REFERENCES FOR A COMPREHENSIVE AND PERMANENT NAVAL CYBER SECURITY STRATEGY Cover Image

REFERENCES FOR A COMPREHENSIVE AND PERMANENT NAVAL CYBER SECURITY STRATEGY
REFERENCES FOR A COMPREHENSIVE AND PERMANENT NAVAL CYBER SECURITY STRATEGY

Author(s): Sebastian Popescu
Subject(s): Politics / Political Sciences, Security and defense, Peace and Conflict Studies
Published by: Carol I National Defence University Publishing House
Keywords: cyber security; threats; vulnerabilities; naval risk; hybrid war;
Summary/Abstract: The evolution of computer systems and technologies, the data networks interconnections, has generated the need to deliver distributed and integrated services, which has irreversibly conducted to the emergence of cyberspace as a field of battle with further connotations as a war domain. The military actions in the cyberspace domain are not very strictly identified and treated in international laws and norms, well known as the Law of Armed Conflict (LOAC) as the preoccupations of developing and internationally recognizing a set of regulations for the cybernetic domain are far from being decided, and the level of understanding and the knowledge within the military frame as considering the implications and application of LOAC for cyberspace is unclear. A complementary development is identified by the different levels of threat to computer security that generates a severity ofi mpact proportional to technical evolution and complexity. In this context, hacktivism, cyber crime,cyber espionage, cyber-terrorism and cyber-war are defined by the motivation, the actors and the targets for each of them, and are obviously related to the associated vulnerabilities.Cyber security is widely used term, whose definitions differ greatly and are often subjectively outlined. Thus, computer security involves the protection of computer networks and the information they include against penetration and against the impairment or interruption of data access. The same problem encounters the Navy in operating their informatics systems along the pursued sea operations.In the era of the information conflict, cyber-operations policies and the ship’s cybernetic systems’ availability are correlated with the Navy’s cybernetic capabilities and with the possibilities of using information associated with cybernetic scenarios applied by adverse forces.

  • Page Range: 192-197
  • Page Count: 6
  • Publication Year: 2018
  • Language: English
Toggle Accessibility Mode