Javascript must be enabled to continue!
28. Cyber-Security
View through CrossRef
This chapter looks at what makes cyber-security a key national security issue. Section 28.2 provides background information to understand why cyberspace is insecure and what it takes to hack a system. Section 28.3 looks at different types of politically relevant cyber-operations, describing hacktivism, cyber-crime, cyber-espionage, cyber-terrorism, and cyber-war, among others. Section 28.4 puts the threat into perspective, exploring the realities of cyber-conflict. The debate has shifted from scenarios of imminent cyber-doom to the observable reality of often stealthy, sometimes disruptive operations under the threshold of war. Section 28.5 details selected protection concepts that help to reduce cyber-risks.
Title: 28. Cyber-Security
Description:
This chapter looks at what makes cyber-security a key national security issue.
Section 28.
2 provides background information to understand why cyberspace is insecure and what it takes to hack a system.
Section 28.
3 looks at different types of politically relevant cyber-operations, describing hacktivism, cyber-crime, cyber-espionage, cyber-terrorism, and cyber-war, among others.
Section 28.
4 puts the threat into perspective, exploring the realities of cyber-conflict.
The debate has shifted from scenarios of imminent cyber-doom to the observable reality of often stealthy, sometimes disruptive operations under the threshold of war.
Section 28.
5 details selected protection concepts that help to reduce cyber-risks.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Factors Affect Cyber Security Readiness and Performance of SMEs: A Case Study of Mogadishu, Somalia
Factors Affect Cyber Security Readiness and Performance of SMEs: A Case Study of Mogadishu, Somalia
The incorporation of new digital technologies into the small business environment has led to the emergence of new potential threats and risks. The impact of cybercrime on the opera...
A Study on Customer Awareness Towards Cyber Security in Banking Industry with Special Reference to Sulthan Bathery Municipality
A Study on Customer Awareness Towards Cyber Security in Banking Industry with Special Reference to Sulthan Bathery Municipality
This paper examines cyber security within the Banking Industry in depth. The rapid adoption of digital banking has transformed the financial sector, making it more convenient for c...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
Digital Diplomacy and Cyber Defence
Digital Diplomacy and Cyber Defence
Abstract
Having emerged only two decades ago, the field of digital diplomacy and cyber defence is new relative to other aspects of statecraft. Governments did not pr...
CYBER SECURITY GOVERNANCE; IMPLICATIONS FOR PAKISTAN’S NATIONAL SECURITY
CYBER SECURITY GOVERNANCE; IMPLICATIONS FOR PAKISTAN’S NATIONAL SECURITY
Networks for information and communication technologies form the backbone of the global cyberspace. These networks operate across physical borders and hold vital data and informati...

