Our website uses cookies. For some of them we need your consent. Edit consent...

MoD Library and Information System

Search the digital library catalog
  • (Pomoč)
  • A-
  • A+
  • English (UK)
  • Slovenščina

Query: search in
search in
search in
search in
Work type: * old and bolonia study programme
Language:
Search in:
Options:
  Reset


1 - 4 / 4
First pagePrevious page1Next pageLast page
1.
Asymmetric warfare threats in Greece
John M. Nomikos, 2020

Abstract: One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorismorganized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community.
Found in: ključnih besedah
Summary of found: ...Greece, asymmetric warfare, cyber-security, human trafficking, migration... ...states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses...
Keywords: Greece, asymmetric warfare, cyber-security, human trafficking, migration
Published: 07.10.2020; Views: 3416; Downloads: 15
.pdf Fulltext (641,33 KB)

2.
Protecting critical infrastructure and critical information infrastructure
Henrik Beckvard, 2022

Abstract: Regardless of how you define critical infrastructure, and critical information infrastructure as part of it, these are elements necessary for the functioning, integrity and security of a digitised society. Mapping what is critical (information) infrastructure and assessing the risks and hazards to it is a first step towards protection, along with a risk decision to either mitigate, remediate or accept the risk. For the protection of critical (information) infrastructure it is necessary to coordinate efforts and collaboration between sectors, which are often interdependent. Public-PrivatePartnerships (PPP) and cooperation within organizations such as NATO and the EU are essential.
Found in: ključnih besedah
Summary of found: ...ence, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy...
Keywords: resilience, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy
Published: 06.07.2022; Views: 2079; Downloads: 23
.pdf Fulltext (356,72 KB)

3.
Editorial
Jacob Galbreath, 2022

Found in: ključnih besedah
Summary of found: ...armed forces, defence politics, cyberspace, cyber operations, security chalenges...
Keywords: armed forces, defence politics, cyberspace, cyber operations, security chalenges
Published: 11.07.2022; Views: 2235; Downloads: 35
.pdf Fulltext (284,96 KB)
This document has many files! More...

4.
Cyber threats and security challenges in the Hungarian financial sector
Tamás Somogyi, Rudolf Nagy, 2022

Abstract: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards.
Found in: ključnih besedah
Keywords: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks
Published: 11.10.2022; Views: 1464; Downloads: 35
.pdf Fulltext (466,99 KB)

Search done in 0 sec.
Top
www.mo.gov.si Colophon   | Cookie settings Top