Cybersecurity policy
1,926 Followers
Recent papers in Cybersecurity policy
Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas,... more
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more
With the arrival of cyberspace, a whole host of new security and other challenges have arisen which are not always adequately tackled. In order to deal with them more appropriately, India has repeatedly argued for a greater role of the UN... more
Timely sharing of cyber security related information between organizations has long been perceived as an effective measure to address cyber security challenges. Even though information sharing is a cost-effective tool and a crucial step... more
• From a statistical point of view, we normally get to identify only 1 out of 7 serious cases of cyberwarfare attacks.
La ciberseguridad es un problema a hacer frente por los despachos de abogados, grandes y pequeños y en esta profesión lo estamos abordando realmente mal. Es difícil luchar contra algo que no se ve y poca gente entiende, sobre todo cuando... more
Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such... more
The cybersecurity industry has a significant employment gap, with over 301,000 open jobs in the United States, up from 285,000 jobs in 2017 (Cybersecurity Supply and Demand Heat Map, n.d.). The unfilled positions span the country and the... more
In 2013, Indonesia topped China and was acknowledged as the country with the highest rate of cyber attack traffic, in which with its 1,6 percent share of world Internet users, Indonesia contribute 38 percent of the total cyber attack in... more
The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on... more
Deklaracja Wyszehradzka z 15 lutego 1991 roku zakładała intensywną współpracę sygnatariuszy ukierunkowaną na uzyskanie członkostwa w strukturach Unii Europejskiej i Sojuszu Północnoatlantyckiego. Potwierdzono w niej gotowość do ponoszenia... more
Does the Internet facilitate democratization or democratic entrenchment? The body of literature on the Internet and democracy points to scholarly divergence on this issue. This article seeks to contribute to this debate by analyzing... more
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the capability maturity... more
Russia's exercise of cyberpower forms an integral part of the far broader concept known as information warfare. The key principle of the Russian approach to information warfare, including cyber activities, is that information is the most... more
Difficulties in matching cyber security supply with demand have been reported in Australia, Japan, the United Kingdom and the United States; these countries have also been among the most active in mitigating the shortage through... more
Conferência / aula na "Maratona Direito e Tecnologia Digital e Quântica (Quando o Direito é desafiado pelo Digital)", do Conselho Regional de Lisboa da Ordem dos Advogados. Dia 30 de março de 2021.
“Italy Cyber Readiness at a Glance” is the sixth of a series of country reports assessing national-level preparedness for cyber risks based on the Cyber Readiness Index (CRI) 2.0 methodology. This report provides an extensive analysis of... more
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could prevent nations from protecting themselves from threats, cause substantial economic harm, and even result in the loss of life. Therefore,... more
À l'occasion cette fin d’année épidémique, ATLANTICO a demandé à ses contributeurs les plus fidèles de s'interroger sur l'année à venir. A quoi pourrait bien ressembler 2022 ? Franck DeCloquement aborde le dossier et se penche sur les... more
Acknowledging the fundamental importance of CI for national security, the Kosciusko Institute decided to devote the present report to the problem of its protection focusing primarily on cyber security of CI due to its growing role and... more
Angeles (UCLA). Thank you to the dedicated Federal Communications Law Journal staff for bringing this Note to publication. Special thanks to Meredith Rose, Journal Adjunct, and Atena Sheibani-Nejad, Notes Editor, for their patience and... more
The technological transformation story of Azerbaijan is marked by the popular embrace of digital banking, implementation of centralized e-government services, and the automation of critical energy infrastructure. However, this march... more
In the present scenario all software systems are imperfect because they cannot be built with mathematical or physical certainty, Hence in this research paper the comparison of various software development models has been carried out.... more
O acelerado processo de globalização e as suas dinâmicas, causaram nos Estados um aumento da sua vulnerabilidade e dos seus receios relativamente à segurança e defesa do seu território, assim, dadas as caraterísticas dos ciberataques,... more
Today cyber space is easily accessible and has presence beyond geo-political boundaries; also rapidly becoming a global battlefield for various states and non-states entities. With the advent of the Internet of Things (IoT), every... more
Cyber threats are fundamentally different from any other because they usually do not involve any kinetic, or in other words physical, effects or actions. Yet they nonetheless have a huge potential for damage because digital and networked... more
El objetivo de este texto es mostrar cómo los Estados han buscado mediante normas nacionales e internacionales, así como alianzas con países y actores estratégicos, aprovechar las ventajas del ciberespacio y reducir las vulnerabilidades.... more
In 2017, the WannCry and NotPeya showed that attacks targeting the cyber component of infrastructures (e.g. attacks on power plants), services (e.g. attacks to banks or hospitals servers), and endpoint devices (e.g. attacks on mobiles and... more
Eight U.S. states are leading the rest in cybersecurity readiness. In “State of the States on Cybersecurity,” Senior Fellow Francesca Spidalieri reviews the efforts of state governments in California, Maryland, Michigan, New Jersey, New... more
El progreso de los medios cibernéticos y su aplicación como medio de defensa – ataque por parte de diversos actores de la sociedad internacional, así como la utilización del campo de batalla virtual (ciberespacio) por parte de los Estados... more
Ciberseguridad Nacional en México y sus desafíos RESUMEN 1 Debido a los avances tecnológicos los Estados enfrentan nuevos desafíos en la llamada Era de la Información. Estos desafíos están ligados a la falta de protección y al mal uso del... more
In liberal democratic countries, the role of the state in cybersecurity is a politically contested space. We investigate that role along three dimensions: the first is theoretical and we look at existing cybersecurity literature, showing... more
Cybercafé administrator used to be a major player in cybercrimes control in conjunction with security operatives, until the advent and popularity of internet service by the GSM operators in Nigeria. This study investigates the level of... more
Internet can be considered as one of the greatest achievements of humanity of the last century, which connected the entire world. It created a new space for connections, information and communications, as well as cooperation. Thus, it... more
Cyberspace poses a great challenge to the traditional governance, that is mainly state-centric-it challenges the traditional concepts like security, borders, privacy and sovereignty. Legal discussions about cyberspace governance often... more
The ongoing digitization leads to a deepening dependence of the next life spheres on information technology. The global net- work has become the basic tool for work, communication and entertainment. The changes that are taking place have... more
DERECHOS HUMANOS Y SEGURIDAD DIGITAL: UNA PAREJA PERFECTA El rol de organizaciones multilaterales en la agenda latinoamericana de seguridad digital: El caso de la OEA