The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace

被引:0
|
作者
Mele, Stefano [1 ]
机构
[1] Italian Inst Strateg Studies Niccolo Machiavelli, Rome, Italy
关键词
Cyber-terrorism; cyber-strategy; cyber-warfare; cyber-weapon; cyber-security; national security;
D O I
10.3233/978-1-61499-528-9-183
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
What recently happened in Paris has brought up again the never-ending issue related to the need to check terrorist groups' attempts to launch attacks in Italy and throughout Europe. This paper firstly tries to give a scientific definition of what cyber-terrorism should be referred to as, also by identifying, on the other hand, activities that can be only considered as an use of the Internet for terrorist purposes. Then the paper analyzes the Italian strategic response against cyber-threats through the examination of the Italian Reports on the Security Intelligence (2009-2014), tracing back the evolution of the Government approach toward such issue. Moreover, the main Italian strategic documents are examined, with regard to the strategic and operational guidelines set out in order to carry out an organic, yet flexible response to cyber-threats. Lastly, the paper also provides a legal definition of when a generic software or malware can be defined as such a cyber-weapon in the specific context of warfare.
引用
收藏
页码:183 / 199
页数:17
相关论文
共 50 条
  • [41] Data-Mining a Mechanism against Cyber Threats: A Review
    Kumar, Shipra Ravi
    Jassi, J. S.
    Yadav, Suman Avdhesh
    Sharma, Ravi
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 45 - 48
  • [42] Securing Privacy: Safeguarding Against Cyber Threats in the UAE and Morocco
    Momani, Bashar Talal
    Ettoudar, Mohamed
    Alhajaya, Nour
    Fayyad, Mahmoud
    GLOBAL PRIVACY LAW REVIEW, 2024, 5 (03): : 126 - 132
  • [43] Securing International Space Station Against Recent Cyber Threats
    Pazouki, Samaneh
    Aydeger, Abdullah
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL. 3, 2023, 464 : 121 - 132
  • [44] Terrorist Threats to Food: Guidance for Establishing and Strengthening Prevention and Response Systems
    Nganje, William
    Bier, Vicki
    Han, Hoa
    Zack, Lorna
    AMERICAN JOURNAL OF AGRICULTURAL ECONOMICS, 2008, 90 (05) : 1265 - 1271
  • [45] ESTIMATES OF THREATS TO PUBLIC FROM TERRORIST ACTS AGAINST NUCLEAR-FACILITIES
    WALL, IB
    NUCLEAR SAFETY, 1977, 18 (02): : 152 - 153
  • [46] ESTIMATES OF THREATS TO PUBLIC FROM TERRORIST ACTS AGAINST NUCLEAR-FACILITIES
    CHESTER, CV
    NUCLEAR SAFETY, 1976, 17 (06): : 659 - 665
  • [47] Cyber Rapid Response Team: An Option within Hybrid Threats
    Galinec, Darko
    Steingartner, William
    Zebic, Vinko
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 43 - 49
  • [48] Dynamic risk management response system to handle cyber threats
    Gonzalez-Granadillo, G.
    Dubus, S.
    Motzek, A.
    Garcia-Alfaro, J.
    Alvarez, E.
    Merialdo, M.
    Papillon, S.
    Debar, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 535 - 552
  • [49] The Peculiarities of Securitising Cyberspace: A Multi-Actor Analysis of the Construction of Cyber Threats in the US (2003-2016)
    Fouad, Noran Shafik
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 633 - 640
  • [50] MODERN QUANTUM TECHNOLOGIES OF INFORMATION SECURITY AGAINST CYBER-TERRORIST ATTACKS
    Korchenko, Oleksandr
    Vasiliu, Yevhen
    Gnatyuk, Sergiy
    AVIATION, 2010, 14 (02) : 58 - 69