CYBERNETIC ACTIONS ON CRITICAL INFRASTRUCTURES IN THE MILITARY FIELD

Petrișor PĂTRAȘCU

Abstract


The evolution, magnitude and effects of cyber attacks determined states and organizations to undertake increased security measures. Along with the development of new digital technologies, the number of Internet service users has considerably increased, which has also contributed to the unavoidable occurrence of ill-intended persons aiming to achieve a number of advantages through various illicit or controversial methods. Moreover, the profile of the cyber aggressor has advanced to the level of state and non-state actors. Thus, most of the targets that they identify as critical infrastructure belong to the military field.

Full Text:

PDF

References


Alexandrescu G, Boaru G., Alexandrescu C., Sisteme informaţionale pentru management, Editura UNAp „Carol I“, Bucureşti, 2012.

Bodmer S., Kilger M., Carpenter G., Jones J., Reverse Deception, Organized Cyber Threat Counter-Exploitation, The McGraw-Hill Companies, 2012.

Brenner S., Cyberthreats: The Emerging Fault Lines of the Nation State, New York, Oxford University Press, 2009.

Iorga I.M., Securitatea informațiilor în acțiunile militare moderne, Editura Universităţii Naţionale de Apărare, Bucureşti, 2018

Lucas G., Ethics and cyber warfare: the quest for responsible security in the age of digital warefare, New York, Oxford University Press, 2017

Schmitt M., Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, 2nd Edition. Prepared by the International Group of Experts at the invitation of NATO CCDCoE. Cambridge University Press, 2017

Stallings W., Cryptography and Network Security, Principles and Practice, Fifth ed., Prentice Hall, 2011

Turcu D., Securitatea informațiilor, Editura Universităţii Naţionale de Apărare „Carol I”, Bucureşti, 2014.

Valeriano B., Maness R., Cyber war versus cyber realities: cyber conflict in the international system, New York, Oxford University Press, 2015


Refbacks

  • There are currently no refbacks.