Naša spletna stran uporablja piškotke. Za nekatere potrebujemo vašo privolitev. Uredi privolitev...

Knjižnično-informacijski in založniški center

Iskanje po katalogu digitalne knjižnice
  • (Pomoč)
  • A-
  • A+
  • English (UK)
  • Slovenščina

Iskalni niz: išči po
išči po
išči po
išči po
Vrsta gradiva: * po starem in bolonjskem študiju
Išči po:

1 - 8 / 8
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
Asymmetric warfare threats in Greece
John M. Nomikos, 2020

Opis: One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorismorganized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community.
Najdeno v: ključnih besedah
Ključne besede: Greece, asymmetric warfare, cyber-security, human trafficking, migration
Objavljeno: 07.10.2020; Ogledov: 3838; Prenosov: 15
.pdf Polno besedilo (641,33 KB)

Protecting critical infrastructure and critical information infrastructure
Henrik Beckvard, 2022

Opis: Regardless of how you define critical infrastructure, and critical information infrastructure as part of it, these are elements necessary for the functioning, integrity and security of a digitised society. Mapping what is critical (information) infrastructure and assessing the risks and hazards to it is a first step towards protection, along with a risk decision to either mitigate, remediate or accept the risk. For the protection of critical (information) infrastructure it is necessary to coordinate efforts and collaboration between sectors, which are often interdependent. Public-PrivatePartnerships (PPP) and cooperation within organizations such as NATO and the EU are essential.
Najdeno v: ključnih besedah
Ključne besede: resilience, critical infrastructure, NATO-EU cooperation, public-privatepartnerships, cyber security policy
Objavljeno: 06.07.2022; Ogledov: 2584; Prenosov: 24
.pdf Polno besedilo (356,72 KB)

Extraterritorial jurisdiction over cyber espionage
Davide Giovannelli, 2022

Opis: States’ practice shows that intelligence agencies have carried out not only espionage, but also other, less noble activities, such as hybrid warfare. Traditionally, international law tolerates espionage, while domestic criminal law generally allows its prosecution. However, this precarious equilibrium is changing due to the growth in cyber espionage, which allows espionage to be carried out more effectively. Not surprisingly, there is increasing interest in States’ practice, as new legal instruments for exercising extraterritorial jurisdiction over cyber espionage have been adopted. This article tries to assess whether these new legal instruments should be considered a new trend in international law, or a sporadic exercise of lawfare.
Najdeno v: ključnih besedah
Ključne besede: cyber espionage, extraterritorial jurisdiction, lawfare, improper foreign influence, economic espionage
Objavljeno: 06.07.2022; Ogledov: 2425; Prenosov: 13
.pdf Polno besedilo (393,33 KB)

Planning for success
Christopher Young, 2022

Opis: Training is an investment in tomorrow fueled by the needs and resources of today. It is time-consuming to build training correctly, but even more so to do it poorly. The model that NATO uses to create and evaluate its training programmes is based on accepted industry standards, but it is not necessarily being used to its full potential in the area of cyberspace. The efficacy of the model is predicated on the objective quality of the deliverables it produces, yet development initiatives are often rushed or under-supported. Current evaluative practices also do not sufficiently confirm the quality of the training produced. More careful and deliberate planning is required, not only to create valid cyber training solutions for the Alliance, but also to ensure that its cyber training achieves organizational goals.
Najdeno v: ključnih besedah
Ključne besede: cyber training, efficacy, evaluation, ADDIE Model, Kirkpatrick Model
Objavljeno: 07.07.2022; Ogledov: 2520; Prenosov: 9
.pdf Polno besedilo (385,22 KB)

Leashing the dogs of cyber war
Tatiana Jančárková, 2022

Opis: States have increasingly been engaged in the development of cyber capabilities which can act across the full spectrum of effects. The structures competent to deliver these effects are usually institutionally tied to armed forces or intelligence services, or represent a mixture of the two. Both types of organizations are typically subject to strict oversight and control mechanisms due to the nature of their activities and their potential to impact on the constitutional foundations of a democratic state. Yet, there is limited research available on the respective national frameworks governing offensive cyber capabilities, and similarly little information on the applicable control mechanisms. This article provides an overview of the areas of oversight, explores the challenges related to cyber capabilities, and offers possible avenues for future research.
Najdeno v: ključnih besedah
Ključne besede: offensive cyber operations, human rights, rule of law, constitutional order, oversight
Objavljeno: 07.07.2022; Ogledov: 2609; Prenosov: 16
.pdf Polno besedilo (359,45 KB)

Russian aggression on Ukraine
Damjan Štrucl, 2022

Opis: The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze the implementation of cyber operations of the Russian Federation as observed in the case of its military aggression against Ukraine and the potential global impact of cyberspace in armed conflict for the future.
Najdeno v: ključnih besedah
Ključne besede: cyberspace, hybrid operations, information operations, cyber operations, cyber attacks, Russian Federation, Ukraine
Objavljeno: 08.07.2022; Ogledov: 2885; Prenosov: 35
.pdf Polno besedilo (594,23 KB)

Jacob Galbreath, 2022

Najdeno v: ključnih besedah
Ključne besede: armed forces, defence politics, cyberspace, cyber operations, security chalenges
Objavljeno: 11.07.2022; Ogledov: 2829; Prenosov: 35
.pdf Polno besedilo (284,96 KB)
Gradivo ima več datotek! Več...

Cyber threats and security challenges in the Hungarian financial sector
Tamás Somogyi, Rudolf Nagy, 2022

Opis: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards.
Najdeno v: ključnih besedah
Ključne besede: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks
Objavljeno: 11.10.2022; Ogledov: 2040; Prenosov: 35
.pdf Polno besedilo (466,99 KB)

Iskanje izvedeno v 0 sek.
Na vrh Kolofon   | Nastavitve piškotkov Na vrh