TITLE

FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE

AUTHOR(S)
ARMENCHEVA, Ilina; SMOLENOV, Stefko
PUB. DATE
September 2015
SOURCE
Revista Academiei Fortelor Terestre;2015, Vol. 20 Issue 3, p259
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In nova days ICT progress and the daily life dependency on Internet leads to emergence of many new challenges and threats in cyber space. They can escalate from simple hacker's breach to more serious attacks that take effect over the great number of cyber terrorism victims and even to the cyber war. These circumstances require developing effective policies focusing on how to cope with new challenges and who is responsible to tackle with them. In the efforts to build an efficient, integrated, legal and politically sustainable international cybersecurity system are engaged both nation states and international organization. The result of these combined efforts is illusory confidence that there is permanent cyber peace ensuring the interests of almost all subjects from individual citizens to nation states and national and international entities.
ACCESSION #
110230328

 

Related Articles

  • SOUND THE ALARM. Chichowski, Ericka // Entrepreneur;Jun2010, Vol. 38 Issue 6, p54 

    The article discusses an increase which has been seen in the number of small businesses that have become victims of computer crimes including data theft. A discussion of several methods that computer criminals can use to gain access to a small business' computer, and of the large financial gains...

  • Software Patches More Vulnerable to Hackers. Marshall, Jeffrey; Heffes, Ellen M. // Financial Executive;Mar2005, Vol. 21 Issue 2, p10 

    The article presents information about computer security measures. Experts say software patches used to update source code or alter it to subvert hackers are becoming more vulnerable. They estimate that by 2006, 30% of all cyber attacks will target vulnerabilities where a patch has been...

  • Cyberfraud and Computer Crime. Cheney // Strategic Finance;Nov99, Vol. 81 Issue 5, p38 

    The article offers tips on how to prevent computer crime, cyberfraud, and Internet invasion. Experts advise companies to prioritize their information assets according to their worth to the firm. Once assets are prioritized and defense mechanisms put in place companies should institute a disaster...

  • Better Controls through Database Auditing. Gary, Ted // Database Trends & Applications;Jul2007, Vol. 21 Issue 7, p9 

    The article focuses on the worsening situation of data breach. Data from the Privacy Rights Clearinghouse tally reveals that data breach victims have reached more than 100 million records. This is attributed to the inadequacy of federal and state regulations designed to protect customers from...

  • Welcome To McDonalds, May I Take Your Data. Loguercio, Michael // Insurance Advocate;3/17/2014, Vol. 125 Issue 5, p20 

    The article discusses the risks of cyber crimes that target the data of companies and personally identifiable information of its customers in context to the cyber-data breach that targeted fast food chain McDonald's in 2010 and also offers steps that can help in stopping cyber attacks. The...

  • How CISOs can keep up security best practice in a threat landscape in flux. Saran, Cliff // Computer Weekly;4/3/2012, p11 

    The article explores data security issues faced by corporate chief information security officers (CISOs) in light of widespread personal computing. The results of several studies are presented regarding the threats of data loss, hacking, and other cybercrime in various sectors, including the...

  • Untitled. Anderson, Kent // Computer Weekly;10/7/2008, p6 

    The article discusses the issue concerning the growth of politically motivated computer crime in Great Britain. It indicates the assertion of the government regarding the move of the security and intelligence agencies to continue to protect the country from covert activity by foreign...

  • Switched networks lose their security advantage due to packet-capturing tool. McClure, Stuart; Scambray, Joel // InfoWorld;05/29/2000, Vol. 22 Issue 22, p50 

    Focuses on packet-capture countermeasures against computer hackers. Benefits of sniffing traffic on the Web site; Potential computer network damage caused by sniffing attack; Definition of switching technology.

  • Going on the Offense. WESTERVELT, ROBERT // Information Security;Feb2013, Vol. 15 Issue 1, p8 

    The article focuses on the viability of enterprises to go on the offense against cybercriminals. According to experts, there are some offensive-like tactics which can increase the cost of hacking into a corporate network. Software security expert Gary McGraw explained the need of the U.S. to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics