1. Asymmetric warfare threats in GreeceJohn M. Nomikos, 2020 Abstract: One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorismorganized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community. Found in: ključnih besedah Summary of found: ...Greece, asymmetric warfare, cyber-security, human trafficking, migration... ...states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses... Keywords: Greece, asymmetric warfare, cyber-security, human trafficking, migration Published: 07.10.2020; Views: 4361; Downloads: 15 Fulltext (641,33 KB) |
2. Protecting critical infrastructure and critical information infrastructureHenrik Beckvard, 2022 Abstract: Regardless of how you define critical infrastructure, and critical information infrastructure as part of it, these are elements necessary for the functioning, integrity and security of a digitised society. Mapping what is critical (information) infrastructure and assessing the risks and hazards to it is a first step towards protection, along with a risk decision to either mitigate, remediate or accept the risk. For the protection of critical (information) infrastructure it is necessary to coordinate efforts and collaboration between sectors, which are often interdependent. Public-PrivatePartnerships (PPP) and cooperation within organizations such as NATO and the EU are essential. Found in: ključnih besedah Summary of found: ...ence, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy... Keywords: resilience, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy Published: 06.07.2022; Views: 3167; Downloads: 24 Fulltext (356,72 KB) |
3. EditorialJacob Galbreath, 2022 Found in: ključnih besedah Summary of found: ...armed forces, defence politics, cyberspace, cyber operations, security chalenges... Keywords: armed forces, defence politics, cyberspace, cyber operations, security chalenges Published: 11.07.2022; Views: 3409; Downloads: 35 Fulltext (284,96 KB) This document has many files! More...
|
4. Cyber threats and security challenges in the Hungarian financial sectorTamás Somogyi, Rudolf Nagy, 2022 Abstract: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards. Found in: ključnih besedah Keywords: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks Published: 11.10.2022; Views: 2621; Downloads: 35 Fulltext (466,99 KB) |
5. Avoiding a ‘Digital 7 October’Tal Pavel, 2024 Abstract: On 7 October, 2023, the Palestinian militant group Hamas launched a massive combined offensive against Israel. Concurrent with the kinetic attacks, various cyber threat actors attributed to Hamas, Hezbollah, Iran, and Russia initiated cyberattacks targeting Israeli information systems across commercial, industrial, and governmental sectors. This paper analyses these cyberattacks, as well as Israel's cybersecurity countermeasures. Key findings indicate that while Israel was able to withstand the »Digital 7 October« onslaught from cyber attacker, the attacks demonstrated the potential to significantly impact and damage different institutions; the need for a fundamental shift in defining cyber defence and resilience, especially regarding the civil society and infrastructure, in Israel and worldwide. Found in: ključnih besedah Summary of found: ...Israel. Concurrent with the kinetic attacks, various cyber threat actors attributed to Hamas, Hezbollah, Iran,... Keywords: Hamas, hybrid warfare, cyber security Published: 26.11.2024; Views: 92; Downloads: 3 Fulltext (433,16 KB) |