<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Borislav Nikolov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber hygiene</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">main cyber hygiene rules</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chad Briggs</style></author><author><style face="normal" font="default" size="100%">Yuriy Danyk</style></author><author><style face="normal" font="default" size="100%">Tamara Maliarchuk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cognitive hacking</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-social vulnerabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">e-learning</style></keyword><keyword><style  face="normal" font="default" size="100%">emotional warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">information trauma</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2021</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">47-72</style></pages><abstract><style face="normal" font="default" size="100%">While developments in cyber technologies have advanced the propagation and reach of hybrid warfare, the COVID-19 pandemic has accelerated many vulnerabilities and critical dependencies. This article explores the fundamental aims and strategies of hybrid warfare in terms of psychological underpinnings and technological reach and links to emerging issues of disinformation, cybercrime, fake news, information trauma, and the influence of new modes of education on national security and state resilience.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Cybersecurity Issues in the Maritime Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">maritime industry</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s cyber defence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><abstract><style face="normal" font="default" size="100%">The maritime industry with its main components—port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation systems—is a substantial and plausible target of cyberattacks. The goal of the present study is to reveal and de-scribe all components of the shipping industry’s cybersecurity policy, the main types of cyberattacks, methods, means, and stages of implementation, cyber vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stanislav Atanasov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity Risks and Challenges in the Covid-19 Pandemic</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">disinformation</style></keyword><keyword><style  face="normal" font="default" size="100%">distant work</style></keyword><keyword><style  face="normal" font="default" size="100%">propaganda</style></keyword><keyword><style  face="normal" font="default" size="100%">social isolation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">38</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The COVID-19 pandemic caused a worldwide crisis with health, social, psychological, economic and political consequences. The imposed social isolation has leа to an exceptionally intensive use of Internet and revolutionary digitalization of human life in its interactive professional, academic and entertainment aspects. The cybersecurity risks also increased, which made cyber risk reduction, protection and response more challenging. This analysis reviews the typical risks and vectors of cyberattacks in a situation of increased digitalisation, as well as main countermeasures. Special attention is paid to propaganda and disinformation as specific cybercrimes critical to the social systems.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yoana Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policies for the Protection of Critical Infrastructure from Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">simulations</style></keyword><keyword><style  face="normal" font="default" size="100%">threat</style></keyword><keyword><style  face="normal" font="default" size="100%">US</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">116</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper is addressed in details the policy of the US regarding the issues of cyber security that are contained in Presidential Policy Directive (PPD-21). The tasks that should be solved for evaluation and planning of critical infrastructure protection are clearly defined. The following are specific examples of approaches and means to protect critical infrastructure from cyber attacks.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in the Policies for Security of Critical Energy Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">critical energy infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">critical energy infrastructure protection</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">energy security</style></keyword><keyword><style  face="normal" font="default" size="100%">EU</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">public private partnership</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">106</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The current understanding for effective security policy of the critical energy infrastructure focuses on the ability to systematically assess vulnerabilities, predict threats and neutralize the risks of cyber attacks on the interdependent elements of the complex, intelligent energy infrastructures. There are three major new developments in the security policy concerning the functioning of the critical energy infrastructure – cyber security, public-private partnership and international cooperation in the development and implementation of the policy for security of critical energy infrastructures. Various countries and international organizations offer their own policy models, while their efficiency is yet to be proven.</style></abstract></record></records></xml>