PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Cyber terrorism and the effects of the Russian attacks on democratic states in East Europe

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
From the analysis of large-scale incidents in the field of cyber terrorism and the possible influence of the Russian government, it was concluded that cyber attacks represent threats to NATO member countries and were included in the list of security threats identified in the NATO`s New Strategic Concept of 2010. This conclusion makes terrorism a new dimension, a cybernetic one, as an adaption of terrorism to the new era and a new defence field to be taken in consideration – the cybernetic field. For these reasons, in 2016, NATO recognised the importance of introducing virtual space as an operational domain, which opened the gates to cyber security, and invited member countries to contribute to the development of cyber defence projects. The solution of the cyber attacks has created the conditions for normal functioning of any state critical infrastructure.
Rocznik
Tom
Strony
131--139
Opis fizyczny
Bibliogr. 11 poz.
Twórcy
  • ”Henri Coandă” Air Force Academy, Braşov, Romania
  • ”Carol I” National Defence University, Bucharest, Romania
autor
  • ”Henri Coandă” Air Force Academy, Braşov, Romania
Bibliografia
  • 1. Bălăceanu Ion, Virgil Manea, Ovidiu Moșoiu. 2019. Sistemul interinstituțional de prevenire și combatere a amenițărilor neconvenționale în zona de interes strategic a României, “Henri Coandă” Brașov: Air Force Academy Printed House. ISBN 978-606-8356-68-6. [In Romanian: Interinstitutional system for preventing and fighting unconventional threats in the area of strategic interest of Romania].
  • 2. Cioacă Cătălin. 2009. “Cyber – Terrorism, an Instability Global Source”. Review of the Air Force Academy 2(15). Brașov: “Henri Coandă” Air Force Academy Printed House. ISSN 1842-9238.
  • 3. Denning Dorothy. “Cyberterrorism”. Available at: http://palmer.wellesley.edu/~ivolic/pdf/Classes/Handouts/NumberTheoryHandouts/Cyberterror-Denning.
  • 4. Foxall Andrew. 2016. “Putin’s Cyberwar: Russia’s Statecraft in the Fifth Domain”. Russia Studies Centre Policy Paper 9. The Henry Jackson Society. Available at: http://www.stratcomcoe.org/do wnload/file/fid/5212.
  • 5. Gherman Laurian. 2014. „Electronic warfare in information age”. Review of Air Force Academy 3. Brașov: “Henri Coandă” Air Force Academy Printed House. ISSN 1842-9238.
  • 6. Greenberg Andy. “The State of Cyber Security When Cyber Terrorism Becomes State Censorship”. Forbes.com. Available at: http://www.forbes.com/2008/05/14/cyberattacksterrorism-estonia-tech-security08-cx_ag_0514attacks. html.
  • 7. Kozłowski Andrzej. 2014. “Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan”. European Scientific Journal (ESJ) 3. Available at: http://www.eujournal.org/index.php/esj/article/view/2941.
  • 8. Moldovan Marius, Ion Bălăceanu. 2018. Reconfigurarea balanței de putere militară în zona estică de interes strategic a României, București: National Defence University “Carol I” Printed House. [In Romanian: Reconfigure the military power balance in the eastern area of strategic interest of Romania].
  • 9. Nazario Jose. Politically Motivated Denial of Service Attacks. NATO CCDCOE. Available at: https://ccdcoe.org/sites/default/files/multimedia/pdf/12_NAZARIO%20Politically%20Motivated%20 DDoS.pdf.
  • 10. Rețea cu un număr mare de calculatoare virusate ce sunt manipulate de infractorii cibernetici de la distanță, în scopul atacurilor DDoS sau SPAM. Available at: https://usa.kaspersky.com/resource-center/threats/botnet-attacks. [In Romanian: Network with a large number of viruses that are handled by remote cybercriminals for DDoS or SPAM attacks].
  • 11. William C. Ashmore. “Impact of Alleged Ryssuan Cyber Attaks”. SAMS 2009. Available at: http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-027.pdf.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a1e18a2f-f6ee-4334-91db-7357d8b721af
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.