NATO AND CYBER SECURITY

被引:0
|
作者
Kazakovtsev, A. V.
机构
关键词
cyber security; cyber threats; cyber warfare; strategic concept; securitization; NATO;
D O I
暂无
中图分类号
K [历史、地理];
学科分类号
06 ;
摘要
This article investigates the NATO policy in cyber security domain. Then, urgent problems related to definitions and classifications of "cyber" are examined. Also, this article reveals the evolution of NATO's operational and strategic cyber defence institutions. Finally, it attempts to disclose political dimension of NATO's cyber defence policy.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 50 条
  • [41] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [42] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [43] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [44] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [45] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [46] Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018
    Uyheng, Joshua
    Magelinski, Thomas
    Villa-Cox, Ramon
    Sowa, Christine
    Carley, Kathleen M.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2020, 26 (04) : 465 - 483
  • [47] Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018
    Joshua Uyheng
    Thomas Magelinski
    Ramon Villa-Cox
    Christine Sowa
    Kathleen M. Carley
    Computational and Mathematical Organization Theory, 2020, 26 : 465 - 483
  • [48] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [49] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [50] LAGGING COLOSSUS OR A MATURE CYBER-ALLIANCE? 20 Years of Cyber Defence in NATO
    Mad'ar, Tomas
    OBRANA A STRATEGIE-DEFENCE & STRATEGY, 2019, 19 (01): : 5 - 22