CYBERNETIC ACTIONS ON CRITICAL INFRASTRUCTURES IN THE MILITARY FIELD
The evolution, magnitude and effects of cyber attacks determined the states and organizations to undertake of increased security measures. Along with the development of new digital technologies, the number of Internet service users has considerably invcreased, which has also contributed to the unavoidable occurrence of ill -intended persons aiming to achieve a number of advantages through various illicit and controversial methods. Moreover, the profile of the cyber aggressor has advanced to the level of state and non-state actors. Thus, most of the targets that they identify as critical infrastructure belong to the military field.
How to Cite
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.