• No results found

Cyber Defence

A human-in-the-loop approach to understanding situation awareness in cyber defence analysis

A human-in-the-loop approach to understanding situation awareness in cyber defence analysis

... though cyber defence scholars have relied on the cognitive perspective as a basis for their research almost exclusively, the research is, in practice employing the technological perspective of SA (Mathew, ...

10

Soft systems methodology in net centric cyber defence system development

Soft systems methodology in net centric cyber defence system development

... the cyber domain and the emerging cyber dependencies, governments are encouraging multi-organisation collaborations to create information infrastructures between public and private sectors ...

6

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

... regarding cyber defence exercises is very important as it validates the reasons that such exercises have started, for the training of network security ...

24

Small states and cyber security: The cases of Estonia, Lithuania, Georgia and Moldova

Small states and cyber security: The cases of Estonia, Lithuania, Georgia and Moldova

... with cyber security (Sibiu, ...regarding cyber security, with CERTs of nations like Israel, the International Policy Cooperation Centre of the GIP, EU and NATO (Sibiu, 2015; ITU, 2015a, ...joint ...

28

SAME THREAT, DIFFERENT ANSWERS?
COMPARING AND ASSESSING NATIONAL CYBER
DEFENCE STRATEGIES IN CENTRAL-EASTERN EUROPE

SAME THREAT, DIFFERENT ANSWERS? COMPARING AND ASSESSING NATIONAL CYBER DEFENCE STRATEGIES IN CENTRAL-EASTERN EUROPE

... international cyber security exercises, organised by the European Network and Information Security Agency ...to cyber security. Not only did the country participate in cyber trainings such as ...

23

CYBER INTELLIGENCE SHARING AND INTERNATIONAL COOPERATION

CYBER INTELLIGENCE SHARING AND INTERNATIONAL COOPERATION

... impact. Cyber attacks are independent of time and place. Cyber defence is hard as criminals are now in possession of rapidly renewable arsenals of attack weapons that can potentially cause global ...

14

Methods and Means of Cyber Warfare

Methods and Means of Cyber Warfare

... to cyber weapons that will make the giving of weapons law advice at the development or procurement stage difficult to ...A cyber weapon may at that point be so generic in nature that the giving of any ...

20

Fiscal policy in a depressed economy : was there a ‘free lunch’ in 1930s’ Britain?

Fiscal policy in a depressed economy : was there a ‘free lunch’ in 1930s’ Britain?

... 4 The statistical information obtained from The Economist has been cross-checked against the detailed descriptions of British budgets provided by Mallet and George (1929, 1933) and by Sabine (1970). Interpretation of the ...

33

Cyber Security : Protection of Human Rights Navjot Jyoti

Cyber Security : Protection of Human Rights Navjot Jyoti

... At the point when any one carrying out the crimes utilizing Internet and Computer is known as a cyber- crime. In Indian constitution under article 21, right to privacy is the part of basic rights. In the event ...

8

Online Harassment- A Virtual Crime with Real Consequences

Online Harassment- A Virtual Crime with Real Consequences

... The victim then moved to Goa to live with her parents. But soon after she left Delhi, the accused created her fake profiles on social networking websites. He then uploaded photographs on these sites and declared her to ...

9

Critical infrastructure in the future city   developing secure and resilient cyber–physical systems

Critical infrastructure in the future city developing secure and resilient cyber–physical systems

... With the increasing sophistication and integration of city systems and the need to protect their growing populations, there is a need for city planners to con- sider risk, resilience and cyber security in a ...

12

Nature of the Cyber Crime Activities among the Secondary Student in Dhaka City of Bangladesh: A Baseline Study

Nature of the Cyber Crime Activities among the Secondary Student in Dhaka City of Bangladesh: A Baseline Study

... between cyber and conventional ...of cyber crime among the secondary school students of Dhaka ...piracy, cyber identity theft, cloning of website/phishing, pornography, cyber defamation, virus ...

17

INFLUENCE OF SOCIAL MEDIA ON JUVENILE CYBER CRIMES AND ITS  IMPACT ON INDIAN SOCIETY

INFLUENCE OF SOCIAL MEDIA ON JUVENILE CYBER CRIMES AND ITS IMPACT ON INDIAN SOCIETY

... can claim jurisdiction. Any illegal act which involves a computer, computer system or a computer network is cybercrime. Further, any offence taking place on the computer can be said to be a cyber-offence. The IT ...

8

Evolutionarily stable defence and signalling of that defence

Evolutionarily stable defence and signalling of that defence

... We examine the evolution and maintenance of defence and conspicuousness in prey species using a game theoretic model. In contrast to previous works, predators can raise as well as lower their attack probabilities ...

32

Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardization of Regulations, Risk Maturity, Strategy Design and Impact Assessment

Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardization of Regulations, Risk Maturity, Strategy Design and Impact Assessment

... IoT cyber risk vectors (see Table ...IoT cyber risk ...IoT cyber risk vectors are categorised and used as reference ...IoT cyber risk, to define a standardisation approach that relates various ...

9

Preparedness of Saudi Arabia to Defend Against Cyber Crimes: An Assessment with Reference to Anti-Cyber Crime Law and GCI Index

Preparedness of Saudi Arabia to Defend Against Cyber Crimes: An Assessment with Reference to Anti-Cyber Crime Law and GCI Index

... to cyber-crimes like hacking, copyright infringement, espionage, financial theft, intellectual property theft, cyber extortion, social engineering identity theft, online gambling, online sale of illegal ...

16

Assessment of the types of cyber crime faced by internet  users in north eastern Nigeria

Assessment of the types of cyber crime faced by internet users in north eastern Nigeria

... of cyber-crime faced by internet users in north-eastern ...were cyber café operators and 120 were selected from the vast users of the ...service. Cyber terrorism, online phonography, and piracy were ...

5

The Baltic states’ Territorial Defence Forces in the face of hybrid threats  OSW Commentary Number 165, 19 03 2015

The Baltic states’ Territorial Defence Forces in the face of hybrid threats. OSW Commentary Number 165, 19.03.2015

... Territorial Defence Forces to 2020–2022, while the plans for the moderni- sation of volunteer formations in Estonia and Lithuania will largely be about continuation of current ...

8

The changing roles of the New Zealand armed forces, 1965 1980

The changing roles of the New Zealand armed forces, 1965 1980

... Defence Review stated that one of the major defence policy objectives was tfie"supplying of defence capabilities in support of the needs of the New Zealand societYo,,2l It also stressed [r] ...

94

Strategic warning time : a defence planning concept for New Zealand

Strategic warning time : a defence planning concept for New Zealand

... Also see the 1976 whi te paper, Australian Defence; the Report of the Parliamentary Joint Committee on Foreign Affairs and Defence, The Australian Defence Force: Its Structure and Capabi[r] ...

122

Show all 2368 documents...

Related subjects