THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY

被引:0
|
作者
Cioaca, Catalin [1 ]
机构
[1] Henri Coanda AF Acad, Brasov, Romania
关键词
cyber-security; cyber attack; cyber defence;
D O I
暂无
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
The following paper concerns the terrorism phenomenon, which is considered to be a severe growing threat that requires a detailed response. Within this context, it became more and more obvious the necessity that each and every state should use all resources offered by the common security systems, in order to be able to deal with attacks that can't be solved in a traditional way. The modern intelligence and communications technologies play a crucial part in the evolution of the virtual terrorism threat. The internet, which is a safe, permanent and approachable space, serves all means and terrorist actions: from the digital loss, propaganda, found rising to the recruiting, the coordination of actions and computerised attacks. The world of the growing technologies faces a dilemma: if the progress can not be perceived in the absence of digitalization, each step towards digitalization creates new vulnerabilities. The war is more then a clash of technologies. The technology is important but not decisive. After the cyber attacks of 2007 against Estonia, each NATO state member is aware that this kind of threats are a real danger for the national security and - at least theoretically, for the security of the entire organization. Therefore, this paper tries to provide the answer to an essential question : "Is the Alliance prepared to adjust itself to the new requirements of the reality, to find the proper means of response, that are efficient in regard with the new threats?".
引用
收藏
页码:158 / 162
页数:5
相关论文
共 50 条
  • [1] A cyber-security framework for development, defense and innovation at NATO
    Efthymiopoulos M.P.
    [J]. Journal of Innovation and Entrepreneurship, 8 (1)
  • [2] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    [J]. PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808
  • [3] The role of metrology in the cyber-security of embedded devices
    Arpaia, Pasquale
    Caputo, Francesco
    Cioffi, Antonella
    Esposito, Antonio
    [J]. ACTA IMEKO, 2023, 12 (02):
  • [4] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [5] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [6] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [7] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [8] Knowledge absorption for cyber-security The role of human beliefs
    David, Dimitri Percia
    Keupp, Marcus Matthias
    Mermoud, Alain
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2020, 106
  • [9] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    [J]. VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183