Page 148 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 148
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
6 References
1. Australia-New Zealand Counter-Terrorism Committee (2015) National Guidelines for Protecting
Critical Infrastructure from Terrorism, as ANZCTC (2015), ISBN: 978-1-925290-43-1, https://
www.nationalsecurity.gov.au/Media-and-publications/Publications/Documents/national-guidelines-
protection-critical-infrastructure-from-terrorism.pdf
2. Albrecht HJ., Getoš AM. (2010) Researching Terrorism and Organized Crime in Southeast Eu-
rope. In: Benedek W., Daase C., Dimitrijević V., van Duyne P. (Eds.) Transnational Terrorism,
Organized Crime and Peace-Building. Palgrave Macmillan, London, ISBN 978-0-230-28147-9,
https://doi.org/10.1057/9780230281479_8
3. Busuncian, T. (2007) Terrorist Routes in South-Eastern Europe. Connections, Vol. 6, No. 1 (Spring
2007), pp 85-102, https://www.jstor.org/stable/26323282
4. Caşın, M. (2018) Understanding NATO’s New CIP Policies: Common Efforts and Solidarity. In
Gluschke, G., Caşın, M., Macori., M. (Eds.) (2018) Cyber Security policies and Critical Infrastruc-
ture Protection. pp 311-320, Institute for Security and Safety, ISBN 978-3-00-058988-1, https://
uniss.org/cyber-security-policies-and-critical-infrastructure-protection/
5. Coburn, A.W., Daffron, J., Quantrill, K., Leverett, E., Bordeau, J., Smith, A., Harvey, T. (2019).
Cyber risk outlook. Centre for Risk Studies, University of Cambridge, in collaboration with Risk
Management Solutions, Inc. Available at: https://www.jbs.cam.ac.uk/faculty-research/centres/risk/
publications/technology-and-space/cyber-risk-outlook/cyber-risk-outlook-2019/
6. Department of Homeland Security (2003) National Strategy for the Physical Protection of Critical
Infrastructures and Key Assets, as DHS (2003) https://www.dhs.gov/xlibrary/assets/Physical_Strat-
egy.pdf
7. European Commission (2008) Council Directive 2008/114/EC of 8 December 2008 on the iden-
tification and designation of European critical infrastructures and the assessment of the need to
improve their protection. https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri¼OJ:L:2008:345
:0075:0082:EN:PDF
8. European Commission (2020a) Enhanced EU engagement with the Western Balkans, https://
ec.europa.eu/neighbourhood-enlargement/policy/eu-and-western-balkans_en
9. European Commission (2020b) Western Balkans Connectivity Agenda, https://ec.europa.eu/neigh-
bourhood-enlargement/sites/near/files/connectivity_agenda_brochure.pdf
10. European Commission (2020c) Western Balkans Cooperation Agenda, https://ec.europa.eu/neigh-
bourhood-enlargement/sites/near/files/western_balkans_strategy_brochure.pdf
11. Falco, G. (2018) Job One for Space Force: Space Asset Cybersecurity. Cyber Security Project,
Belfer Center, July 12, 2018, https://www.belfercenter.org/publication/job-one-space-force-space-
asset-cybersecurity
12. Georgescu, A. (2018) Pandora’s Botnet – Cybercrime as a Persistent Systemic Threat. Future of
Europe: Security and Privacy in Cyberspace, Visio Journal No. 3, Dec. 2018, Visio Institut, ISBN:
2536-1481-3
13. Georgescu, A. & Cirnu, C.E. (2019). Blockchain and critical infrastructures – challenges and op-
portunities, in Romanian Cyber Security Journal, ISSN 2668-1730, ISSN-L 2668-1730, Vol. 1 (1),
pp 93-100
14. Georgescu, A., Vevera, V., Cirnu, C.E. (2019). The Proliferation of Cyber Weapons – Theory and
Mitigation. In Romanian Cyber Security Journal, ISSN 2668-1730, ISSN-L 2668-1730, Vol. 1 (2),
pp 37-46
148