Abstract- Information Technology (IT) security is a growing concern for governments around the world. Cyber terrorism poses a direct threat to the security of the nations ’ critical infrastructures and ITs as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the threat of potentially disastrous cyber attacks, nations ’ policy makers are increasingly pondering on the use of deterrence strategies to supplement cyber defense. Nations create their own national policies and strategies which cover cyber security countermeasures including cyber defense and deterrence against cyber threats. But it is r...
The international community has concerned about the malicious development of Information and Communi...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
The opportunities provided by the information and communications technology, with a special emphasis...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cybersecurity is a national security issue. Passive cyber defense measures are no longer sufficient....
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
This paper examines some of the most widely researched trends and developments within the phenomenon...
The international community has concerned about the malicious development of Information and Communi...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...
After world -War II, the influence of the computer went beyond military realm by extending to other ...
The opportunities provided by the information and communications technology, with a special emphasis...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cybersecurity is a national security issue. Passive cyber defense measures are no longer sufficient....
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
Within the last decade, nation-states and their populations have experienced an exponential rise in ...
Abstract. This thesis aims to determine the role of deterrence in the digital age, where nation-stat...
This paper examines some of the most widely researched trends and developments within the phenomenon...
The international community has concerned about the malicious development of Information and Communi...
Cyber operations by both state actors and non-state actors are increasing in frequency and severity....
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to intern...