﻒ ‪،‬ﻣﻦ ﻫﺬﺍ ﺍ ﻟﻘﺒﻴ ﻠﻤﺜﻼ‬ ‫‪ncome‬‬
‫ﺃﻧﺎ‬ ‫‪.‬‬
‫‪ 124‬ﺍﻟﻤﺸﺘﺮﻳﻨﻠﻠﺤﺼﻮﻝ ﻋﻠﯩﺴﺠﻠﺮﺳﻮﻡ‬
‫‪-‬‬
‫ﺷ ﺒ ﻜﺎﺗ ﻤ ﻨ ﺸﺮﻛﺎﺕ ﻟﺘﺄ ﺟﻴﺮﻣ ﻨﺈ ﻗ ﻨﺎ ﻋﺎ‬ ‫‪uters‬‬ ‫"‬
‫ﺃﻧﻴﻤﻠﻜﺘﻢ ﺍﻻﺳﺘﻴﻼﺀ‬ ‫ﻭﺳﻄﺎﺀﻫ ﻠ ﻜﻼﻫﻤﺎﺍ ﻟﻤ ﺸﺘﺮﻳﻨ ﻮﺍ ﻟﺒﺎﺋ ﻌﻴﻦ ‪،‬‬
‫ﻋ ﻠﻰ ﻣﻦ ﺧﻼﻻﻻﺳﺘ ﻌﻤﺎ ﻟﻤﻨ ﻌ ﻠﯩﻴ ﺴﺘ ﻐ ﻠ ﻮ ﻫ ﻠﺒﻌﺪ ﺫﻟﻜﺎﻟﺘﺤﻜﻤﻌﻦ‬ ‫"‬ ‫ﺍ ﻟﻤ ﺸﺘﺮﻳﺎﺗﺎ ﻟﻌﻤ ﻠﻴ ﺴﺘﻐ ﻠﻮ ﻓﻲ‬ ‫‪tegrating‬‬ ‫ﻣﻨﻬﻤﺈ ﻟﯩﺎ ﻟﻘﺎﺋﻤﺔﺍ ﻟﺤﻤ‬
‫ﺑﻌﺪ ﺇﻟﯩﺈﺭﺳﺎﻻﻟﺒﺮﻳﺪ ﺍﻟﻤﺰﻋﺠﺄﻭ‬
‫ﺍ ﻟﻤ ﺸﺎﺭﻛﺔ ﻓ ﻴ ﻮﺯﻋ ﺘﺈﻧ ﻜﺎﺭ ﻣ ﻨﺎ ﻟﺨﺪ ﻣﺔ ﺍ ﻟﻬﺠﻤﺎﺕ‬
‫‪intelli‬‬ ‫‪propag gence‬‬
‫ﺃ ﻭ ﺟﻬﺄ ﺩ ﻭﺍﺗﺈ ﻟﯩﻴﺒﻴ ﻌﺈ ﻟ ﯩﺎ ﻟﺤ ﻜ ﻮ ﻣﺔ‬ ‫ﻮﻻﺗﻮ‬
‫ﻭﺍ ﻟﻘﺎﻧ ﻮﻧﺈﻧﻔﺎ ﺫ‬
‫‪.‬‬
‫ﺃﻗﻞ ﻫﺬﻫﺸﺒﻜﺎﺗﻬﻠﻢ ‪ 114‬ﻋﻠﯩﺎﻟﻤﻮﺍﻗﻊ‬ ‫‪uch‬‬ ‫ﻭﻛﺎﻻﺕ ﻭﺳﻄﺎﺀ‪،‬ﻋﻨﺪﻣﺎﻫﻤﻔﻌﻠﻤﺜﻼﻟﻤﺸﺘﺮﻳﻦ‪،‬‬ ‫‪.‬‬
‫ﻣﺜﻴﺮ ﻟﻺﻋﺠﺎﺑﺈ ﻟﯩﺘﺤ ﻜﻤﻤﻨﺔﺍﻟﻤﺸﺘﺮﻳﻦ‪،‬ﻻﻥ‬
‫ﻫﻤﻼﺗﺰﻭﺩﺍﻻﻟﻤﺮﺍﻗﺒﺔﺃﻭﺗﺪﺧﻞ‬
‫‪o -often‬‬
‫ﻋﻤﻠﻤﻊ ﻳﻤ ﻠ ﻜﺎ ﻟ ﻜ ﺜ ﻴﺮ ﺃﻛ ﺒﺮ ﺍ ﻟﻤ ﻴﺰ ﺍﻧ ﻴﺎﺗﺖ‬
‫ﺩ ﻓ ﻌﺨﺎﺭ ﺟ ﻜ ﺒ ﻴﺮ ﺧ ﻴﺮ ﺍﺗﺈ ﻟ ﯩ ﻤ ﻜ ﺘ ﺸ ﻔ ﺴﻤ ﻌﺎﻝ‬
‫‪.‬‬
‫ﺍﻟﺪﺍﻻﺗﻬﺆﻻﺀﺍﻟﻤﺸﺘﺮﻳﻨﺎﻟﺒﺤﺚ ﺑﻮﺍﺳﻄﺔﺍﻟﻨﻘﻴﺾ ﻣﻦ ﺫﻟﻚ‪،‬‬ ‫ﻧ ﻴ ﺔ ﻣ ﻨ ﻴ ﺒ ﻴ ﻌ ﻤ ﻨ ﻬ ﻤ ﻠ ﻠ ﺤ ﺼ ﻮ ﻝ ﻋ ﻠ ﯩ ﻮ ﺣ ﺘ ﯩ ﺄ ﻋ ﻠ ﯩ ﺎ ﻟ ﺤ ﺪ ﻳ ﺪ ﺩ ﺇ ﻃﺈ ﻟﻰ‬
‫ﺍ ﻟﺠﻨﺎﺋﻴﺔﻣﺠ ﻤ ﻮ ﻋﺎﺗﻬ ﻠ ﺘ ﺴ ﻌ ﯩ ﺘﺄﺛ ﻴﺮ ﺃ ﻭ‬ ‫‪.‬‬ ‫‪poc‬‬
‫ﻫﺬﻫﺎﻟﺠﻬﺎﺕ ﺍﻟﻔﺎﻋﻠﺔﻓﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷ ‪125‬ﺍﻟﻤﺸﺘﺮﻳﻨﻤﻌﺄﻋﻤﻖ ﻛﻴﺘﺲ‬
‫‪،‬ﺗﺼﺎﺩﻣﻌﻠﯩﺎﻛﺒﻴﺮﻣﻘﻴﺎﺳﻤﻌﺎﻟﺤﺪ ﺍﻷﺩﻧﯩﺎﻻﺳﺘﺜﻤﺎﺭ‬ ‫ﺣﻴﺎﻥ‬
‫‪c‬‬ ‫ﻟ ﻜﻨﻔ ﻌ ﻠ ﻠﻴ ﺴﺎ ﻟﻬﺪ ﻓﺈ ﻟﻰ‬ ‫‪ollect‬‬ ‫ﺃ ﻳ ﻀ ﺎ ﺍ ﺳ ﺘ ﻜ ﺸ ﻔ ﺄ ﻭ ﺑ ﻨ ﺎ ﺀ ﻫ ﻤ ﻴ ﻤ ﺘ ﻠ ﻜ ﺎ ﻟ ﻤ ﻨ ﺘ ﺠ ﺎ ﺗ ﻠ ﻠ ﺤ ﺼ ﻮ ﻝ ﻋ ﻠ ﯩ ﺴ ﺎ ﻟ ﺒ ﻴﺮ ﺓ‬
‫ﺿﺨﻤﺔﻣﺒﺎﻟﻐﻤﻨﺎﻻﺳﺘﺨﺒﺎﺭﺍﺗﻔﻴﺎﻟﻨﻔﺲ‬ ‫‪.‬‬
‫ﺃ ﻭ ﻟﻺﻳﺠﺎﺭ ﺇ ﻟﯩﺎ ﻟﺰﺑﺎﺋﻦ ﻫﺬ ﻫﺘ ﻀﻤﻨﺒ ﻌ ﻀﻤﻨﺎﻝ‬
‫‪.‬‬
‫ﺳﻨﺘﺄﻧﻬﻞ ﺍ ﻟﻄﺮﻳ ﻘ ﻤ ﺜ ﻼ ﻟﺤ ﻜ ﻮ ﻣﺎﺕ‬ ‫‪produ‬‬ ‫ﺃ ﺧﺮﻯ‬ ‫‪spywar‬‬ ‫‪e‬‬
‫ﺃﻧﺘﻤﺘﺘﻤﺎﻛﺘ ﺸ ﻒ ﻣ ﻌﻈ ﻤ ﺴ ﻴ ﺌﺔ ﺍ ﻟ ﺴ ﻤ ﻌﺔ‬
‫‪-‬‬
‫ﻣﻨﺘﺸﺮﻓﻴﺎﻻﻷﺳﻮﺩﺳﻮﻗﻬﻼﻟﺒﺮﻣﺠﻴﺎﺕ ﺍﻟﺨﺒﻴﺜﺔ‪ ،‬ﻛﻤﺎ ﺃ‬ ‫ﻓﻴﺎﻻﻟﺒﺮﻳﺔﺑﻮﺍﺳﻄﺔﺍﻷﻣﻨﺎﻟﺒﺎﺣﺜﻮﻧﻮﺗﺎﻟﻌﺒﻮﺍﺕ ﺍﻟﻨﺎﺳﻔﺔﺇﻟﻰ‬
‫‪.‬‬
‫ﻭ ﻧﻘﻄﺔ ‪ ،‬ﺍ ﻟﺨﺪﻣﺔﻧﻤﺎ ﺫﺝ‬ ‫‪- -click‬‬ ‫‪easy-‬‬
‫ﺃﺩﻭﺍﺕ‪،‬ﻭ‬ ‫ﺇ ﻟﻰ‬ ‫‪.trovicor‬‬ ‫•‬ ‫‪.‬‬
‫ﻫﺬ ﻫﺎ ﻟ ﻮ ﺳﻄﺎﺀ ﺍ ﻟ ﺸﺮﻛﺎﺕ ﺃﻋﺠ ﺒ ﺘ ﻚ‬
‫ﻳﻤﻴﻼ‬ ‫‪-technically‬‬ ‫ﺍﻟﺒﺤﺜﻌﻠﻰ ﺍﻻﻧﺘﺮﻧﺘﺪﺭﻭﺳﺄﻧﺎﻟﺴﻤﺎﺣﺄﻗﻞ‬ ‫)‬ ‫ﻭ‪ 126‬ﺳﺎﺑﻘﺎﺟﺰﺀﻣﻨﺴﻴﻤﻨﺰ‬ ‫(‬
‫ﻟﺠﻬﺎﺕ ﺍ ﻟﻔﺎﻋ ﻠﺔﺇ ﻟﯩﺠﻌﻼﺳﺘﻌﻤﺎ ﻟﻤﻨﻨﻘﺎﻁ ﺍ ﻟﻀﻌﻔﻮ ﻗﻢ‬ ‫‪amesys g‬‬ ‫ﻳﺒﻴﻌﻬﺬﻫﺎ ﻟﻤ ﻠ ﻜﻴﺔﺃﺩﻭﺍﺗﺈ ﻟﻰ ‪127‬‬ ‫‪overnment‬‬ ‫‪،‬ﺍﻟﻌﻤﻼﺀ‬
‫ﺑﺘﻮﺳﻴﻌﺎ ﻟ ﺴﻮ ﻗﺈ ﻟﯩﺘﻀﻤﻨﺎ ﻟﻌﺪﻳﺪ‬ ‫ﻣﻦ ﺿﻤﻨﻬﺎ‬
‫‪.‬‬ ‫‪115‬ﻣﻨﺎﻟﻤﺰﻳﺪﺃﻧﻮﺍﻋﻤﻨﺎﻟﻤﺸﺎﺭﻛﻴﻦ‬ ‫‪.‬‬ ‫‪.‬‬ ‫•‬
‫ﺍ ﻟﻘﻤ ﻌ ﻴﺔ ﺃﻧﻈﻤﺔ ﺃﻋﺠ ﺒ ﺘ ﻚ ﺍ ﻟ ﺒﺤﺮﻳﻦ ‪ ،‬ﻟ ﻴ ﺒ ﻴﺎ ‪ ،‬ﻭ ﺳ ﻮﺭﻳﺎ‬

‫ﻣﻦ ﺍﻟﺬﯨﺎﻟﻮﻻﻳﺎﺕ ‪،‬ﻋﻠﻰ ﻋﻜﺴﺎﻟﺤﻜﻮﻣﺎﺕ‬ ‫ﻛ ﻴ ﻔ ﻬ ﻤ ﻴ ﻨ ﺒ ﻐ ﻴ ﻜ ﻨ ﻴ ﻨ ﻈ ﻤ ﻴ ﻜ ﻮ ﻧ ﺎ ﺧ ﻼ ‪ r‬ﻭ ﺳ ﻮ ﺍ ﺀ ‪، o‬ﺍ ﻟ ﺪ ﻭ ﺭ ﻣ ﻨ ﻮ ﺳ ﻄ ﺎ ﺀ‬


‫ﺍ ﻟﻤﺘﺤﺪﺓ‬ ‫‪ually‬‬ ‫‪،‬ﺍ ﻟﺪ ﻓﺎﻉ ‪،‬ﻳﺸﺘﺮﯨﺄﺩﻭﺍﺗﻤﺴﺘﻌﻤﻠﺔﺇ ﻟﯩﺎ ﻟﻬﺠ ﻮﻡ‬ ‫ﻓﻴﺔﻣﻮﺿﻮﻋﻤﻦ ﺑﻴﻨﺨﺒﺮﺍﺀﻓﻴﺎﻻﻟﻤﺠﺎﻝ‪.‬ﺑﻌﻀﺎﻟﺸﺮﻛﺎﺕ‪•،‬‬
‫ﺃ ﻭ ﺟﻤ ﻌﻤﻌﻠﻮﻣﺎﺗﻌﻠﯩﺎﻷﻫﺪﺍﻑ‪،‬ﺍﻟﻌﺪﻳﺪ ﻣﻨﺄﺩﻭﺍﺗﺘﻢ‬ ‫‪.netragard‬‬ ‫‪،‬ﺃ ﻋ ﺠ ﺒ ﺘ ﻚ‬
‫ﺍﻟﻤﺤﺪﻭﺩﺓﻫﻤﺴﺎﻟﺴﺈﻟﯩﺎﺍﻟﻤﺆﻛﺪﻗﺎﺋﻤﺔ ‪128‬‬
‫ﺍ ﻟ ﺒ ﻴ ﻌﺈ ﻟ ﯩﺎ ﻟﺠ ﻨﺎﺋ ﻴﺔ ﺍ ﻟﺠﻬﺎﺕ ﺍ ﻟ ﻔﺎﻋ ﻠﺔ ﺍ ﻟﻬﺪ ﻓﺈ ﻟ ﯩ ﻤﺄﻙ‬
‫ﺍ ﺍ ﻟﺮﺑﺤ ﻠ ﻠﺤ ﺼ ﻮﻝ‬ ‫ﻣﻨﺒﻠﺪﺍﻧﻔﻴﻌﻠﯩﻤﺤﺎﻭﻟﺔﺇﻟﯩﺎﻟﺤﻔﺎﻇﺎﻟﻴﻔﺸﻤﻨﺸﺮﻋﻴﺔ‪.‬ﺍﻵﺧﺮﻳﻦ‬
‫‪.‬‬
‫ﻋ ﻠﯩﺎ ﻟﻤﺠﻤ ﻮﻋﺎﺗﺒﺎﺳﺘﺨﺪ ﺍﻣﻤﻨﻬﻢ ﻫﺬ ﻫﺎ ﻟﻤ ﺸﺘﺮﻳﻨ ﻌ ﻠﻰ‬ ‫‪ •،‬ﺃﻋﺠﺒﺘﻚ‪،.vupen‬ﻫﻸﻗﻠﺨﺎﺹ‬
‫‪z‬‬ ‫ﺗﺤﻤﻞ‬ ‫‪cannot‬‬ ‫ﺍﻟﻌﻤﻮﻡ‬ ‫‪ero‬‬‫ﻳ ﻮﻣﺎ ‪ ،‬ﻟ ﻜﻨﺒﺪﻻ ﻣﻦ‬
‫ﺫﻟﻜﻌﻤ ﻠﻴﺔ ﺍ ﻟ ﺸﺮ ﺍﺀ ﺍ ﻟﺒﺮﻣﺠﻴﺎﺕ‬
‫‪/‬‬ ‫‪k‬‬
‫ﺃ ﻭﻳ ﺴ ﺘ ﻐﻞ ﺩﻭﺭﺗﻬﺎ ﺍ ﻟﺨ ﺒ ﻴ ﺜﺔﺑﺮ ﺍ ﻣﺠ ﻮ‬

‫‪:‬‬
‫ﺇﻋﺎﺩﺓﺍﻟﻀﻌﻔﺎﻟﻨﻈﺎﻡ ﺍﻟﺒﻴﺌﻴﻮﺩﻭﺭﺗﻬﺎﺳﻴﺎﺳﺔﺁﺛﺎﺭ ﺍﻷﺧﻄﺎﺀﻓﻴﺎﻟﻨﻈﺎﻡ‬ ‫‪17‬ﺍﺍﻟﺘﻤﻬﻴﺪﻳﻌﻠﯩﺎﻝ‪softwa‬‬
‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪197.53.153.65‬‬‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬
‫ﻭ ‪ ،129‬ﺣﻮﻟﻤﻦ ﺍﻟﺬﯨﻬﻤﻬﻠﺮﺍﻏﺒﺈﻟﯩﻴﺒﻴﻌﺖ‬ ‫‪o‬‬ ‫ﻣﺜﻼﻣﺎﻟﻴﺎﻛﻔﺎﺀﺓ‬ ‫‪vrps‬‬ ‫ﺍ ﻟ ﺒﺎﺋ ﻌ ﻴ ﻨ ﺘ ﻌﺮ ﻑ‬
‫ﻫﻤﺄﺩﻭﺍﺗﻴﻤ ﻠ ﻜﺘﺤﻮ ﻟﺘﻔﻮ ﻗﻔﻴﺎ ﻟﻤ ﻠ ﻜﻴﺔﻣﻦ‬ ‫"‬
‫ﻳ ﻌﻨﻴﺈ ﻟﻰ ﻣ ﺴﺎﻋﺪﺓﺗﺠﺪﻧﻘﺎﻁ‬
‫‪،‬ﻣﻦ ﺍ ﻟﺬﻯ‬ ‫‪.adrieldesautels‬‬ ‫ﻣ ﺸ ﻜ ﻮﻛﺎ ﻟﺤ ﻜ ﻮﻣﺎﺕ‬ ‫‪secur‬‬
‫ﺇﻳﺘﻴﻔ ﺮ ﻗ ﻴ ﻤ ﻠ ﻜ ﺎ ﻓ ﺘ ﻘ ﺪ‬ ‫‪،‬ﺍ ﻟ ﻀ ﻌ ﻔ ﻬ ﻤ ﻴ ﻤ ﺘ ﻠ ﻚ‬
‫"‬ ‫‪netragard‬‬
‫‪،‬ﻳﻘ ﻮ ﻟ ﻮ ﻗﺎﻝ ﺍﻧﻬﻴ ﻌﺮ ﻓﻤﻦ ﺍ ﻟﺠ ﺸ ﻌ ﻮ‬ ‫ﻳﺪﻳﺮ‬ ‫ﺇﺩﺍﻧﺘﺒﺎﻩ‬ ‫‪increas‬‬ ‫ﺳﺤﺐ‬
‫"‬ ‫‪"w‬‬
‫ﺳ ﻮﺀﻳ ﺒ ﻴ ﻌﺈ ﻟ ﯩﺄﻱ ﺷﺨ ﺺ ‪ ،‬ﺍ ﻟ ﻨ ﺎ ﺳ ﻤ ﻦ ﺍ ﻟ ﺬ ﻯ ﻏ ﻴ ﺮ ﻣ ﺴ ﺆ ﻭ ﻝ‬ ‫‪coordina‬‬
‫ﻧ ﺸ ﻮ ﺋ ﻬ ﺎ ﻣ ﻊ ‪،‬ﺇ ﻟ ﯩ ﻬ ﻤ ﺎ ﻟ ﻤ ﻨ ﺘ ﺠ ﺎ ﺕ‬ ‫ﺗ ﺴﻬﻴﻞ‬
‫‪"ight‬‬
‫ﺇ ﻟﯩﺎ ﻟ ﻤ ﺪ ﯨ ﺄ ﻧ ﺒ ﻌ ﻀ ﻴ ﺴ ﺘ ﻐ ﻠ ﻢ‬ ‫ﻛﻨﺘﻢ ﺍ ﻟﺒﻴ ﻌﺈ ﻟﯩﺎﺛﻨﺎﻥ‬ ‫ﺍﻷﻣﻨﺎﻟﺒﺎﺣﺜﻮﻥ‪،‬ﻭﺗﺰﻭﺩﻣﺎﻟﻴﺎﻣﺪﻓﻮﻋﺔﺍﻟﺒﺎﺣﺜﻮﻧﻤﻌﻌﻠﯩﺎﻟﺒﺪﻳﻺ‬
‫"‪.‬‬
‫ﻟ ﻮ ﺃﻧﺎﺗﺄ ﺧﺬ ﺍ ﺍ ﻟﺤ ﻜ ﻮﻣﺎﺗﻤﻦ ﺍ ﻟﺬﯨﻴ ﻌﺎﺭ ﺿ ﻮﻧ ﻜﻸ ﺧﺮﻯ‬ ‫ﻟ ﯩ ﻴ ﺒ ﻴ ﻌ ﻌ ﻠﯩﺎﻝ‬
‫ﺑﻨﺪ ﻗﻴﺔ ﻭ ﺍ ﻟ ﺴﻔﻴﻨﺔ ﻓﺈﻧﻬﻔﻲ ﺍ ﻟﺨﺎﺭ ﺟﺈ ﻟﯩﺒ ﻌ ﻀ ﺸﺎﺑﻔﻴﺎ ﻟﻤﻲ‬ ‫ﺍﻷ‬ ‫‪ddle‬‬ ‫‪.‬‬
‫ﻋﻠﻰ ﻃﻮﻟﻤﻌﺎﻟﺸﺨﺼﻴﺨﻴﺮﺍﺕ‪،‬ﺍﻟﻤﻜﺘﺸﻔﻮﻧﻤﻦ ‪ 134‬ﺍﻷﺳﻮﺩﺳﻮﻕ‬
‫ﻭﺳﻄﻮﻭﻗﺎﻝ ﺍﻧﻬﺎﺳﺘﺨﺪﺍﻣﺎﺗﻔﺈﻧﻬﺈﻟﯩﺎﺫﻫﺒﺒﻌﺪ‪ ،‬ﺑﻌﺪﻣﺎﺍﻷ‬ ‫ﺍﻟﺬﯨﻬﻠﻠﻠﻐﺎﻳﺔﻧﺎﺟﺤﺔﻓﻴﺎﻟﻌﺜﻮﺭ ﻋﻠﯩﻮﺍﻹﺑﻼ‬
‫‪.‬‬ ‫‪-‬‬
‫ﻣﺮﻳ ﻜ ﻴﺔ ﺍ ﻟﻘ ﻮ ﺍﺕ ﺍﻧﻬﺎ ﺍ ﻟ ﻨ ﻔ ﺴ ﻤ ﻔ ﻬ ﻮ ﻡ‬ ‫‪ve‬‬ ‫ﻏﻬﺬ ﻫﺎ ﻟ ﻌﻴ ﻮﺑﺈ ﻟﻰ‬ ‫‪ndors‬‬ ‫ﻣﺎﻳ ﻮ ﻭ ﺣ ﺘ ﯩ ﻜ ﻨ ﻌﺮ ﺿ ﺘ ﻜ ﺎ ﻣ ﻠ ﺘ ﻮ ﻇ ﻴ ﻔ ﻔ ﻴ ﻬ ﺬ‬
‫" ‪desautels‬‬ ‫ﺑﻌﻀﺎﻟﻨﻘﺎﺩﺍﺫﻫﺒﻮﺣﺘﯩﻌﻼﻭﺓ ﻋﻠﻰ ﺫﻟﻚ‪ 130 ،‬ﻭﻗﺎﻝ‬ ‫‪.‬‬‫ﻫﺎ ﻟ ﺸﺮﻛﺎﺕ‬ ‫‪135‬‬
‫ﺍ ﺳ ﺘﺪﻋﺎﺀ‬ ‫‪soghoian aclu vupen‬‬ ‫ﻟ ﻜﺮﻳ ﺲ‬ ‫ﻣ ﻌﺎ ﻝ‬ ‫ﺍ ﺍ ﻟﻌﺼﺮ‬ ‫"‬
‫" "‬
‫ﺍ ﻟ ﺤ ﺪ ﻳ ﺜ ﺘ ﺎ ﺟ ﺮ ﻣ ﻨ ﺎ ﻟ ﻤ ﻮ ﺕ ‪ ،‬ﻳ ﺒ ﻴ ﻊ ﺇﻧﺎ ﻟﺮﺻﺎﺻ ﻠ ﻠﺤ ﺼ ﻮﻝ‬ ‫ﺍﻟﻬﺪﻓﺈﻟﯩﺎﻟﺘﺤﻮﻻﻻﻟﺜﻘﺎﻓﻴﺔﺳﺮﺩﻣﻦ ﻋﻨﺪﻭﺍﺣﺪﺃﻧﻴﻠﻘﻴﺎﻷ‪vrps‬‬
‫‪"cyberwar.‬‬ ‫‪131‬ﻋﻠﻰ‬ ‫ﻣﻨﺎﻟﺒﺎﺣﺜﻮﻧﻤﺜﻞ ‪univers‬ﺍﻟﺤﻠﻴﻒ‬
‫ﺇ ﻟ ﻰ ‪o‬ﺷ ﻤ ﺎ ﻝ ﺷ ﺮ ﻗ ﺄ ﻥ ‪ ،‬ﺍ ﻟ ﺨ ﺒ ﻴ ﺜ ﺔ ﺍ ﻟ ﻘ ﺮ ﺍ ﺻ ﻨ ﺔ ﺃ ﻭ ﺍ ﻟ ﻤ ﺠ ﺮ ﻣ ﻴ ﻦ‬
‫• ﺃ ﻋ ﺠ ﺒ ﺘ ﻚ ‪.‬ﺍ ﻟ ﺤ ﻜ ﻮ ﻣ ﺎ ﺕ ‪ ،‬ﺍ ﻟ ﻤ ﺸ ﺎ ﺭ ﻛ ﺔ ﻣ ﻦ‬ ‫ﻋﻠﻰ‪rovide‬ﻳﻌﺘﺮﻓﺄﻧﺎﻟﺒﺎﺣﺜﻮﻧﻤﺎﻳﻮ ‪p‬‬
‫ﻭﺳﻄﺎﺀ ﻓﻴﺎ ﻟﻨﻘﺎﻁ ﺍ ﻟﻀﻌﻔ ﺴﻮﻕ‬ ‫ﻧﻔ ﻴ ﺴﺎ ﻟﺨﺪ ﻣﺔ ﺇ ﻟ ﯩﺎ ﻟ ﺸﺮﻛﺎﺕ ‪ ،‬ﻭ ﺍ ﻟﻤ ﺴ ﺘﻬ ﻠ ﻜ ﻴﻦ ‪-‬‬
‫ﻳﺴﺎﻋﺪﻳﻘﻮﺩﺍﻻﻷﺳﻌﺎﺭﻓﻮﻗﺒﺸﻜﻞ ﻣﻠﺤﻮﻅ‪،‬‬ ‫‪ 138‬ﻋﻠﻰ ‪136‬ﺑﻮﺍﺳ‪137‬ﻄﺔﻣﺴﺎﻋﺪﺓﺇﻟﯩﺠﻌﻼﻟﺒﺮﻣﺠﻴﺎﺗﺎﻟﻤﺰﻳﺪﺁﻣﻨﺔ‪.‬‬
‫ﺧ ﺼ ﻮ ﺻﺎﻋ ﻨ ﺪ ﻣ ﺎ ﺍ ﻟ ﻌ ﻤ ﻼ‬ ‫‪،‬ﻓﻴﺲ ﺑﻮﻙ ‪،‬ﻃﻮﻟﻤﻌﻜﺒﻴﺮ‪vrps‬ﻣﻦ ﻋﻨﺪﻣﺎﻳﻜﺮﻭﺳﻮﻓﺖ‬
‫ﺀﻣﻨﻬﺬﻫﺎ ﻟ ﺸﺮﻛﺎﺗﻬ ﻠﺮﺍﻏﺒﺈ ﻟ ﯩﺪ ﻓ ﻌ ﻤ ﺌﺎﺗ ﻤ ﻨﺄ ﻟ ﻔ ﺴﻤﻨﺪ ﻭﻻ‬ ‫ﻫﻨﺎﻛﻬﻸﻳﻀﺎﺟﺎﺋﺰﻩ ‪، 140‬ﻭﺟﻮﺟﻞ ‪! ، 139‬ﻳﺎﻫﻮ‬
‫ﺭ ﻟ ﻠﺤ ﺼ ﻮﻝ ﻋ ﻠﻰ‬ ‫ﻭ‪141‬ﻣﺒﺎﺩﺭﺓ‪ •y‬ﺃﻋﺠﺒﺘﻚ ‪.‬ﺍﻟﺼﻔﺮ ‪،da‬ﻭﺳﻄﺎﺀ‬
‫‪.‬‬
‫ﺃﻋ ﻠﻰ ﺟ ﻮ ﺩﺓﺍ ﻟﻤﻨﺘﺠﺎﺕ ﻫﻤﻤ ﺸﺎﺭﻛﺔﻳ ﺴﺎﻋﺪ‬ ‫ﺃﻧﻌﻤﻠﻴﺔ ﺍﻟﺸﺮﺍﺀﻣﻌﻠﻮﻣﺎﺗﺄﺑﻮﺕ‪hackerone،142‬‬
‫ﺇ ﻟﯩﺎ ﻟﺤﻔﺎﻇﺎ ﻟ ﻜﺒﻴﺮﺍ ﻟﺘﻔﺎﻭﺗﻤﺎ ﺑﻴﻨﻤﺎﺫﺍ‬ ‫ﺗﺰﻭﺩﺍ ‪termediaries‬ﻫﺬﻫﻔﻲ ‪.‬ﻧﻘﺎﻁ ﺍﻟﻀﻌﻒ‬
‫ﺍ ﻟ ﻀ ﻌﻔﺎ ﻟﻤ ﻜﺘ ﺸﻔ ﻮﻧﻴﻤ ﻜﻨﺎ ﻟﺤ ﺼ ﻮ ﻟﺪ ﻓ ﻌ ﻌ ﻠﯩﺎ ﻟﺮﻣﺎ ﺩﻱ‬ ‫ﺑﻮﺍﺑﺔﻟﻠﺤﺼﻮﻝ ﻋﻠﯩﺎﻹﺑﻼﻍ ‪vulnerabiliti‬ﺩﺇﻃﺈﻟﯩﺎﻟﺸﺮﻛﺎﺕ‪،‬‬
‫ﻭﻣﺎ ﺫ ﺍ ﺍﻷ ﺧﺮﯨﻢ ‪،‬ﺃ ﻭ ﺍﻷﺳ ﻮ ﺩﺳ ﻮ ﻕ‬ ‫‪ajor‬‬
‫ﺳ ﻮ ﻗ ﻤ ﺸﺎﺭﻙ‬ ‫‪-‬‬ ‫ﺗﺒﺴﻴﻄﺎﻹﺑﻼﻏﻤﻦ ﻋﻨﺪﺍﻣﺘﻨﻮﻋﺔﻏﺮﻭﻓﻮﻗﻤﻦ‬
‫ﺍ ﻟ ﺒﺮ ﻣﺠ ﻴﺎﺗﺎ ﻟ ﺸﺮﻛﺎﺕ‬ ‫‪-can‬‬ ‫"‬
‫ﺗﺤﻤ ﻺ ﻟ ﯩﺪ ﻓ ﻌﺈ ﻟ ﻰ ﻣ ﺴ ﺎ ﻋ ﺪ ﺓ ﺇ ﺻ ﻼ‬ ‫‪،‬ﺍ ﻟ ﺒ ﺎ ﺣ ﺜ ﻮ ﻥ ‪ ،‬ﺗ ﺄ ﺳ ﻴ ﺴ ﺴ ﻤ ﻌ ﺘ ﻬ ﻤ ﻠ ﻠ ﺤ ﺼ ﻮ ﻝ ﻋ ﻠ ﯩ ﺸ ﺨ ﺼ ﻴ ﺎ ﻟ ﺒ ﺎ ﺣ ﺜ ﻮ ﻥ‬
‫‪.‬‬‫ﺣﻬﻤﻴﻤﺘ ﻠ ﻜﺎ ﻟﻤﻨﺘﺠﺎﺕ‬ ‫‪o‬‬
‫ﺍ ﻟ ﻨ ﺎ ﺳ ﻤ ﻦ ﺍ ﻟ ﺬ ﯨ ﺎ ﺳﺘ ﻜ ﺸﻔﻨﻘﺎ ﻁ ﻭ ﺩ ﻓ ﻌ ﺨ ﺎ ﺭ ﺟ ﺨ ﻴ ﺮ ﺍ ﺗ ﺖ‬
‫‪.‬‬‫ﻋﺎﻟﻴﺔﺍﻟﻤﻠﻒ ‪143‬ﺍﻟﻀﻌﻔﻴﺴﺘﺤﻘﻤﻜﺎﻓﺄﺓ‬
‫ﺍ ﻟ ﺸﺨ ﺼﻴﺎ ﻟﻘﺮﺻﻨﺔﻣ ﺴﺎﺑﻘﺎﺗﻬﻸ‬
‫ﺍﻟﺒﺮﻣﺠﻴﺎﺗﺎﻟﺒﺎﺋﻌﻴﻦ‬ ‫‪ool‬‬
‫ﻣﺴﺘﻌﻤﻠﺔﺇﻟﯩﺎﻟﺘﻘﺎﻃﺎﻟﺴﻌﺔﻣﻨﺎﻷ ﺧﺮﯨﺖ‬
‫ﻣ ﻨ ﺎ ﻟ ﺒ ﺎ ﺣ ﺜ ﻮ ﻧ ﻮ ﺗ ﺸﺠﻴ ﻌﻤﻨﻬﻤﺈ ﻟﯩﺎ ﺧﺘﺒﺎﺭﻋ ﻠﻰ ﻧﻄﺎ ﻕ‬
‫ﺍ ﻟﺒﺮﻣﺠﻴﺎﺗﺎ ﻟﺒﺎﺋ ﻌﻴﻨﺘ ﺴ ﻌﯩﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔﻔﻴﻬﻢ‬ ‫‪.‬‬
‫ﻭ ﺍ ﺳ ﻌﻤ ﺴﺘ ﻌﻤ ﻠﺔ ﺍ ﻟﺒﺮ ﺍﻣﺞ ﻟ ﻠﺤ ﺼ ﻮ ﻝ ﻋ ﻠﻰ‬
‫ﻳ ﻤ ﺘ ﻠ ﻜﺎ ﻟ ﻤ ﻨ ﺘﺠﺎﺗ ﻮﺑﺎ ﻟ ﺘﺎ ﻟ ﻴﺄﻧﻬ ﻤ ﻴ ﻤ ﻜ ﻨ ﻜ ﻨ ﻤﺼﺤﺤﺔﺍ ﻟﻮ ﺟﻪ‬
‫‪:‬‬ ‫ﺍﻝ ‪،‬ﻣﺜﺎﻝ‬ ‫‪2015pwn2‬‬ ‫ﻳﻤﺘﻠﻜﺘﺤﺪﺩﻓﻌﺨﺎﺭﺝ‬ ‫‪$ 442‬‬ ‫‪،‬‬
‫ﻓﻲ ﺍ ﻟﺨﺎﺭ ﺟﺎ ﻟﺒﺎ ﺣﺜ ﻮﻧﺜﺎﺕ ﺍﻫﺎﻣﺘﺤﺪ‬ ‫‪000‬‬ ‫ﻓﻴﺨﻴﺮﺍﺗﻠﻠﺤﺼﻮﻝ ﻋﻠﯩﺤﺮﺟﺎﻷﺧﻄﺎﺀﻓﻴﻜﻸﺭﺑﻌﺔﺭﺍﺋﺪﺍﻹ‬
‫‪،‬ﺍ ﺳ ﺘ ﻜ ﺸ ﻔ ﻬ ﺆ ﻻ ﺀ ﻧ ﻘ ﺎ ﻁ ﺍ ﻟ ﻀ ﻌ ﻒ ‪ ،‬ﺑ ﺪ ﻻ ﻣ ﻦ ﺫ ﻟ ﻜ ﻤ ﻨ ﻜ ﺸ ﻔ ﺈ ﻟ ﯩ ﺎ ﻟ ﺒ ﺎ ﺋ ﻊ‬ ‫ﻧﺘﺮﻧﺘﺎﻟﻤﺘﺼﻔﺤﺎﺕ‪،‬ﻣﺜﻠﺤﺴﻨﺎﻣﺜﻠﻔﻴﻮﻳﻨﺪﻭﺯ‪،‬ﺃﺩﻭﺑﻴﻔﻼﺵ‪،‬‬
‫‪substant‬‬ ‫ﺍﻟﺮﺑﺢ ﻳﻤﻜﻨﻔﻲ ﻛﺜﻴﺮ ﻣﻦ ﺍﻷﺣﻴﺎﻧﺠﻌﻼ‬ ‫‪ial‬‬ ‫‪.‬‬‫‪144‬ﻭﺃﺩﻭﺑﻴﺎﻟﻘﺎﺭﺉ‬
‫ﺑﻮﺍﺳﻄﺔﻳﺒﻴﻌﺎﻟﻨﻔﺴﻤﻌﻠﻮﻣﺎﺗﺈﻟﯩﺎﻻﻷ‬
‫ﺳ ﻮ ﺩﺃ ﻭﺭﻣﺎ ﺩﻳﺄﺳ ﻮﺍﻕ‬ ‫‪.geer secu‬‬
‫‪،‬ﺩ ﺍ ﻥ‬ ‫‪rity‬‬
‫ﻣﺤ ﻠﻞ ﺍ ﺍ ﻟ ﻜ ﻤ ﺒ ﻴ ﻮ ﺗﺮ‬ ‫‪vrps‬‬
‫ﻭ ﺧﻄﺄ‬ ‫‪-‬‬
‫ﺍ ﻟ ﻌﺜ ﻮﺭ ﻋ ﻠﯩﻤﻨﺎ ﻓ ﺴﺔ ﺳ ﺍ ﺍ ﻟﺠﺎﻧﺐ ﺍ ﻟ ﺴ ﻠﺒﻴﻤﻦ‬
‫"]‪[f‬‬ ‫ﻭﺧﻄﺮﺇﺩﺍﺭﺓﺍﻟﻤﺘﺨﺼﺼﺔ‪،‬ﻭﻗﺎﻷﻥ‬ ‫‪pr‬‬ ‫‪ovide‬‬
‫ﻋ ﻠﯽ ﺭﻏﻤﻬﻢ ‪،‬ﻴ ﻜ ﻮﻧﺄﻥ‬ ‫ﺍ ﻟﺒﺎ ﺣﺜﻮﻧﻤﻊ‬
‫ﺃ ﻭ ﺍ ﺣ ﺴﻨﻄ ﻮﻳ ﻠﻔﻲ ﺣﻴﻦ ‪،‬ﻳﻤ ﻜﻨ ﻜﺎ ﺳﺘﻄﺎﻋﻔ ﻌﻼ ﻟ ﻀ ﻌ ﻒ‬ ‫‪informati‬‬
‫ﻋ ﻠﯩﺤ ﻮﻝ‬ ‫ﻋ ﻠﯩﺎ ﻟﺒﺪﻳﻺ ﻟﯩﻴﺒﻴﻊ‬
‫ﺍﻟﻌﺜﻮﺭ ﻋﻠﯩﻤﺜﻼﻫﻮﺍﻳﺔﻭﺍﻟﺤﺼﻮﻟﺪﻓﻌﻔﻴﺒﺎﻹﺛﺎﺭﺓﺍﻹﻧﺴﺎﻥ‪،‬‬ ‫‪bl‬‬ ‫‪ack‬‬
‫ﺍ ﻟ ﺴﻮﻕ ‪،‬ﺃﻳﻨﻬﻢ ﻧ ﻘﺎ ﻁ ﺍ ﻟ ﻀ ﻌ ﻔ ﻌ ﻠ ﯩﺎ ﻝ‬
‫ﻟ ﻜﻨﺎ ﻟﻌﺜﻮﺭ‬ ‫ﻟﻠﺤﺼﻮﻝ ﻋﻠﻰ ﻋﻠﻰ ﺍﻟﻌﻤﻮﻣﻬﻠﻠﻴﺴﻘﺎﺩﺭﺇﻟﯩﺎﻟﻤﻨﺎﻓﺴﺔﺍﻟﺪﻭﻻﺭ‬ ‫‪-‬‬ ‫‪-‬‬
‫‪vulnerabil ities‬‬ ‫ﻋ ﻠﻰ‬ ‫ﺣ ﺼ ﻠﺘﺈ ﻟﯩ ﻜﻨﺠﺪﺍﺷﺎ ﻗﺈ ﻟﯩﻔ ﻌ ﻠﻤﺜﻼ‬ ‫‪.‬‬‫ﻟﺴﻮﺀ ﺍﻟﺤﻆ‪،‬ﺍﻟﻤﻜﺘﺸﻔﻮﻧﺄﺑﺤﺜﻠﻠﺤﺼﻮﻝ ‪145‬ﻭﺯﺍﺭﺓ ﺍﻟﻌﻤﻠﻼﺭ‬
‫ﻫ ﻮﺍﻳﺔ ﻓﻴﺎ ﻟﺨﺎﺹ ﺑ ﻜﻘﻄ ﻌ ﻮ ﻗﺖ‬ ‫‪-‬‬ ‫ﻋ ﻠ ﯩﺄ ﻗ ﺼﻰ‬
‫•‬ ‫‪neede‬‬
‫ﺩ ﺇ ﻟﯩ ﻌﻤ ﻠﻔﺈﻧﻪ‬ ‫ﻳﻤﻜﻨﻚ‬ ‫‪bu‬‬ ‫‪yers‬‬
‫ﻣ ﻜﺎ ﻓﺄ ﺓ ﻣﺎﻳ ﻮﻳﻤ ﻠ ﻜﺈ ﻟ ﯩ ﻴ ﺒ ﻴ ﻌﺈ ﻟﻰ‬ ‫ﻣﻦ ﺍ ﻟﺬﯨ ﻼ‬
‫‪.‬‬ ‫•‬
‫ﺃﻋﺠﺒﺘ ﻚ ﺍ ﻭ ﻇﻴﻔﺔ ﻭ ﺍ ﻟﺤ ﺼ ﻮ ﻟﺪ ﻓﻊ ﺃﻋﺠﺒﺘ ﻚ ﺍ ﻭ ﻇﻴﻔﺔ‬ ‫‪.‬‬ ‫‪.‬‬ ‫‪er‬‬
‫ﺍ ﺍ ﻟ ﻀ ﻌ ﻒ ﻭ ﺍ ﻟ ﻄ ﻮ ﻳ ﻞ ‪،‬ﺃ ﺑ ﺤ ﺜ ﺈ ﻟ ﯩ ﺘ ﺼ ﺤ ﻴ ﺤ ﺎ ﻟ ﺨ ﻄ ﺄ‬
‫‪" r esponse‬‬
‫ﻓﻲ ‪132‬‬ ‫‪،‬ﻭﻏﻴﺮ ﺍ ﻟﻤ ﺼ ﻠﺤﺔ ‪،‬ﻳﺒﻘﯩ ﺴﺮ‬
‫ﺇﻟﯩﻤﻨﺎﻓﺴﺔﻣﻦ ﻋﻨﺪﻳﺸﺘﺮﯨﺎﻟﻤﺘﻄﻠﺒﺎﺕ ﺍﻟﺒﻴﺌﻴﺔﻓﻴﺎﻻﻟﻀﻌﻒ‬ ‫ﺍ ﻟ ﻴ ﻌ ﺪ ﺃ ﻧ ﺎ ﺗ ﻴ ﺤ ﺘ ﻔ ﻈ ﺪ ﻭﺭﺗﻬﺎ ﻗﻴﻤﺔ ﻟ ﻠﺤ ﺼ ﻮ ﻝ ﻋ ﻠﯩﻬ ﺆﻻﺀﻣﻦ‬
‫‪،‬‬‫)‪(vrps‬‬ ‫ﺍ ﻟ ﺴ ﻮ ﻕ ‪ ،‬ﺍ ﻟ ﺒ ﺎ ﺋ ﻌ ﻴ ﻨ ﻴ ﻤ ﻠ ﻜ ﺒ ﺪ ﺃ ﺇ ﻟ ﯩ ﺨ ﻠ ﻘ ﺎ ﻟ ﻀ ﻌ ﻔ ﻴ ﻜﺎ ﻓ ﺌ ﺒﺮ ﺍ ﻣﺞ‬ ‫‪.‬‬‫ﻟﻜﻨﻠﻠﺤﺼﻮﻝ ﻋﻠﯩﺎﻷﺧﻼ ‪146‬ﺍﻟﺬﯨﻨﺘﻤﻨﯩﺈﻟﯩﻴﺴﺘﻐﻠﺬﻟﻚ‬
‫ﺃﻳ ﻀﺎ ﻣ ﻌﺮ ﻭ ﻓﻤ ﺜ ﻠﺨﻄﺄ‬ ‫ﻗﻴﺔﺍﻟﻘﺮﺍﺻﻨﺔﻣﻦ ﺍﻟﺬﯨﻼﻳﺮﻳﺪﺇﻟﯩﻴﺴﺎﻫﻤﺈﻟﯩﺎﻧﻌﺪﺍﻡ ﺍﻷ‬
‫ﺍﻟﺬﻳﺪﻓﻌﺨﺎﺭﺟﺮﺳﻮﻣﺈﻟﯩﺎﻟﺒﺎﺣﺜﻮﻧﻠﻠﺤﺼﻮﻝ ‪133‬ﺧﻴﺮﺍﺕ‪،‬‬ ‫ﻣﻨﺒﻮﺍﺳﻄﺔﻳﺒﻴﻌﻌ ﻠﯩﺎ ﻟﻔﺘﺤ ﺴﻮ ﻗ ﻠ ﻜﻦ‬
‫‪.‬‬
‫ﻋ ﻠﯩﺎ ﻟﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔﺄﻧﻬﻤﺎ ﻟ ﻜ ﺸ ﻒ ﺍ ﻟ ﻌﺪﻳﺪ ﻣﻨﺎ ﻟﺒﺮﻣﺠﻴﺎﺕ‬

‫‪e‬ﻳﻮﺗﺎ‪ologyinstit‬ﻓﺘﺢ‪18techn‬‬
‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪197.53.153.65،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬
‫ﻓ ﻌ ﻠﻴﺮﻳﺪﺇ ﻟﯩﺎ ﻟﺤ ﺼ ﻮ ﻟﺒ ﻌ ﻀﺬ ﻭ ﻣ ﻌﻨﯩﺘ ﻌﺮ ﻓ ﻮ‬ ‫ﺍﻷﻣﻨﺎﻟﻤﺠﺘﻤﻊ ﻭﻧﺘﻴﺠﺔ ﻟﺬﻟﻚ‪،‬ﺍﻟﺮﻗﻢ‬ ‫‪.‬‬
‫ﺍ ﻟﺘ ﻌ ﻮﻳ ﺾ ‪ ،‬ﺧﻄﺄ ﺟﺎﺋﺰﻫﺒﺮﺍﻣﺠ ﻌﺮﺿ ﻌ ﻠﻰ‬ ‫ﻣﻨﺎ ﻟ ﺸﺮﻛﺎﺗﻤ ﻌﺠﺎﺋﺰ ﻫﺎ ﻟﺒﺮ ﺍﻣﺞ ‪،‬ﻭ ﺍﻝ‬
‫‪disclos‬‬ ‫ﻫﺎﻣ ﺸﺎﺭﻋ ﻠ ﻠﺤ ﺼ ﻮﻝ ﻋ ﻠﯩﻤ ﺴ ﺆ ﻭﻝ‬ ‫‪ure.bug-‬‬ ‫‪th‬‬
‫ﺭ ﻗﻤﻤﻨﺎ ﻟﺒﺎ ﺣﺜ ﻮﻧﻤﻦ ﺍ ﻟﺬﯨﻤ ﺸﺎﺭﻛﺔ ﻓﻲ ﻡ‪،‬‬
‫ﺟ ﺎ ﺋ ﺰ ﻫ ﺒ ﺮ ﺍ ﻣ ﺠ ﺄ ﻳ ﻀ ﺎ ﻳ ﻤ ﻠ ﻜ ﺄ ﺧ ﺮ ﯨ ﺈﻳﺠﺎﺑ ﻴ ﺘﺄﺛ ﻴﺮ ﺍﺗ ﻠ ﻠﺤ ﺼ ﻮ ﻝ‬ ‫‪.‬‬‫ﻧﺄﻣﻞ‪،‬ﻫﺬﻫﻴﻜﻮﻧﺎﺇﺷﺎﺭﺓﺃﻧﻬﺬﻩ ‪147‬ﻳﻜﻮﻧﺘﻨﻔﺠﺮ‬
‫ﻋ ﻠﯩﺎ ﻟ ﺸ ﺮ ﻛ ﺎ ﺕ ‪ ،‬ﻣ ﻦ ﺿ ﻤ ﻨ ﻬ ﺎ ﺧ ﻠ ﻘ ﺎ ﺃ ﻭ ﺿ ﺤ ﻬ ﻴ ﻜ ﻠ ﻠ ﻠ ﺤ ﺼ ﻮ ﻝ‬ ‫ﺑﺮ ﺍﻣﺠﻬ ﻠﺒﻨﺠﺎ ﺣﻤﻘﻨ ﻌﺔ ﺍ ﻟﻘﺮ ﺍﺻﻨﺔﻣﻦ ﺍ ﻟﺬﯨﻤ ﺎ ﻳ ﻮ ﻳ ﻤ ﻠ ﻜ ﺬ ﻫ ﺒ ﺈ ﻟ ﯩ ﺎ ﻟﻈ ﻼ‬
‫ﻋ ﻠﯩﻴ ﺴﺘ ﻠﻤ ﻮﺗﺘﺒ ﻌﺎ ﻟ ﻀ ﻌﻔﺎ ﻟﺘﻘﺎﺭﻳﺮ ‪،‬‬ ‫‪.‬‬ ‫‪h‬‬
‫ﻣﺠﺎﻧﺒﺈ ﻟﯩ ﻀ ﻌ ﻌ ﻠﯩﺎﺃﺑﻴ ﺾ ﻓﻴﺒﺪ ﻻ ﻣﻦ ﺫ ﻟ ﻚ‬
‫ﻭﺧﻠﻘﺎﺻﺤﺔﻋﻼﻗﺔﻣﻌﺎﻝ‬

‫ﻟﻤﺎﺫﺍ ﺍﺍﻟﺤﻜﻮﻣﺎﺗﻔﻌﻞ(ﺃﻭﺩﻭﻥ ')‪t‬‬


‫ﻛﺸﻔﺎﻟﻨﻘﺎﻁ ﺍﻟﻀﻌﻔﻬﻢ‬
‫ﺗﺠﺪﺃﻭﻳﺸﺘﺮﻯ‬

‫ﻧﻘﺎﻁ ﺍﻟﻀﻌﻔﻌﻠﻰ ‪se‬ﻋﻨﺪﻣﺎﺍﻟﺤﻜﻮﻣﺎﺕ ‪purcha‬‬ ‫‪y‬‬ ‫‪.‬‬


‫‪،‬ﻫ ﻠ ﻤ ﺼ ﺤ ﺤ ﺔ ﻓ ﻴ ﺎ ﻟ ﻨ ﻔ ﺴ ﻮ ﻗ ﺖ ﺑ ﻮ ﺍ ﺳ ﻄ ﺔ ﻛ ﺸ ﻔ ﻤ ﻨ ﻬ ﻤ ﻮ ﺿ ﻤ ﺎ ﻧ ﺎ ﻝ‬
‫ﺧﻴﺎﺭﺍﺕ ‪hree‬ﺍ ﻟ ﺴ ﻮ ﻗﻬﻤﻴﻤ ﻠ ﻜﺎ ﻟﻨﻔ ﺴﺖ‬ ‫ﻫﻤﻤﺎﻳﻮﻭﺍﻧﺘﺈﻟﯩﺎﺳﺘﻌﻤﺎﻻﻝ‬
‫ﺍﻟﺒﺎﺣﺜﻮﻥ‪:‬ﻏﻴﺮ ‪ndent‬ﻟﻠﺤﺼﻮﻝ ﻋﻠﯩﺈﻓﺸﺎﺀﻣﺜﻞ ‪indepe‬‬ ‫ﻧﻘﺎﻁ ﺍﻟﻀﻌﻔﺄﻧﻔﺴﻬﻢ‪،‬ﺳﻮﺍﺀﺇﻟﯩﺴﻠﻮﻛﺎﻟﻘﺎﻧﻮﻧﺈﻧﻔﺎﺫﺃﻭﺍﻷﺟﻨﺒﻴﺔﺍﻻ‬
‫‪،‬ﻭﻣﻊ ﺫﻟﻚ ‪.‬ﺍﻟﻜﺸﻒ ‪tial‬ﻭﻗﺪﻡ ﺍﻟﻤﺴﺎﻭﺍﺓ ‪،‬ﻛﺎﻣﻺﻓﺸﺎﺀ ‪،‬ﺇﻓﺸﺎﺀ‬ ‫‪surve‬‬ ‫ﺳﺘﺨﺒﺎﺭﺍﺕ‬ ‫‪illance‬‬ ‫‪،‬‬
‫ﻫﻤﻤﺠﻤﻮﻋﺔﻣﻨﺎﻷﺳﻮﺍﻕ ﺍﻟﻌﺎﻟﻤﻴﺔ‬ ‫ﺃﻭﻭﺣﺘﯩﻠﻠﺤﺼﻮﻝ ﻋﻠﯩﺎﻟﻬﺠﻮﻣﺎﻷﻏﺮﺍﺽ ﻣﻘﺎﺑﻠﺴﺒﻴﻞ ﺍﻟﻤﺜﺎﻝ‪،‬ﺍﻝ‬
‫ﺿ ﻐ ﻄ ﻬ ﺎ ﺗﻘ ﻌ ﻴ ﻜ ﻮﻧﺠﺪ ﺍ ﻣﺨ ﺘ ﻠ ﻒ‬
‫‪.security‬‬ ‫‪stuxnet‬‬ ‫‪u.s.‬‬
‫ﻭ ﻓ ﻠ ﺴﻄﻴﻦ ﻓ ﻴﺮ ﻭ ﺳ ﺎ ﻟ ﻤ ﺘ ﻘ ﺪ ﻣ ﺔ ﺑ ﻮ ﺍ ﺳ ﻄ ﺔ ﺍ ﻝ‬
‫ﻣﻦ ﻋﻨﺪﻫﺆﻻﺀﻣﻨﺎ ﻟﻤ ﺴﺘﻘ ﻠﺔﺍ ﻟﺒﺎ ﺣﺜﻮﻥ‬
‫ﺍﻟﺒﺎﺣﺜﻮﻧﺄﻭﺍﻷﻛﺎﺩﻳﻤﻴﺔﻗﺪﻃﻠﺒﺎﻟﻤﺼﺪﺍﻗﻴﺔﺃﻭﺳﻤﻌﺔ‬
‫'‬
‫ﻣﺘﺨ ﺼﻴﺒﻤﺮ ﺍ ﻓﻖ ﺇ ﻟ ﯩ ﺘ ﻌﻄ ﻴ ﻺ ﻳﺮ ﺍﻥ‬ ‫‪uraniu‬‬ ‫ﺱ‬
‫ﺍﻋﺘﻤﺪﻋ ﻠﯩﺄﺭﺑ ﻌﺔﺻﻔﺮ ﺍ ﻟﻴ ﻮﻣﻨﻘﺎﻁ ﺍ ﻟ ﻀ ﻌﻔﻔﻴﺎﻝ‬
‫‪di‬‬ ‫ﺳﻴﺌﺔ ﺃﻧﺎﺳﺘﻄﺎﻋﺘﺄﺗﻴﻤﻦ ﻋﻨﺪﻛﺎﻣﻞ‬ ‫‪sclosure‬‬ ‫؛‬ ‫‪.‬‬‫ﻭﻟﺬﻟﻚ‪149،‬ﻣﺎﻳﻜﺮﻭﺳﻮﻓﺘﻮﻳﻨﺪﻭﺯﺍﻟﺘﺸﻐﻴﻼﻟﻨﻈﺎﻡ‬
‫ﺃ ﻭﻫﻤﻤﺎﻳ ﻮﻳﺮﻳﺪﺗ ﻌ ﻮﻳ ﻀﺄ ﻭﺍ ﻟﻤﻬﻨﻴﺔ‬ ‫ﺍﻟﺤﻜﻮﻣﺎﺗﻴﻤﻠﻜﺈﻟﯩﻮﺯﻧﺎﻻﻷﻣﻨﻘﻴﻤﺔﻣﻦ‬
‫ﺗﻌﺮﻓﻤﻦ ﺧﻼﻻﻟﻘﺎﻧﻮﻧﻴﺔﺧﻄﺄﺧﻴﺮﺍﺗﺄﻭﺃﺧﺮﻯ‬
‫ﺇ ﻓ ﺸﺎ ﺀ ﻣ ﻘﺎﺑﻞ ﺍ ﻭ ﺿﺪ ﺍ ﻟ ﻘ ﻴ ﻤﺔ ﺃﻧﺎﺳﺘﻄﺎﻋﺘﺄﺗﻴﻤﻦ ﻋﻨﺪ‬
‫ﺍﻟﻀﻌﻔﻴﻜﺎﻓﺌﺎﻟﺒﺮﺍﻣﺞ؛ﺃﻭﻫﻤﻤﺎﻳﻮﻳﺮﻳﺪﺍﻷ‬
‫‪.‬‬ ‫ﺭ ﻭﺍﺑﻄ ﻠ ﻠﺤ ﺼ ﻮﻝ‬ ‫‪vulnerabili‬‬ ‫ﻭﺗﺨﺰﻳﻨ ﻮﺑﺎﺳﺘﺨﺪﺍﻡ‬
‫ﻛ ﺒﺮ ﺍ ﻟ ﻤ ﺎ ﻟ ﻴ ﺔ ﻳ ﻜ ﺎ ﻓ ﺌ ﻤ ﻨ ﺎ ﻟ ﺒ ﻨﻘ ﺼﺄ ﻭﺭﻣﺎ ﺩﻳﺎ ﻟ ﺴ ﻮ ﻕ ﺍ ﻟ ﺤ ﻜ ﻮ ﻣ ﺎ ﺗ ﻬ ﻠ ﻠ ﻴ ﺴ ﺘ ﺴ‬
‫‪.‬‬ ‫‪.‬‬
‫ﻋﻠﯩﻬﻤﻴﻤﺘﻠﻜﺎﻷﻏﺮﺍﺽ ﻣﺜﻠﻨﺤﻨﻤﻨﺎﻗﺸﺔﺃﺩﻧﺎﻩ‪،‬‬
‫ﻌﯩﺄﻳﻤﻨﻬﺬﻫﺎﻷﺷﻴﺎﺀ‬
‫ﺃﻳﺎﻟﺤﻜﻮﻣﻴﺔﻋﻤﻠﻴﺔﻟﻠﺤﺼﻮﻝ ﻋﻠﯩﺼﻨﻌﻤﻦ ﻫﺬﺍ ﺍﻟﻘﺒﻴﻠﻘﺮﺍﺭﺍﺕ‬ ‫‪-‬‬
‫ﺍ ﻟﺤ ﻜ ﻮﻣﺎﺗﻴﻤ ﻠ ﻜﺎﻣﺠﻤ ﻮﻋﺔﻣﻨﻔﺮﻳﺪ ﺓ ﻣﻦ‬ ‫‪u .s.‬‬
‫‪ ،‬ﻓﻴﺎﻝ‬
‫ﻫﻢ‪148‬ﻧﻮﻋﻬﺎﺣﻮﺍﻓﺰﺇﻟﯩﺎﺣﺘﻔﻈﻤﻌﻠﻮﻣﺎﺗﺤﻮﻟﻨﻘﺎﻁ ﺍﻟﻀﻌﻔﺴﺮﻳﺔ‪.‬‬ ‫ﺍﻻﻟﺤﻜﻮﻣﺔﺍﻟﻤﻜﺎﻟﻤﺎﺗﻔﺈﻧﻬﺎﻝ‬ ‫‪"vulnerability‬‬ ‫ﺍﻷﺳﻬﻤﻌﻤﻠﻴﺔ‬
‫ﻣﺎﻳ ﻮﻳﺮﻳﺪ ﺇ ﻟ ﯩﺎ ﺣ ﺘ ﻔﻈﺎ ﻟ ﻌﺎ ﻣﺔ ﻭ ﻫ ﻤ ﻴ ﻤ ﺘ ﻠ ﻜﺄﻧﻈ ﻤﺔ ﺁﻣﻨﻤﻦ‬ ‫‪" -ideally‬‬
‫‪150‬‬ ‫ﺳ ﻮ ﻓ ﻜ ﻨ ﺒ ﻮ ﺿ ﻮ ﺣ ﻮﻋ ﻼﻧ ﻴﺔ‬
‫ﻋﻨﺪﺳﻴﺌﺔﺭ ﻓﺎ ﻗﺎﺳﺘ ﻐﻼ ﻟﻬ ﺆﻻﺀﻧﻘﺎﻁ ﺍ ﻟ ﻀ ﻌ ﻒ ‪،‬‬ ‫‪stakeh‬‬
‫‪،‬ﺗﻌﺮﻳﻒ‬ ‫ﺳﻮ ﻓﺘﻨﻄﻮﻳﺎ ﺟﻤﻴﻊ ﺃﻧﺤﺎﺀﻧﻄﺎ ﻗﻤﻦ‬ ‫‪olders‬‬ ‫‪،‬‬
‫‪.‬‬‫ﻭ ﺳ ﻮ ﻓ ﻜ ﻨ ﺒ ﻘ ﻮ ﺓ ﻭ ﺯ ﻧ ﺘﻴﺪ ﻓﻴ ﻠ ﺼﺎ ﻟﺤﻤﻨﺎ ﻟ ﻜ ﺸ ﻒ‬

‫‪:e‬‬
‫ﺍﺍﻟﺘﻤﻬﻴﺪﻳﻌﻠﯩﺎﻻﻟﺒﺮﻣﺠﻴﺎﺗﺎﻟﻀﻌﻒ ﺍﻷﺧﻄﺎﺀﻓﻴﺎﻟﻨﻈﺎﻡ‬ ‫‪19‬ﻭﺩﻭﺭﺗﻬﺎﺳﻴﺎﺳﺔﺁﺛﺎﺭ‪cosystem‬‬
‫ﻫﺬﻫﺎﻟﻤﺤﺘﻮﯨﺘﺤﻤﻴﻠﻤﻦ ﻋﻨﺪ‬
‫‪197.53.153.65‬‬‫‪202419:04:12+00: 00‬ﻳﻨﺎﻳﺮ‪25‬ﻋﻠﯩﺎﻟﺨﻤﻴﺲ‪،‬‬
‫ﺷﺮﻭﻁ ‪.jstor.org /‬ﺣﻮﻝ‪https: //‬ﻛﻼﺳﺘﻌﻤﺎﻟﻤﻮﺿﻮﻋﺈﻟﻰ‬

You might also like