IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • Cross-Border Cyber-Attacks and Critical Infrastructure Protection


    Author(s): COMAN, Iulian Marius

    Quick view | Full article | Citations | Views: 374


    Author(s) keywords: , , , ,


    Reference keywords: , ,


    Abstract:

    One of the priorities of the European Union is to enhance the security and resilience of the critical infrastructure with cross-border impact, and to maintain cyber environment that encourages efficiency and economic affluence while promoting security, safety, privacy and civil liberties.



    References:

    [1]. Dmitri Alperovitch, vice president, Threat Research, Mcafee, Revealed: Operation Shady RAT, white paper, 2011.

    [2]. BASYLIS project, http://www.basylis.european-project.eu/homepage.php

    [3]. Business Continuity Planning for Critical Infrastructure, http:// ec.europa.eu/dgs/homeaffairs/financing/fundings/projects/stories/bucopci_en.htm

    [4]. CIPS 2013 Call for Proposals, http://ec.europa.eu/dgs/homeaffairs/financing/fundings/security-and-safeguarding-liberties/terrorism-and-otherrisks/calls/call-2013/index_en.html

    [5]. Commission Staff Working on a new approach to the European Programme for Critical Infrastructure Protection, Brussels, European Commission 28.8.2013, SWD (2013) 318 final.

    [6]. Critical infrastructure protection, http://europa.eu/legislation_summaries/ justice_freedom_security/fight_against_terrorism/l33259_en.html

    [7]. Critical Infrastructure Simulation of Advanced Models on Interconnected Networks resilience, http://ec.europa.eu/dgs/homeaffairs/financing/fundings/projects/stories/ crisadmin_en.htm

    [8]. Directiva 2008/114/CE a Consiliului din 8 decembrie 2008 privind identificarea şi desemnarea infrastructurilor critice europene şi evaluarea necesităţii de îmbunătăţire a protecţiei acestora. 8. Directiva 2013/40/UE a Parlamentului european şi a Consiliului privind atacurile împotriva sistemelor informatice şi de înlocuire a Deciziei-cadru 2005/222/JAI din 12.08. 2013.

    [9]. Andreescu, A.; Nicolae, Radu, AL Qaida si forta Internetului, Sesiunea de Comunicari Stiintifice Strategii XXI – Securitate si Aparare in Uniunea Europeana, sectiunea Securitate si Aparare Nationala, Ministerul Apararii Nationale, Universitatea Nationala de Aparare “Carol I”, Bucuresti, 09-10 aprilie 2009.

    [10]. Revista Romana de Studii de Intelligence, Bucuresti, nr. 10 / decembrie 2013.

    [11]. Alexandrescu, Grigore, Văduva, Gheorghe, Infrastructuri critice. Pericole, amenințări la adresa acestora. Sisteme de protecție, Editura Universității Naționale de Apărare “Carol I”, București, 2006.

    [12]. Bajai, Kamlesh, The Cybersecurity Agenda, Mobilizing for International Action, New York, The EastWest Institute, 2010.

    [13]. Brenner, Susan W., Cyberthreats: The Emerging Fault Lines of the Nation State, New York, Oxford University Press, 2009.

    [14]. Clarke, Richard A., Knake, Robert K., Cyber War: The Next Threat to National Security and What to do about it, New York.

    [15]. Collins, Howard C., Hughes, Connor R., Cyber Infrastructure Protection: Selected Issues and Analyses, Nova Science Publishers, 2013.

    [16]. Georgios Giannopoulos, Roberto Filippini, Muriel Schimmer, Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of art, JRC Technical Notes, 2012.

    [17]. Fadia, Ankit, Network Security: A Hacker’s Perspective, Cincinnati, Premier Press, 2003.

    [18]. Hathway, Melissa E, Best Practices in Computer Network Defense: Incident Detection and Response, IOS Press, 2014.

    [19]. Kuehl, Daniel T., From Cyberspace to Cyberpower: Defining the Problem, in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz, Cyberpower and National Security, Washington D.C., National Defense University Press, Potomac Books, 2009.

    [20]. Libicki, Martin C., Cyberdeterrence and Cyberwar, RAND, 2009.

    [21]. Panayotis A. Yannakogeorgos, Adam Lowther, Conflict and Cooperation in Cyberspace: The Challenge to National Security, 2013.

    [22]. Maior, George-Cristian, Spionii. Cine sunt, ce fac, Editura RAO, 2013.

    [23]. Matthew, Edwards, Critical Infrastructure Protection, NATO Science for Peace and Security Series, vol. 116, IOS Press, 2014.

    [24]. Rattray, Gregory J., An Environmental Approach to Understanding Cyberpower, in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz, Cyberpower and National Security, Washington D.C., National Defense University Press, Potomac Books, 2009.

    [25]. Reveron, Derek S., Cyberspace and the national security – Threats, Opportunities and Power, Georgetown University Press, Washington DC, 2012.

    [26]. Rizea, Marian, Enăchescu, Daniela, Neamțu-Rizea, Cristiana, Infrastructuri critice, Editura Universității Naționale de Apărare “Carol I”, București, 2010.

    [27]. Schreier, Fred, On Cyberwarfare, DCAF Horizon 2015 Working paper No. 7.

    [28]. Singer, W., Friedman, Allan, Cybersecurity and Cyberwar: What Everyone Needs to Know, Oxford University Press, 2014.



    Additional Information

    Article Title: Cross-Border Cyber-Attacks and Critical Infrastructure Protection
    Author(s): COMAN, Iulian Marius
    Date of Publication: 2017-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2017.02.07
    Issue: Volume 6, Issue 2, Year 2017
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 47-52 (6 pages)



    Copyright

    Copyright ©2012-2018 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.