Skip to main content
The new Requirement for a Fifth Dimension of war: Cyber Intelligence Gokhan Bayraktar ICCWS2014-9th International Conference on Cyber Warfare & Security: ICCWS 2014, 9, 2014 The structure and operational domain of intelligence... more
The book faces an essential contemporary issue: the definition of the limits of action, protection and use of cyberspace as a fifth operational domain, as well as in the measures to be taken to make this environment more secure. Using the... more
Supervisory Control and Data Acquisition (SCADA) systems are common constituent of major critical infrastructures for which availability and security are important factors. As modern SCADA systems have progressed from autonomous systems... more
Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This stud...
—The increasing need to implement on-line services for all industries has placed greater focus upon the security controls deployed to protect the corporate network. The demand for cyber security is further required when IT solutions are... more
—With the increase in cyber threats and attacks many institutions are exploring how newer technologies may be applied to strengthen the way users are verified when bestowing permissions for carrying out web transactions. In particular,... more
Connectivity provides a safer environment, but it also acts as a backbone to provide attack surface to hackers. There are millions of cars on the road today, and so many are expected to be in future; there might be a risk to the... more
Cybersecurity is crucial to digital marketing hence dealing with security threats in cyberspace is essential for success in digital marketing which is an online business. The cornerstone of any online business is security. The primary... more
Cyber Civilization has become an important source of information sharing and professional activities like business, banking transactions, shopping, services and advertisement. With the exponentially increase in usage of... more
The paper describes the evolution of cyber-attacks, based on different official reports from law enforcement agencies and cybersecurity companies. It focuses on the EMPACT priority ‘cybercrime-attacks on information systems’ and analyses... more
Today, cyber threats have the potential to harm critical infrastructures which may result in the interruption of life-sustaining services, catastrophic economic damages or severe degradation of national security. The diversity and... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
Cyber Civilization has become an important source of information sharing and professional activities like business, banking transactions, shopping, services and advertisement. With the exponentially increase in usage of cyberspace,... more
Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses on the relationships between... more
This report investigates the aggregate picture that emerges from these reports. We collected around 70 studies that were published by CERTs, security companies, and research organizations from 15 countries from the last few years. In... more
Improving ICT infrastructure, dramatic increase in internet usage and increasing dependence on networks have carried with cyber risks and threats. Complex, shape shifting and emerging risks and threats have systematically paved the way... more
Hypertext pre-processor (PHP), a server side scripting language very often used to develop a web application. Web application has a big importance in communication over internet. Web applications got very fast growth in past some time. To... more
Wireless Networking technology is now one of the most popular technologies but still there are drawbacks which are closely associated with Wireless Networks. In wireless network communication, the data is transferred from one point to... more
This publication is a Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service, and the European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE). It aims to... more
This chapter is focused on the research results in the area of organizational and functional changes pertaining to the NATO Command and NATO Force Structure in the light of activity corresponding to the safety and security of cyberspace... more
With the U.S. government acknowledgement of the seriousness of cyber threats, particularly against its critical infrastructures, as well as the Department of Defense officially labeling cyberspace as a war fighting domain, the Cold War... more
O presente artigo tem como objetivo comparar o comportamento brasileiro e sul-africano no que diz respeito à defesa cibernética e analisar se suas estratégias de defesa correspondem ao nível de ameaça que lhes é imposto. Para atender aos... more
Since the late 1990s, the UN has been home to debates and negotiations on the rules, norms and principles of states' responsible behaviour in cyberspace. As these discussions matured over years, they have been taken further to different... more
INPRESEC (Intelligent Predictive Security) – Network and end-point security. Detects anomalies in behavior, security threats and attacks. Exploring the paradigm shift in Information Security and Privacy with Artificial Intelligence and... more
Critical infrastructures are the physical and virtual systems essential to the minimum operations of the economy and the government. Critical Infrastructure Protection (CIP) is a critical agenda item for governments in the developed... more
This paper aims to evaluate NATOs’ “Smart Defense” policy in the view of the continuing significance and global roles of the Alliance. Smart defense being an integrative part of the collective defense of NATO, it is required to respond... more
Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to... more
Throughout the world, every field has obtained a drastic transformation. The ultimate reason is digital technologies. This change made better performances of individual, industries, government, private organizations etc. Even this... more
Being progressively interconnected world today, the information security system must be set up to counter emerging vulnerabilities that may occur as a result of technological advancement. In the complex and dynamic arena of internet, the... more
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to manage. This new macroeconomic transformation caused by globalisation introduced new challenges for critical infrastructure management. By 123... more
This study seeks to contribute to the literature by presenting a discussion of potential cyber risks and precautionary measures concerning unmanned vehicles as a whole. In this study, Global Navigation Satellite System (GNSS) spoofing,... more
This chapter looks at what makes cyber-security a key national security issue. Section 28.2 provides background information to understand why cyberspace is insecure and what it takes to hack a system. Section 28.3 looks at different types... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very fast.... more
This article examines the advanced technological, information and cyber components of hybrid war and the introduction of suggested countermeasures to counter information and cyber threats and attacks. The main hypothesis of the authors is... more
Cyber and its related technologies such as Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without these all pervasive technologies. Despite being ubiquitous around the world, cyber... more
There are few more critical questions in the field of cyber security than the issue of how to prevent malicious cyber actions and the utility of deterrence in the cyber domain. For many, deterrence will protect us from an uncertain cyber... more