Confronting an "axis of cyber"? China, Iran, North Korea, Russia in Cyberspace
The new US National Cyber Strategy points to Russia, China, North Korea and Iran as the main international actors responsible for launching malicious cyber and information warfare campaigns against Western interests and democratic processes. Washington made clear its intention of scaling the respons...
保存先:
その他の著者: | |
---|---|
フォーマット: | 電子媒体 図書の章 |
言語: | 英語 |
出版事項: |
Milano
Ledizioni - LediPublishing
2018
|
シリーズ: | Pubblicazioni ISPI
|
主題: | |
オンライン・アクセス: | OAPEN Library: download the publication OAPEN Library: description of the publication |
タグ: |
タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_23931 | ||
005 | 20191112 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20191112s2018 xx |||||o ||| 0|eng d | ||
020 | |a 67058655 | ||
020 | |a 9788867058679;9788867058662 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.14672/67058655 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a JPH |2 bicssc | |
100 | 1 | |a Rugge, Fabio |4 edt | |
700 | 1 | |a Rugge, Fabio |4 oth | |
245 | 1 | 0 | |a Confronting an "axis of cyber"? |b China, Iran, North Korea, Russia in Cyberspace |
260 | |a Milano |b Ledizioni - LediPublishing |c 2018 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Pubblicazioni ISPI | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The new US National Cyber Strategy points to Russia, China, North Korea and Iran as the main international actors responsible for launching malicious cyber and information warfare campaigns against Western interests and democratic processes. Washington made clear its intention of scaling the response to the magnitude of the threat, while actively pursuing the goal of an open, secure and global Internet.The first Report of the ISPI Center on Cybersecurity focuses on the behaviour of these "usual suspects", investigates the security risks implicit in the mounting international confrontation in cyberspace, and highlights the current irreconcilable political cleavage between these four countries and the West in their respective approaches "in and around" cyberspace. | ||
536 | |a Knowledge Unlatched | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc/4.0/legalcode |2 cc |4 https://creativecommons.org/licenses/by-nc/4.0/legalcode | ||
546 | |a English | ||
650 | 7 | |a Political structure & processes |2 bicssc | |
653 | |a Political Science | ||
653 | |a cyber security | ||
653 | |a politics | ||
653 | |a internet | ||
653 | |a security | ||
653 | |a technology | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/86830177-7a96-45e8-8612-161480749c02/1006204.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u http://library.oapen.org/handle/20.500.12657/23931 |7 0 |z OAPEN Library: description of the publication |