Page 131 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 131

ROBERT MIKAC, KREŠIMIR MAMIĆ, IVA ŽUTIĆ:  CYBERTERRORISM THREATS TO CRITICAL INFRASTRUCTURE: COORDINATION AND
                                      COOPERATION FROM BRUSSELS TO SOUTH-EASTERN EUROPE AND BACK

            28. Government of the Republic of Croatia (2013a). Republic of Croatia threat assessment from
               natural and technical-technological disasters and huge accidents. Retrieved March 5, 2020, from
               http://upvh.hr/wp-content/uploads/2017/02/PROCJENA-web-20.03.2013..pdf
            29. Government of the Republic of Croatia (2013b). National Strategy and Action Plan for the Sup-
               pression of the Proliferation of Weapons of Mass Destruction. Retrieved March 5, 2020, from
               https://vlada.gov.hr/UserDocsImages//Sjednice/Arhiva//71.%20-%206.pdf
            30. Government of the Republic of Croatia (2013c). Critical Protection Act. Retrieved March 5, 2020,
               from https://narodne-novine.nn.hr/clanci/sluzbeni/2013_05_56_1134.html
            31. Government of the Republic of Croatia (2010). Republic of Croatia Protection and Rescue Plan.
               Retrieved March 2, 2020, from, https://narodne-novine.nn.hr/clanci/sluzbeni/2010_08_96_2707.
               html
            32. Government of the Republic of Croatia (2008). National Strategy for the Prevention and Sup-
               pression of Terrorism. Retrieved March 2, 2020, from, https://narodne-novine.nn.hr/clanci/sluz-
               beni/2008_12_139_3896.html
            33. Heammerli, B., Renda, A. (2010). Protecting Critical Infrastructure in the EU. Brussels: Centre
               for European Policy Studies. https://www.ceps.eu/wp-content/uploads/2010/12/Critical%20Infra-
               structure%20Protection%20Final%20A4.pdf
            34. Hern, A. (2019). Cambridge Analytica did work for Leave. EU, emails confirm. The Guardian,
               30 July. Retrieved March 14, 2020, from https://www.theguardian.com/uk-news/2019/jul/30/
               cambridge-analytica-did-work-for-leave-eu-emails-confirm
            35. INA.hr (2020). Announcement Cyber-attack. 21 February. Retrieved March 12, 2020, from https://
               www.ina.hr/en/announcement-cyber-attack/
            36. Ivezić, B. (2020). Broj cyber napada lani u Hrvatskoj skočio 65 posto. Poslovni.hr, 22 January
               2020. Retrieved March 12, 2020, from https://www.poslovni.hr/sci-tech/broj-cyber-napada-lani-u-
               hrvatskoj-skocio-65-posto-361907

            37. Kirkpatrick, D., Rosenberg, M. (2018). Russians Offered Business Deals to Brexit’s Biggest
               Backer. The New York Times, 29 June. Retrieved March 14, 2020, from https://www.nytimes.
               com/2018/06/29/world/europe/russia-britain-brexit-arron-banks.html
            38. Malnar, D., Mlinac, N. (2014). Sigurnosno-obavještajna komponenta zaštite kritične nacionalne
               energetske infrastrukture Republike Hrvatske. In: S. Tatalović (Ed.), Dani kriznog upravljanja,
               Zbornik radova V. međunarodne konferencije. (pp 1007-1020). Velika Gorica: Veleučilište Velika
               Gorica. http://dku.hr/wp-content/uploads/2016/09/DKU-zbornik-radova-2014.pdf
            39. McGuinness, D. (2017). How a cyber attack transformed Estonia. BBC.com, 27 April. Retrieved
               March 14, 2020, from https://www.bbc.com/news/39655415
            40. Merriam-Webster dictionary (2020). Cyberterrorism, Retrieved March 2, 2020, from https://www.
               merriam-webster.com/dictionary/cyberterrorism#h1
            41. Mikac, R., Cesarec, I., Larkin, R. (2018). Critical Infrastructure: The platforms for a successful
               development of nations security. Zagreb: Jesenski and Turk
            42. Nakashima, E., Warrick J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say. The
               Washington Post, 2 June. Retrieved March 5, 2020, from https://www.washingtonpost.com/world/
               national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAl-
               nEy6U_story.html
            43. Pierozzi, F. (2018). EU and Cyberterrorism. Added Value or Chimera?. The Centre for Cyber Se-
               curity and International Relations, pp 1-11. https://www.cssii.unifi.it/upload/sub/eu%20and%20
               cyberterrorism.pdf


                                                                                    131
   126   127   128   129   130   131   132   133   134   135   136