<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petko Petkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: Emerging Characteristics and Impact on Defence</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CERT</style></keyword><keyword><style  face="normal" font="default" size="100%">CIRC</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">ENISA</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">standard</style></keyword><keyword><style  face="normal" font="default" size="100%">taxonomy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">98</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report provides an overview of threats in cyber space and their potential impact on the defence potential. First, it outlines the features of cyber threats, suggests a respective classification and presents related standards. The second part provides analysis of selected examples for organizing cyber security in the experience of the US, UK, France, etc. The final part discusses the potential implementation of identified good practice in Bulgaria, and specifically in the defence ministry.</style></abstract></record></records></xml>