Lithuania's Strategic Preparation for Cyber Security Challenges The paper analyses how Lithuania is strategically ready for cyber security challenges. The main purpose is to identify and explain the gaps in Lithuania's strategic preparation for these challenges. The study relied on Thomas Rid theory of three acts as sabotage, espionage and subversion and his assumption that there is no cyber war. Cyber war has never happened in the past, it will not happen in the present and that cyber war will not occur in the future. T. Rid took Carl von Clausewitz classic war theory and made argument that actions which happens in cyber space nowadays does not match Clausewitz theory about war. First, all military actions are violent or potentially violen...
Cyber warfare twenty-first century is becoming increasingly important and is becoming the fifth mili...
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
In this thesis, I aim to answer this question: Under what conditions will a country use cyber warfar...
This dissertation consists of three parts and has a twofold research interest. The research interest...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
Given the global nature of cyber threats, assurance of a cyber security policy is very important not...
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of na...
This thesis analysed cyber-attacks conducted by two pairs of nation states (Russia/Ukraine and Iran/...
The presented Master paper analysed Cyber Defence impact on the Republic of Lithuania Critical Infra...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
The key question of this thesis was to find out how did the cyber space securitization process in Li...
Cyber warfare twenty-first century is becoming increasingly important and is becoming the fifth mili...
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
In this thesis, I aim to answer this question: Under what conditions will a country use cyber warfar...
This dissertation consists of three parts and has a twofold research interest. The research interest...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
Given the global nature of cyber threats, assurance of a cyber security policy is very important not...
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of na...
This thesis analysed cyber-attacks conducted by two pairs of nation states (Russia/Ukraine and Iran/...
The presented Master paper analysed Cyber Defence impact on the Republic of Lithuania Critical Infra...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
The key question of this thesis was to find out how did the cyber space securitization process in Li...
Cyber warfare twenty-first century is becoming increasingly important and is becoming the fifth mili...
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...