Page 161 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 161

ANDREJ ILIEV, FERDINAND ODZAKOV:  HISTORICAL AND LEGAL ASPECTS OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE

            of this increases the interest in cyber-attacks on information systems and networks, especially
            in large financial and industrial corporations, whose functionality as been negatively affected
            not only at a national but also at a regional level, especially in the most powerful states in
            the world which, for example: exports electricity, natural gas and petroleum products. Many
            scientific papers point out that there is a shortage of staff, especially for high-quality cyber
            security professionals.

            NATO is setting up a new Cyber Operations Centre in Mons, Belgium. The Centre will be
            fully operational by 2023 and will support military commanders with situational awareness to
            inform operations and missions and strengthen NATO’s cyber defence. The centre will also
            coordinate NATO’s operational activity in cyberspace, ensuring the freedom to act in this
            domain and making NATO operations more resilient to cyber-attacks (nato.int/nato_static_
            fl2014/assets//  pdf_2019_02/2019  0208_1902  cyber-defence-en.pdf). The  International
            Information System Security Certification Consortium (IISSCC) has made the final analysis
            for the workforce needed for better cyber security.  The cyber security workforce gap by 2022
            is on pace to hit 1.8 million experts. (USA National Initiative for Cyber security Careers and
            Studies, 2017).


            5  References


            1.  Artur Appazov. Legal aspects of cyber security, University of Copenhagen,2014.
            2.  Bosnian Serb News Agency SRNA. “Yugoslavia: Serb Hackers Reportedly Disrupt US Military
               Computer”, 28 March 1999.
            3.  Clay Wilson, Botnets. Cybercrime and Cyber terrorism: Vulnerabilities and Policy Issues for
               Congress, Con gressional Research Service Report for Congress, January 29, 2008.
            4.  Critical Infrastructure Readiness Report, Aspen Institute and Intel Security, 2015.
            5.  Cyber War Also Rages in Middle East, The Associated Press, 28 October 2000.
            6.  Cyrus Farivar.”Cyber war I. What the Attacks on Estonia Have Taught Us About Online Combat”,
               Slate, May 22, 2007.
            7.  Cyber Security Trends 2016, Cybernetic Global Intelligence.cgi-content-imagesandcode.
               cyberneticglobal.netdna-cdn.com/wp-contentuploads/2015/11/cyber-predictions-2016-v2, accessed
               on 20.10.2019.
            8.  David E. Hoffman. “CIA slipped bugs to Soviets”, Washington Post, 27 February 2004.
            9.  Dell. Annual Threat Report, 2015. http://www.dell.com/learn/us/en/uscorp1/press-releases/2015-
               04-13-dell-annual-threat-report, 2015.
            10. Eneken Tikk, Kadri Kaska and Liis Vihul. International Cyber Incidents: Legal Considerations,
               Tallinn, Coopera  tive Cyber Defence Centre of Excellence (CCD COE), 2010.
            11. David S. Wall. Cybercrime: the transformation of crime in the information age, Cambridge, 2007.
            12. European Commission. Cyber security of 5G networks, Strasbourg, 26.03.2019.
            13. European Commission. Cyber Security Strategy of the European Union: An Open, Safe and Secure
               Cyberspace, Brussels, 2013.
            14. European Union External Action Service. ”EU-NATO cooperation – Factsheet” (https://eeas.
               europa.eu/headquarters/headquarters-Homepage/28286/eu-natocooperation-factsheet_en).
            15. French Coldwell, Chief Evangelist. National Fintech Cybersecurity Summit 2016, Sydney.


                                                                                    161
   156   157   158   159   160   161   162   163   164   165   166