1. Vpliv informacijskega sistema poveljevanja in kontrole na uspešnost procesa poveljevanja in kontrole v SV : magistrska nalogaMarko Šterbenc, 2010 Found in: ključnih besedah Summary of found: ...vizualizacija, izmenjava informacij, MIP, command and control, information system, effectiveness, measurement of effectiveness, interoperability, visualis... Keywords: poveljevanje in kontrola, informacijski sistem, uspešnost, merjenje uspešnosti, interoperatibilnost, vizualizacija, izmenjava informacij, MIP, command and control, information system, effectiveness, measurement of effectiveness, interoperability, visualisation, information sharing, MIP Published: 26.04.2012; Views: 9622; Downloads: 45
Fulltext (0,00 KB) |
2. The EU-NATO partnership and ensuring information security and cybersecurityDamjan Štrucl, 2021 Abstract: The EU and NATO are important political and security organizations in a global environment. The development of ICT and the new challenges of the contemporary security environment have led to the signing of a joint EU-NATO declaration. Both organizations are aware of their roles, and of the importance of working together to ensure security, especially as security challenges, risks, and threats are intertwined with both virtual and physical space. With this paper, we wish to analyze the EU-NATO strategic partnership in ensuring security and defence in the contemporary security environment, based on a joint statement from 2016. Found in: ključnih besedah Keywords: NATO-EU cooperation, security environment, information environment, cybersecurity, cyberspace Published: 10.08.2021; Views: 4552; Downloads: 11
Fulltext (355,31 KB) |
3. The cognitive aspects of Europeʼs security and defence challengesIgor Senčar, 2021 Abstract: The European post-Cold War order was based on a pan-European consensus that democracy was the only source of legitimacy % until the Kremlin opposed the realization of a Europe whole, free and at peace with itself. There has been a paradigm change from cooperation to systemic competition. Russian revisionism poses the greatest security threat to Europe. The nature of the threat was realized rather late. The assault on the post-Cold War order was not just a classic war, which relies on hard power; instead, the war also took place in the cognitive sphere, which represents a particular challenge for open, democratic societies. Furthermore, it was also a normative assault. An effective response requires a mental shift and the strengthening of cognitive resilience as well as solidarity as the key foundations of security. Found in: ključnih besedah Summary of found: ...cognitive resilience, European Union, information warfare, normative conflict, revisionist power... Keywords: cognitive resilience, European Union, information warfare, normative conflict, revisionist power Published: 18.10.2021; Views: 5178; Downloads: 44
Fulltext (293,86 KB) |
4. Russian aggression on UkraineDamjan Štrucl, 2022 Abstract: The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze the implementation of cyber operations of the Russian Federation as observed in the case of its military aggression against Ukraine and the potential global impact of cyberspace in armed conflict for the future. Found in: ključnih besedah Summary of found: ...cyberspace, hybrid operations, information operations, cyber operations, cyber attacks, Russian Federation,... Keywords: cyberspace, hybrid operations, information operations, cyber operations, cyber attacks, Russian Federation, Ukraine Published: 08.07.2022; Views: 4489; Downloads: 41
Fulltext (594,23 KB) |
5. Cyber threats and security challenges in the Hungarian financial sectorTamás Somogyi, Rudolf Nagy, 2022 Abstract: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards. Found in: ključnih besedah Summary of found: ...banking industry, which demonstrates the importance of information security in this sector. The goal of... Keywords: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks Published: 11.10.2022; Views: 3612; Downloads: 36
Fulltext (466,99 KB) |
6. Planning for strategic information operationsLawrence E. Cline, 2024 Abstract: Strategic information operations (IO) have normally been viewed as an issue above the military level. Nevertheless, they are critical both in shaping the larger operational environment and in providing a strategic initiative short of war. As such, they are crucial for military strategists. Also, in most Western countries, the focus has been on defensive measures against opponents’ IO efforts. Such a defensive mindset is unlikely to succeed. Some long-term patterns and lessons learned in IO provide a useful template for both defensive and offensive IO campaigns. Found in: ključnih besedah Keywords: information operations, disinformation, information warfare, political warfare Published: 20.08.2024; Views: 1428; Downloads: 8
Fulltext (425,51 KB) |