Cyber threats

Cyber threats

Cyber threats, scenarios, ...

Future Development of Quantum Computing and Its Relevance to NATO

Brandmeier, Rupert A., Jörn-Alexander Heye, and Clemens Woywod. "Future Development of Quantum Computing and Its Relevance to NATO." Connections: The Quarterly Journal 20, no. 2 (2021): 89-109.

Introduction

Already in our era of “classical computing,” maintaining cybersecurity is an enormous challenge.

20.2.08_quantum.pdf — Downloaded 282 times

Social Media – Hate Speech – Hate Crime

Vilím, Lukáš. "Social Media – Hate Speech – Hate Crime." Connections: The Quarterly Journal 20, no. 2 (2021): 57-73.

Introduction

Nowadays, it is not uncommon for social media to include manifestations of hatred, misleading information, and elements of extremism or terrorism. We already observe that political and religious extremist groups use social media and networks to promote their ideology, recruit new members, demonstrate their power, and shock society with videos of wars as something commonplace and unavoidable. Society is already able to act against such use of social networks and its negative consequences. There are many ways to do so.

20.2.06_social_networks_hate_speech.pdf — Downloaded 280 times

Hybrid Warfare and Cyber Effects in Energy Infrastructure

Maliarchuk, Tamara, Yuriy Danyk, and Chad Briggs. "Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1 (2019): 93-110.

Introduction

Discussions of hybrid warfare have often centered on definitional debates over the precise nature of the term, and whether ‘hybrid’ covers what other military experts describe as nonlinear warfare, full-spectrum warfare, fourth-generation warfare, or other such terms. Similarly, discussions of cyber conflict have treated the phenomenon as a separate domain, as if using cyber tools remained distinct from other forms of conflict.

18.1.06_hybrid_cip.pdf — Downloaded 619 times

Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack

Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices

Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy

MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness

Pages