Results 31 to 40 of about 1,657,998 (333)
Military objectives in cyber warfare [PDF]
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers +21 more
core +1 more source
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
Legitimate firms or hackers - who is winning the global cyber war
In order to enable reliable service products, the internet of things (IoT) technology infrastructure must withstand global hacking events. How is the IoT faring in the cyber security war? Is it winning or is it losing?
R. Gary +4 more
semanticscholar +1 more source
Cyber conflict short of war: a European strategic vacuum
Cyber conflict short of war plays an increasingly important role in contemporary security politics. Dedicated to a study of three European NATO members – the Netherlands, France and Norway, this article expands the existing focus of the study of cyber ...
Tobias Liebetrau
semanticscholar +1 more source
STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA SELF-HELP ATAU MULTILATERALISM?
Cyber security is a new kind of topic in security studies. This issue came as prominent discourse when all the human aspect range from politics, military, economics and societal are connected to the cyber space. Cyber terrorism, cyber crime and cyber war
Iqbal Ramadhan
doaj +1 more source
NEW THREATS TO THE NATIONAL SECURITY OF STATES – CYBER THREAT [PDF]
Globalisation brought an electronic communications reliance, as well as some repercussions on the world’s states, mainly in the sphere of cyber security. In recent years after the events in Ukraine, the cyber threat became a certainty and risk.
Daniel-Cornel ŞTEFĂNESCU, Alina PAPOI
doaj +1 more source
: Russia's invasion of Ukraine in February 2022 heightened geopolitical tensions between the Western countries and Russia, lowering global growth expectations due to uncertainty about the effects of the conflict, especially on the global supply chain. In
M. Balbaa, M. Eshov, Nilufar Ismailova
semanticscholar +1 more source
Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss +15 more
core +2 more sources
Cybersecurity Risks: Are They Inflated? [PDF]
With various views being posed on cybersecurity, this paper examines the proposition that cybersecurity risks are inflated. Due to the complexity of the cybersecurity environment, the risks will be dichotomised into two distinct categories—those posed by
Petr Chrapavy
doaj
Study on Cyber Attack Damage Assessment Framework
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim +4 more
doaj +1 more source

