Our website uses cookies. For some of them we need your consent. Edit consent...

MoD Library and Information System

Search the digital library catalog
  • (Pomoč)
  • A-
  • A+
  • English (UK)
  • Slovenščina

Query: search in
search in
search in
search in
Work type: * old and bolonia study programme
Search in:

1 - 8 / 8
First pagePrevious page1Next pageLast page
Asymmetric warfare threats in Greece
John M. Nomikos, 2020

Abstract: One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorismorganized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community.
Found in: ključnih besedah
Keywords: Greece, asymmetric warfare, cyber-security, human trafficking, migration
Published: 07.10.2020; Views: 3857; Downloads: 15
.pdf Fulltext (641,33 KB)

Protecting critical infrastructure and critical information infrastructure
Henrik Beckvard, 2022

Abstract: Regardless of how you define critical infrastructure, and critical information infrastructure as part of it, these are elements necessary for the functioning, integrity and security of a digitised society. Mapping what is critical (information) infrastructure and assessing the risks and hazards to it is a first step towards protection, along with a risk decision to either mitigate, remediate or accept the risk. For the protection of critical (information) infrastructure it is necessary to coordinate efforts and collaboration between sectors, which are often interdependent. Public-PrivatePartnerships (PPP) and cooperation within organizations such as NATO and the EU are essential.
Found in: ključnih besedah
Keywords: resilience, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy
Published: 06.07.2022; Views: 2604; Downloads: 24
.pdf Fulltext (356,72 KB)

Extraterritorial jurisdiction over cyber espionage
Davide Giovannelli, 2022

Abstract: States’ practice shows that intelligence agencies have carried out not only espionage, but also other, less noble activities, such as hybrid warfare. Traditionally, international law tolerates espionage, while domestic criminal law generally allows its prosecution. However, this precarious equilibrium is changing due to the growth in cyber espionage, which allows espionage to be carried out more effectively. Not surprisingly, there is increasing interest in States’ practice, as new legal instruments for exercising extraterritorial jurisdiction over cyber espionage have been adopted. This article tries to assess whether these new legal instruments should be considered a new trend in international law, or a sporadic exercise of lawfare.
Found in: ključnih besedah
Keywords: cyber espionage, extraterritorial jurisdiction, lawfare, improper foreign influence, economic espionage
Published: 06.07.2022; Views: 2452; Downloads: 13
.pdf Fulltext (393,33 KB)

Planning for success
Christopher Young, 2022

Abstract: Training is an investment in tomorrow fueled by the needs and resources of today. It is time-consuming to build training correctly, but even more so to do it poorly. The model that NATO uses to create and evaluate its training programmes is based on accepted industry standards, but it is not necessarily being used to its full potential in the area of cyberspace. The efficacy of the model is predicated on the objective quality of the deliverables it produces, yet development initiatives are often rushed or under-supported. Current evaluative practices also do not sufficiently confirm the quality of the training produced. More careful and deliberate planning is required, not only to create valid cyber training solutions for the Alliance, but also to ensure that its cyber training achieves organizational goals.
Found in: ključnih besedah
Keywords: cyber training, efficacy, evaluation, ADDIE Model, Kirkpatrick Model
Published: 07.07.2022; Views: 2536; Downloads: 9
.pdf Fulltext (385,22 KB)

Leashing the dogs of cyber war
Tatiana Jančárková, 2022

Abstract: States have increasingly been engaged in the development of cyber capabilities which can act across the full spectrum of effects. The structures competent to deliver these effects are usually institutionally tied to armed forces or intelligence services, or represent a mixture of the two. Both types of organizations are typically subject to strict oversight and control mechanisms due to the nature of their activities and their potential to impact on the constitutional foundations of a democratic state. Yet, there is limited research available on the respective national frameworks governing offensive cyber capabilities, and similarly little information on the applicable control mechanisms. This article provides an overview of the areas of oversight, explores the challenges related to cyber capabilities, and offers possible avenues for future research.
Found in: ključnih besedah
Keywords: offensive cyber operations, human rights, rule of law, constitutional order, oversight
Published: 07.07.2022; Views: 2632; Downloads: 16
.pdf Fulltext (359,45 KB)

Russian aggression on Ukraine
Damjan Štrucl, 2022

Abstract: The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze the implementation of cyber operations of the Russian Federation as observed in the case of its military aggression against Ukraine and the potential global impact of cyberspace in armed conflict for the future.
Found in: ključnih besedah
Keywords: cyberspace, hybrid operations, information operations, cyber operations, cyber attacks, Russian Federation, Ukraine
Published: 08.07.2022; Views: 2910; Downloads: 35
.pdf Fulltext (594,23 KB)

Jacob Galbreath, 2022

Found in: ključnih besedah
Keywords: armed forces, defence politics, cyberspace, cyber operations, security chalenges
Published: 11.07.2022; Views: 2854; Downloads: 35
.pdf Fulltext (284,96 KB)
This document has many files! More...

Cyber threats and security challenges in the Hungarian financial sector
Tamás Somogyi, Rudolf Nagy, 2022

Abstract: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards.
Found in: ključnih besedah
Keywords: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks
Published: 11.10.2022; Views: 2064; Downloads: 35
.pdf Fulltext (466,99 KB)

Search done in 0 sec.
www.mo.gov.si Colophon   | Cookie settings Top