11. EditorialJacob Galbreath, 2022 Found in: ključnih besedah Summary of found: ...armed forces, defence politics, cyberspace, cyber operations, security chalenges... Keywords: armed forces, defence politics, cyberspace, cyber operations, security chalenges Published: 11.07.2022; Views: 3462; Downloads: 35 Fulltext (284,96 KB) This document has many files! More...
|
12. An assessment of the impact of relations with major powers on national security: Nigeria in perspectiveOlusola Kolawole Oluwagbire, 2022 Abstract: Relations between states under the Westphalia system have been characterized either by power struggles or mutual benefits in all spheres, including politics and the military. It has been conjectured that the foreign policy objectives of major powers normally influence the national security of other states. Nigeria, a country in West Africa, is an example of such a state whose national security is believed to be influenced by its relations with the major powers. An assessment of the degree of such influence on Nigeria’s national security is the focus of this contribution. We point out that there is indeed such influence in areas such as balance of trade, military capacity, societal values and interference with Nigeria’s regional dominance. Found in: ključnih besedah Keywords: international relations, national security, Nigeria, foreign policy, major powers, geopolitics Published: 11.10.2022; Views: 2450; Downloads: 5 Fulltext (363,34 KB) |
13. Cyber threats and security challenges in the Hungarian financial sectorTamás Somogyi, Rudolf Nagy, 2022 Abstract: In recent years an increasing trend has been observed with regard to the number of cyber-attacks in the banking industry, which demonstrates the importance of information security in this sector. The goal of the present case study is to gain a better understanding of information security within critical infrastructure protection by discussing the challenges and practices of the Hungarian financial sector. First, the sector’s essential services are identified. Then, the most current sector-specific cyber threats are described, based on data collected from the relevant literature and public authority reports. The final part presents a reasonably comprehensive overview of the key points of information security and best practices based on regulations, recommendations and standards. Found in: ključnih besedah Keywords: national security, finance, Hungary, information security, cyber threat, cyber security, cyber resilience, banks Published: 11.10.2022; Views: 2671; Downloads: 35 Fulltext (466,99 KB) |
14. Climate change as a challenge to the armed forcesLászló Földi, József Padányi, 2022 Abstract: Threats to national security are becoming more and more diverse, and factors are emerging which we did not expect. In recent decades, we have increasingly perceived extreme environmental events resulting from climate change as threats. This includes natural disasters related to weather, climate and/or water (windstorms, extreme precipitation, heat waves and extreme cold, wildfires, droughts,.). Military forces are carrying out their operations while being more and more affected by difficult environmental circumstances, and in addition their use in disaster management has become indispensable in our times. In this paper, the authors examine climate-related disasters’ impact on national security and on the use of military forces. Found in: ključnih besedah Summary of found: ...Threats to national security are becoming more and more diverse, and... Keywords: mitigation, adaptation, security Published: 28.12.2022; Views: 1870; Downloads: 7 Fulltext (404,24 KB) |
15. European security through the prism of identity and international conflicts (the case of the Republic of North Macedonia)Oliver Andonov, Jana Iljeva, 2022 Abstract: The European Union, as an intergovernmental union, has been trying to create the European security identity as a reflection of the European security perception among all the Member States for more than two decades. In the implementation of this theoretical determinant in the pragmatic security policy, the question of identity at the national level and the understanding of the preservation of national security in the interstate conflicts of the European Security Area has emerged. One of the key segments of the security and identity issue is integrated in the basic interests of national security, and that is the preservation of the biological substrate for nation’s survival. The Republic of North Macedonia is facing this issue which will be discussed in paper through both the theoretical and practical aspects. Found in: ključnih besedah Keywords: international relations, Europe, North Macedonia, European security, national security, identity Published: 28.12.2022; Views: 1782; Downloads: 45 Fulltext (386,46 KB) |
16. Avoiding a ‘Digital 7 October’Tal Pavel, 2024 Abstract: On 7 October, 2023, the Palestinian militant group Hamas launched a massive combined offensive against Israel. Concurrent with the kinetic attacks, various cyber threat actors attributed to Hamas, Hezbollah, Iran, and Russia initiated cyberattacks targeting Israeli information systems across commercial, industrial, and governmental sectors. This paper analyses these cyberattacks, as well as Israel's cybersecurity countermeasures. Key findings indicate that while Israel was able to withstand the »Digital 7 October« onslaught from cyber attacker, the attacks demonstrated the potential to significantly impact and damage different institutions; the need for a fundamental shift in defining cyber defence and resilience, especially regarding the civil society and infrastructure, in Israel and worldwide. Found in: ključnih besedah Keywords: Hamas, hybrid warfare, cyber security Published: 26.11.2024; Views: 150; Downloads: 3 Fulltext (433,16 KB) |