The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace

被引:0
|
作者
Mele, Stefano [1 ]
机构
[1] Italian Inst Strateg Studies Niccolo Machiavelli, Rome, Italy
关键词
Cyber-terrorism; cyber-strategy; cyber-warfare; cyber-weapon; cyber-security; national security;
D O I
10.3233/978-1-61499-528-9-183
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
What recently happened in Paris has brought up again the never-ending issue related to the need to check terrorist groups' attempts to launch attacks in Italy and throughout Europe. This paper firstly tries to give a scientific definition of what cyber-terrorism should be referred to as, also by identifying, on the other hand, activities that can be only considered as an use of the Internet for terrorist purposes. Then the paper analyzes the Italian strategic response against cyber-threats through the examination of the Italian Reports on the Security Intelligence (2009-2014), tracing back the evolution of the Government approach toward such issue. Moreover, the main Italian strategic documents are examined, with regard to the strategic and operational guidelines set out in order to carry out an organic, yet flexible response to cyber-threats. Lastly, the paper also provides a legal definition of when a generic software or malware can be defined as such a cyber-weapon in the specific context of warfare.
引用
收藏
页码:183 / 199
页数:17
相关论文
共 50 条
  • [21] Response Strategies to Cyber Threats in Service Industries
    Tan, Chuxian
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, MACHINE LEARNING AND PATTERN RECOGNITION, IPMLP 2024, 2024, : 203 - 207
  • [22] Cyber threats: Reducing the time to detection and response
    Brewer, Ross
    Network Security, 2015, 2015 (05) : 5 - 8
  • [23] Protecting against cyber threats in networked information systems
    Ertoz, L
    Lazarevic, A
    Eilertson, E
    Tan, PN
    Dokas, P
    Kumar, V
    Srivastava, J
    BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC SYSTEMS III, 2003, 5101 : 51 - 56
  • [24] Robust ICSs Critical for Guarding Against Cyber Threats
    Edwards, Dave
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2010, 102 (11): : 30 - 33
  • [25] Protecting the Besieged Cyber Fortress: Russia's Response to Cyber Threats
    Kari, Martti
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 685 - 691
  • [26] Measuring and Enhancing Microgrid Resiliency Against Cyber Threats
    Venkataramanan, Venkatesh
    Srivastava, Anurag K.
    Hahn, Adam
    Zonouz, Saman
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2019, 55 (06) : 6303 - 6312
  • [27] Government/industry alliance urged against cyber threats
    Mann, P
    AVIATION WEEK & SPACE TECHNOLOGY, 1998, 149 (02): : 65 - 67
  • [28] Tech Guardians: Comprehensive Defense against Cyber Threats
    Preethi, K. M.
    Ambika, M.
    Vickma, S.
    Megala, P.
    Vikram, D.
    Santhoshkumar, S. P.
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 549 - 551
  • [29] Building resilience against cyber threats in the energy sector
    Hagen, Janne
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 20 : 26 - 27
  • [30] Cyber Threats Against and in the Space Domain: Legal Remedies
    Dilworth, Seth W.
    Osborne, D. Daniel
    2022 14TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: KEEP MOVING (CYCON), 2022, : 235 - 247