2019 IEEE 15th International Scientific Conference on Informatics 2019
DOI: 10.1109/informatics47936.2019.9119292
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Rapid Response Team: An Option within Hybrid Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…Decisive battles in new-generation wars will rage in the information environment, in which the attacker's computer operator manipulating the "intelligent machines" at a distance will be the key figure in the battle-space. Encrypted data flowing in public communication channels will be among the coveted targets for cyber-attacks , [15].…”
Section: Cyber Defensementioning
confidence: 99%
See 1 more Smart Citation
“…Decisive battles in new-generation wars will rage in the information environment, in which the attacker's computer operator manipulating the "intelligent machines" at a distance will be the key figure in the battle-space. Encrypted data flowing in public communication channels will be among the coveted targets for cyber-attacks , [15].…”
Section: Cyber Defensementioning
confidence: 99%
“…Cyber defense focuses on preventing, detecting and providing timely responses to attacks or threats so that no infrastructure or information is tampered with. With the growth in volume as well as the complexity of cyber-attacks, cyber defense is essential for most entities in order to protect sensitive information as well as to safeguard assets , [15]. Cyber defense provides the much-needed assurance to run the processes and activities, free from worries about threats.…”
Section: Cyber Defensementioning
confidence: 99%
“…In general, empirical studies based on Lorincova et al (2019) and Raisiene et al (2020) argue that stakeholders' motivation is critical for achieving sustainability within business processes [22,23]. Certain priorities to find effective managerial and economic methods and measures with reasonable attitude include the education and motivation of managers and employees, and research studies highlight the proper usage of technological innovations and software solutions [24][25][26][27].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Within the non-hierarchical Hybrid Threats Model, military and nonmilitary activities using conventional and unconventional tools and tactics are combined. Interactions between some individual layers of the model by the means of cybersecurity and cyber defense are being achieved in cyberspace as the common denominator of particular components of the model, enabling multiple threats to be realized through system's (state's) vulnerabilities [29].…”
Section: Hybrid Threats Model Componentsmentioning
confidence: 99%
“…In the ongoing revolution in information technologies, information and psychological warfare will largely lay the groundwork for victory. Asymmetric actions, too, will be used extensively to level off the enemy's superiority in the armed struggle by a combination of political, economic, information, technological, and ecological campaigns in the form of indirect actions and nonmilitary measures (see Figure 3), refined and improved from [29]. Within the non-hierarchical Hybrid Threats Model, military and nonmilitary activities using conventional and unconventional tools and tactics are combined.…”
Section: Hybrid Threats Model Componentsmentioning
confidence: 99%