Search: Cybersecurity,Cyberattacks (4 materials)

Cybersecurity and NATO’s Nuclear Capability

... could be seen as attacks of a new, cognitive type intended to make use of flaws in the ways AI processes information. Current cybersecurity means do not appear up to the task of counteracting such threats. Natalia Romashkina: Strategic Instability in ... ... Communication Technologies: Crisis or the New Norm? Third, the authors note that attribution and response are measures for counteracting cyberattacks. The report also states that “NATO members’ NC3 architecture is secure and reliable is of particular importance ...

28.08.2020

Cyberwarfare without Rules

... telling the truth. Does it disclose sensitive information? Or is it merely “fake” news? Nevertheless, it would be useful to consider the situation from the point of view of the security of critical infrastructure, the possibility of carrying out cyberattacks and the rules of conduct in ICT. The Informational Security of Critical Infrastructure Pavel Karasev: New U.S. Cybersecurity Strategies Protecting critical infrastructure from malicious attacks in the ICT environment is a crucial national security task, one that all developed countries are attempting to solve in one way or another. Each country draws up their ...

24.07.2019

The Nuclear Dimension of Cyber Threats

... any negotiation process, and a key stage that determines the success of the negotiations and the prospects for adapting the agreements to the rapidly changing reality against the backdrop of the scientific and technological progress. As for deliberate cyberattacks that may be of interest to states that have the requisite capabilities, we should take note of the opinion of the UK-based Chatham House, which draws attention to the complex dynamics of military-political relations in the event of a further ...

18.07.2019

A New Cybersecurity Diplomacy: Are States Losing Ground in Norm-making?

... cybersecurity and are not ready to give up their relative freedom of action in cyberspace for the sake of universal security and stability. In the absence of common rules of conduct, businesses are left to follow their own defined standards and rules of cybersecurity to reduce the costs of cyberattacks to a certain extent. The Cybersecurity Tech Accord Siemens Charter of Trust Nornickel Charter of information security for critical industrial facilities Microsoft Digital Geneva Convention Global Commission on Cyber Stability Identity Tech ...

22.10.2018

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students