Page 161 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 161
ANDREJ ILIEV, FERDINAND ODZAKOV: HISTORICAL AND LEGAL ASPECTS OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE
of this increases the interest in cyber-attacks on information systems and networks, especially
in large financial and industrial corporations, whose functionality as been negatively affected
not only at a national but also at a regional level, especially in the most powerful states in
the world which, for example: exports electricity, natural gas and petroleum products. Many
scientific papers point out that there is a shortage of staff, especially for high-quality cyber
security professionals.
NATO is setting up a new Cyber Operations Centre in Mons, Belgium. The Centre will be
fully operational by 2023 and will support military commanders with situational awareness to
inform operations and missions and strengthen NATO’s cyber defence. The centre will also
coordinate NATO’s operational activity in cyberspace, ensuring the freedom to act in this
domain and making NATO operations more resilient to cyber-attacks (nato.int/nato_static_
fl2014/assets// pdf_2019_02/2019 0208_1902 cyber-defence-en.pdf). The International
Information System Security Certification Consortium (IISSCC) has made the final analysis
for the workforce needed for better cyber security. The cyber security workforce gap by 2022
is on pace to hit 1.8 million experts. (USA National Initiative for Cyber security Careers and
Studies, 2017).
5 References
1. Artur Appazov. Legal aspects of cyber security, University of Copenhagen,2014.
2. Bosnian Serb News Agency SRNA. “Yugoslavia: Serb Hackers Reportedly Disrupt US Military
Computer”, 28 March 1999.
3. Clay Wilson, Botnets. Cybercrime and Cyber terrorism: Vulnerabilities and Policy Issues for
Congress, Con gressional Research Service Report for Congress, January 29, 2008.
4. Critical Infrastructure Readiness Report, Aspen Institute and Intel Security, 2015.
5. Cyber War Also Rages in Middle East, The Associated Press, 28 October 2000.
6. Cyrus Farivar.”Cyber war I. What the Attacks on Estonia Have Taught Us About Online Combat”,
Slate, May 22, 2007.
7. Cyber Security Trends 2016, Cybernetic Global Intelligence.cgi-content-imagesandcode.
cyberneticglobal.netdna-cdn.com/wp-contentuploads/2015/11/cyber-predictions-2016-v2, accessed
on 20.10.2019.
8. David E. Hoffman. “CIA slipped bugs to Soviets”, Washington Post, 27 February 2004.
9. Dell. Annual Threat Report, 2015. http://www.dell.com/learn/us/en/uscorp1/press-releases/2015-
04-13-dell-annual-threat-report, 2015.
10. Eneken Tikk, Kadri Kaska and Liis Vihul. International Cyber Incidents: Legal Considerations,
Tallinn, Coopera tive Cyber Defence Centre of Excellence (CCD COE), 2010.
11. David S. Wall. Cybercrime: the transformation of crime in the information age, Cambridge, 2007.
12. European Commission. Cyber security of 5G networks, Strasbourg, 26.03.2019.
13. European Commission. Cyber Security Strategy of the European Union: An Open, Safe and Secure
Cyberspace, Brussels, 2013.
14. European Union External Action Service. ”EU-NATO cooperation – Factsheet” (https://eeas.
europa.eu/headquarters/headquarters-Homepage/28286/eu-natocooperation-factsheet_en).
15. French Coldwell, Chief Evangelist. National Fintech Cybersecurity Summit 2016, Sydney.
161