The opportunities provided by the information and communications technology, with a special emphasis on the Internet, have become an integral part of life. However, are we sufficiently aware and prepared as individuals, nations or the international community for the threats coming from cyberspace or for the denial of the use of that dimension of communication, commerce and even warfare? Namely, despite the growing number of users, the Internet is still beyond or below minimum regulation. Those are precisely the conditions for the organization and realization of hostile action in cyberspace. There are security issues within the cyberspace that represent a security risk and challenge of modern times. The development and application of the inf...
Globalisation brought an electronic communications reliance, as well as some repercussions on the wo...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The opportunities provided by the information and communications technology, with a special emphasis...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism...
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflic...
NATO has recognized cyberspace as the fourth operational domain. Cyberspace is a vector for crime, w...
The paper presents issues concerning the development of IT system security, ensuring the confidentia...
The development of the internet and digital technologies represent a major opportunity for humanity ...
The development of ICT and the formation of the global information space changed the agenda of natio...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
It is more than obvious that the way of conducting terrorism with the time is becoming more sophisti...
Abstract: The cyberspace generated by the widespread deployment and development of informa...
Globalisation brought an electronic communications reliance, as well as some repercussions on the wo...
Globalisation brought an electronic communications reliance, as well as some repercussions on the wo...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The opportunities provided by the information and communications technology, with a special emphasis...
Abstract- Information Technology (IT) security is a growing concern for governments around the world...
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism...
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflic...
NATO has recognized cyberspace as the fourth operational domain. Cyberspace is a vector for crime, w...
The paper presents issues concerning the development of IT system security, ensuring the confidentia...
The development of the internet and digital technologies represent a major opportunity for humanity ...
The development of ICT and the formation of the global information space changed the agenda of natio...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
It is more than obvious that the way of conducting terrorism with the time is becoming more sophisti...
Abstract: The cyberspace generated by the widespread deployment and development of informa...
Globalisation brought an electronic communications reliance, as well as some repercussions on the wo...
Globalisation brought an electronic communications reliance, as well as some repercussions on the wo...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...