Think! Evidence

Protecting Critical Assets and Infrastructure from Cyber Attacks

Show simple item record

dc.creator Gabi Siboni
dc.date 2011-05-01T00:00:00Z
dc.date.accessioned 2015-07-20T20:08:37Z
dc.date.available 2015-07-20T20:08:37Z
dc.identifier 2307-793X
dc.identifier 2307-8634
dc.identifier https://doaj.org/article/aaec4716eab54f9f849fbdae6e72976a
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/8350
dc.identifier.uri https://doaj.org/article/aaec4716eab54f9f849fbdae6e72976a
dc.description The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information flow processes is liable to disrupt, paralyze, and sometimes even cause substantive physical damage to essential systems. Computer-based capabilities and their near-global ubiquity expose states to harm in cyberspace by various elements, including hostile countries, terrorist organizations, criminal elements, and even individuals driven by personal challenges or anarchist motives. The threat is particularly acute as management, control, and monitoring systems can be disrupted through changes to a computer program, and no physical attack is needed. Thus, it stands to reason that the face of future conflicts will be transformed beyond recognition.
dc.language English
dc.publisher Institute for National Security Studies
dc.relation http://d26e8pvoto2x3r.cloudfront.net/uploadimages/import/(file)1308129638.pdf
dc.relation https://doaj.org/toc/2307-793X
dc.relation https://doaj.org/toc/2307-8634
dc.rights CC BY
dc.source Military and Strategic Affairs, Vol 3, Iss 1, Pp 93-101 (2011)
dc.subject cyberspace
dc.subject state
dc.subject infrastructure
dc.subject Israel
dc.subject United States
dc.subject cyber protection
dc.subject security
dc.subject cyber attack
dc.subject Information Security Authority
dc.subject National Security Council
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.title Protecting Critical Assets and Infrastructure from Cyber Attacks
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account