<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Antonova</style></author><author><style face="normal" font="default" size="100%">Niya Prisadashka</style></author><author><style face="normal" font="default" size="100%">Radoslav Dimitrov</style></author><author><style face="normal" font="default" size="100%">Ioan Yonkov</style></author><author><style face="normal" font="default" size="100%">Daniel Radev</style></author><author><style face="normal" font="default" size="100%">Hristo Pavlov</style></author><author><style face="normal" font="default" size="100%">Mario Mladenov</style></author><author><style face="normal" font="default" size="100%">Ilian Grigorov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybercrime Strategy (modeling example)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">PESTLE - analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">SWOT - analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">149</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The widespread penetration of technology and networks into people’s professional and personal lives brings cyber security challenges to the front line of our society. Cyberattacks and cybercrimes аre accompanying the daily lives of modern Internet users, and the damages caused by them are significant enough to be considered as a major component of modern cybersecurity. The diversity of criminal acts, perpetrators, and consequences requires a countering cybercrimes solution that has to be planned and implemented based on a strategic approach. Part of the countries are specifying their cyber security strategies with separate strategies for countering cybercrimes, and this turns out to be the right approach. The study defends the idea of the need and usefulness of developing and implementing a cybercrime strategy. Based on international good practices, authors’ ideas and research, a model for such a strategy, tailored to the Bulgarian environment is proposed. The aim is to provoke a discussion in the direction of assessing the need to create a national cybercrime strategy.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolay Naydenov Hranov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity for Network Management Systems</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cyber Ecosystem</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Embedded Digital Identity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid Enterprise Network System</style></keyword><keyword><style  face="normal" font="default" size="100%">Migration/Assimilation System</style></keyword><keyword><style  face="normal" font="default" size="100%">Network System Assimilation</style></keyword><keyword><style  face="normal" font="default" size="100%">Remote Encrypted Connection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">150</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The present research is related to the migration/assimilation system of a hybrid corporate network system with the option of embedded identification, through a remote encrypted connection to a new cybernetic ecosystem, without the active process function ceasing, while the first system is finally assimilated into the new one, while breaking the balance of its cybersecurity.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Roland Kelemen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact of the Russian-Ukrainian Hybrid War on the European Union's Cybersecurity Policies and Regulations</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cognitive warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2023 </style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">75-90</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">While Russia transitioned from hybrid to conventional warfare in Ukraine, NATO recognized cyberspace as another domain where allied response can be invoked. The European Union also decided to enhance the cybersecurity capabilities of the organization and its member states, making social resilience a priority area. It is recognized that the security of cyberspace and related systems is not just an economic issue but one that affects the whole society, necessitating a more complex strategy and regulation. The EU has taken steps to mitigate the cyber risks associated with hybrid warfare, enhancing network and cognitive security. However, offensive cyber operations could increasingly lead to open armed conflict. During existing conflicts, some cyber operations may undermine public confidence and further escalate the situation. The EU and its Member States must pay closer attention to escalation dynamics in their legislation and practices. It is crucial to scrutinize cyber policies, set specific targets and deadlines, and regularly update them. This will require stakeholders to find the appropriate regulatory levels and align national regulations, practices, and standards.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">75</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Localism in cybersecurity – mission impossible</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">deterritorialization</style></keyword><keyword><style  face="normal" font="default" size="100%">localism</style></keyword><keyword><style  face="normal" font="default" size="100%">triangle of contradictions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">148</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Broad concepts such as the concepts of localism and deterritorialization could be successfully used to study specific objects such as cyber security as a function of cybercrime. Using the methods for analysis and synthesis, the challenges that deterritorialization poses to the strategic management of cyber security are brought out in the study. Summarizing these challenges allows the construction of the triangle of contradictions, which explains the thesis for the modern characteristics of cyberspace, where localism becomes a mission impossible, and deterritorialization raises cybersecurity problems that still have no particular solution.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">HLS</style></keyword><keyword><style  face="normal" font="default" size="100%">IPTV</style></keyword><keyword><style  face="normal" font="default" size="100%">live streaming</style></keyword><keyword><style  face="normal" font="default" size="100%">RTMP</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">78-88 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The invention of television changed the world and made information spread faster. For the past few years, broadcast television has remained digital only and IP networks have emerged as an additional broadcast option. Regardless of the infrastructure used by a given broadcaster, some channels or even special content require a specific payment scheme and implement conditional access. This study proposes an approach for secure video streaming and preventing video content from easily leaking due to cyber security issues. The proposed methods cover both aspects – the content itself and the protection of subscribers’ personal data when using live streaming services.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">78</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ‘Balance’ As a Panacea for Achieving (Cyber)Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">panacea</style></keyword><keyword><style  face="normal" font="default" size="100%">risks</style></keyword><keyword><style  face="normal" font="default" size="100%">Scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">security controls</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Decision-making in a complex, complex, multi-layered and multifactorial environment, such as the security environment, requires a balance between threat factors and strategies to counter them. In this sense, the search for a single, simple solution, seen as a panacea, is an irrational management approach. The report presents the results of a study to develop a model for balancing cybersecurity solutions.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Borislav Nikolov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber hygiene</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">main cyber hygiene rules</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">benchmark</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">146</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Measuring the maturity of cybersecurity capabilities is a key element of the overall concept of building and maintaining security in cyberspace. The report presents the results of the creation of a model for assessing the maturity of cybersecurity capabilities as a combination of the advantages of the balanced scorecard and benchmark model. The developed model has the strength of theoretical validity and practical applicability.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Casper Almén</style></author><author><style face="normal" font="default" size="100%">Nicholas Hagström</style></author><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning system</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">energy sector</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">11-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The purpose of this case study is to bring lessons learned from the ECHO project to the DYNAMO project in the energy sector. The main research question is how to understand the ECHO Early Warning System as a tool for the prevention of cybercrime as well as cyber incident coordination and response in the context of the energy sector. The applied sources of evidence are the DYNAMO project proposal, public ECHO deliverables, scientific publications available via the ECHO web pages, and other materials available via the ECHO web pages. The study shows that ECHO Early Warning System can be a very valuable tool, and it also finds examples of how to utilize E-EWS in practice. The main conclusion is that situation awareness, together with Early Warning Systems, is a powerful combination that can facilitate the fight against cybercrime.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Piotr Jurgała</style></author><author><style face="normal" font="default" size="100%">Tytus Kurek</style></author><author><style face="normal" font="default" size="100%">Marcin Niemiec</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Preserving Privacy of Security Services  in the SecaaS Model</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">access control</style></keyword><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">cloud environment</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">secure services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">47-64 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Outsourcing security services to the cloud allows companies to minimize IT infrastructure costs, use services faster, improve manageability, and reduce their own maintenance effort. However, the security policy, which identifies the rules and procedures, also contains information about security architecture, threats, and vulnerabilities. Therefore, the privacy of security policies applied in a cloud environment is needed. This article describes a structure of security policies for selected network services that will ensure privacy protection and protect against the analysis of network traffic by an unauthorized person. The developed solution is based on the UNIPRIV model. This architecture for authentication and access control services was implemented and verified, taking into account safety and performance.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">47</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Ivan Nikolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">exercising</style></keyword><keyword><style  face="normal" font="default" size="100%">federated</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">287-302</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cyber exercising is essential to crisis management preparation and maintaining a robust cybersecurity posture. To prepare for growing hybrid threats, complex cyber-hybrid scenarios with practical cooperation at the technical, operational, and higher decision-making levels are increasingly being used, leveraging the power of cyber ranges. Alas, owing to a lack of suitable simulation infrastructure and the ability to adapt cyber ranges to varied situations, such complex scenarios often remain inaccessible. The federation of cyber ranges is one potential response to this challenge, providing a solution for the individual cyber range limitations in terms of resources to replicate complex cybersecurity-relevant realities. 
The current contribution describes the authors’ experience designing the Red Ranger, a Composite Cyber Range. We detail the design and development to facilitate the agility required to support a working multi-faceted federation with the ECHO Cyber Range to allow for an “exercise-as-a-service” model to provide adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">287</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity areas</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity level</style></keyword><keyword><style  face="normal" font="default" size="100%">measurement</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">138</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The examination of all issues of interest in the field of cybersecurity, cyber resilience and the fight against cybercrime can be focused on one term, and that is the term cybersecurity capabilities. Cybersecurity capabilities demonstrate the ability to implement policies, standards, guidelines, and operational procedures for the security of information systems, networks, applications, and information. In turn, cybersecurity capabilities are a dynamic object that is built, maintained, developed, modified and adapted to the changing security environment. The dynamics of security capabilities require measuring the degree of their maturity and comparing them with the target levels. This report provides a comparative analysis of existing models for assessing the maturity of cybersecurity capabilities, thus creating an opportunity for a reasonable choice of such a method for the needs of specific assessment.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yordan Shterev Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Concepts in Networks and Communication Security and Graph Theory</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">communication technology</style></keyword><keyword><style  face="normal" font="default" size="100%">computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">graph theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">205-210 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;In this article, the author presents concepts for exploring networks and com&amp;shy;munication security and recommendations for their use in the definition of requirements, reducing the risk of cyberattacks, and make some quantitative assessments. The focus is on the applications of graph theory in the analysis of communications and information networks.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bohdan M. Holovkin</style></author><author><style face="normal" font="default" size="100%">Oleksii V. Tavolzhanskyi</style></author><author><style face="normal" font="default" size="100%">Oleksandr V. Lysodyed</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Corruption as a Cybersecurity Threat in the New World Order</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">Covid-19 pandemic</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity threats</style></keyword><keyword><style  face="normal" font="default" size="100%">fight against corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">post-pandemic conditions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">75-87</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cognition. Using the dialectical method, theoretical background, and contemporary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a modern understanding of multicultural communication and well-being.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">75</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Harri Ruoslahti</style></author><author><style face="normal" font="default" size="100%">Janel Coburn</style></author><author><style face="normal" font="default" size="100%">Amir Trent</style></author><author><style face="normal" font="default" size="100%">Ilkka Tikanmäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Skills Gaps – A Systematic Review of the Academic Literature</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber skills</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber training</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">e-learning</style></keyword><keyword><style  face="normal" font="default" size="100%">society</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">33-45</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This literature review is part of research on the roles of and training for e-skills in modern society, specifically, the role of cyber skills. This article explores how the academic literature discusses cyber skills and identifies e-skills that can be determined as necessary for the functioning of society today. First, the introduction provides an explanation of the overall impact of cyber skills in our modern-day society. Next, the body presents the method used to conduct the review and a concise summary of the findings to answer our research questions. Finally, based on the research findings, the conclusions address the feasibility, impact, strengths, weaknesses, and possible ethical concerns.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">33</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author><author><style face="normal" font="default" size="100%">Heikki Hämäläinen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">biomedical ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digital healthcare</style></keyword><keyword><style  face="normal" font="default" size="100%">Ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">healthy ageing</style></keyword><keyword><style  face="normal" font="default" size="100%">SHAPES project</style></keyword><keyword><style  face="normal" font="default" size="100%">wellbeing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">103-116 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The SHAPES Horizon 2020 project supports the wellbeing of the elderly at home. The object of this paper is to help to provide necessary tools and guidelines to health and wellbeing service developers in the SHAPES project for their ethical consideration of cybersecurity actions. This paper examines different views and approaches to the ethics of cybersecurity in healthcare and finds the most relevant and puzzling issues for the SHAPES project. The paper investigates the ethical issues, for example, applying the approach of principlism based on four principles of biomedical ethics (respect for autonomy, nonmaleficence, beneficence and justice) and ethics of care. The essential aims of the employment of information and communication technology in healthcare are efficiency and quality of services, the privacy of information and confidentiality of communication, the usability of services, and safety. Four significant value clusters in cybersecurity are security, privacy, fairness, and accountability. From these four different ethical aspects (biomedical ethics, ethics of care, core value clusters in cybersecurity, and technical aims), this paper proposes a new conceptual model for a system approach to analyse the ethical matters which are related to cybersecurity in digital healthcare and wellbeing. In addition, the paper provides ethical guidelines from a cybersecurity ethics and biomedical ethics perspective for the SHAPES project.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Ethical AI</style></keyword><keyword><style  face="normal" font="default" size="100%">trustworthy AI</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">49</style></volume><pages><style face="normal" font="default" size="100%">49-69 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Artificial Intelligence (AI) has already matured to the point where people from different industry fields and research domains can utilize its tools for various practical applications, including within healthcare, where AI holds immense promise. This capability has generated high hopes and has been used in the fight against the Covid-19 pandemic. However, against the backdrop of these applications, more contentious AI use cases have been highlighted, particularly with concerns about ethics and cybersecurity. This paper discusses recent developments and exciting applications of AI methods and tools. We cover three aspects: AI against Covid-19, AI for cybersecurity, and cybersecurity for AI, as well as some misuses of AI. We also present an overview of AI’s potential through the lens of cybersecurity, to provide food for thought on the idea that securing artificial intelligence necessitates an entirely new approach to security and what it means in the context of dramatically increasing digital dependency.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bartłomiej Gdowski</style></author><author><style face="normal" font="default" size="100%">Rafał Kościej</style></author><author><style face="normal" font="default" size="100%">Marcin Niemiec</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Heuristic-based Intrusion Detection Functionality in a Snort Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">heuristic algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword><keyword><style  face="normal" font="default" size="100%">network attack</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">23-36 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;This article provides an introduction to intrusion detection systems, focusing on extending the Snort environment&amp;rsquo;s functionalities by adding a new heuristic detection algorithm. The algorithm allows to detect selected types of cyberattacks through analysis of received packets and based on a list of malicious Internet Protocol addresses. Furthermore, the algorithm underwent functional verification. The results confirmed that the algorithm successfully detects the packets originating from the provided list and rates them accordingly.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Panos Panagiotou</style></author><author><style face="normal" font="default" size="100%">Notis Mengidis</style></author><author><style face="normal" font="default" size="100%">Theodora Tsikrika</style></author><author><style face="normal" font="default" size="100%">Stefanos Vrochidis</style></author><author><style face="normal" font="default" size="100%">Ioannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">anomaly detection</style></keyword><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">37-48 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services&amp;rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tania Wallis</style></author><author><style face="normal" font="default" size="100%">Chris Johnson</style></author><author><style face="normal" font="default" size="100%">Mohamed Khamis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study  of the Effectiveness of the UK Implementation of the NIS Directive</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">essential services</style></keyword><keyword><style  face="normal" font="default" size="100%">interorganizational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">operational technology</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">36-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The transposition of the EU Directive on Network and Information Security (NIS) by EU Member States involved assigning a set of responsibilities to operators, regulators and policy makers within a national cybersecurity strategy, in order to improve cybersecurity levels across critical infrastructures. This research investigates the perspectives and experiences of organisations affected by the NIS Directive focussing on three different sectors (Energy, Water &amp;amp; Aviation). The authors evaluate the response of different actors to NIS interventions and their challenges in meeting their assigned responsibilities, in particular their ability to oversee supply chain cybersecurity. It proposes further support for partnerships and cooperation across organisations to increase the effectiveness of NIS implementation. Based on results from semi-structured interviews and observations of industry working groups, an approach to supply chain oversight to achieve a balance between control and cooperation is recommended, to improve cybersecurity within industry sectors and across critical national infrastructures. Although our initial focus has been on working mainly with UK stakeholders, we argue that our recommendations have a more general application beyond those countries directly affected by the Directive.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">36</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michal Turčaník</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Network User Behaviour Analysis by Machine Learning Methods</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clustering algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">web page categorisation</style></keyword><keyword><style  face="normal" font="default" size="100%">web users analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">66-78 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Cyber security is one of the prominent global challenges due to the significant increase in the number of cyberattacks over the last few decades. The amount of transferred data is growing, and a quick reaction to cyber incidents is needed. The paper is a contribution to this effort. There is a possibility to save time and resources by concentrating only on a subgroup of potential threats caused by a specific group of users. The main source of information about a selected group of users is the web access log file, where all the necessary data is stored. The contribution also presents the concept of preprocessing data from the log files to a form useful for clustering. In the next step, a density-based spatial clustering algorithm is applied to create the clusters. Clustering algorithms have been applied to many fields (marketing, business, etc.), but not for the purposes of cyber defence. The created clusters were analysed according to our definition of risky behaviour. After analysis of the clustering results, it was possible to select a potentially dangerous group of users in the specific cluster. The presented method has potential use in different areas of cyber defence and other applications where intelligent classification is required.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RSA Weaknesses Caused by the Specifics of Random Number Generation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">random numbers gen-eration</style></keyword><keyword><style  face="normal" font="default" size="100%">RSA algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">171-179 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The rapid entry in digital transformation and Covid-19 moved many activities to the Internet. The application of cybersecurity tools gives a sense of good security condition of the used digital services. This is often how things look on the surface, but the problems sometimes is hard to notice. The current study presents weaknesses in the still widely used cryptographic algorithm RSA, which allows RSA cryptographic keys to be compromised. It demonstrates the connection with RNG as the root of all the resulting controversies around the issues under consideration.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Crisis Response</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid Security</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Standard Operating Procedures</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">129-148 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;The current cybersecurity landscape is conducive to the enhancement of the traditional cyber-exercising paradigm and instruments. Considering the complex nature of the cyberattacks and their cascading impact, moving away from purely technical or entirely decision-making exercises is becoming paramount for realistic exercising of emergency response. Complex cyber-hybrid scenarios, exercising effective collaboration at the technical, operational, and higher decision-making levels, are increasingly employed to prepare to face emerging hybrid threats. Such scenarios simulate seemingly independent incidents in different locations, businesses, or systems that may quickly escalate to a sectoral or a national crisis. Unfortunately, such diverse scenarios remain inaccessible due to the lack of proper simulation infrastructure and expertise to adapt them to various contexts. The current contribution presents the authors&amp;rsquo; experience in designing a Composite Cyber Range, following a Systems-of-Systems approach for the dynamic activation or incorporation of playgrounds and on-the-run integration of custom-made emulation or overlay ranges to support an &amp;ldquo;exercise-as-a-service&amp;rdquo; model for the provision of adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Cybersecurity Issues in the Maritime Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">maritime industry</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s cyber defence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><abstract><style face="normal" font="default" size="100%">The maritime industry with its main components—port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation systems—is a substantial and plausible target of cyberattacks. The goal of the present study is to reveal and de-scribe all components of the shipping industry’s cybersecurity policy, the main types of cyberattacks, methods, means, and stages of implementation, cyber vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikoleta Georgieva</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">academic major</style></keyword><keyword><style  face="normal" font="default" size="100%">analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber operations</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Navy</style></keyword><keyword><style  face="normal" font="default" size="100%">US Naval Academy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">311-320</style></pages><abstract><style face="normal" font="default" size="100%">This study is about the comparison between the Cyber Operations majors in both the United States Naval Academy and the Bulgarian Naval Academy. It compares the goals of the major, the length of study for the degree, the courses, the lab hours, and their respective learning objectives to conclude.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">311</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Concept of Resilience: Security Implications and Implementation Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">concept</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis management</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">disaster risk</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">peacebuilding</style></keyword><keyword><style  face="normal" font="default" size="100%">police force</style></keyword><keyword><style  face="normal" font="default" size="100%">postconflict reconstruction</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Sendai Framework</style></keyword><keyword><style  face="normal" font="default" size="100%">stabilization</style></keyword><keyword><style  face="normal" font="default" size="100%">theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aiming for a more effective and efficient response to diverse and multidimensional threats, an increasing number of defense and security organizations, the United Nations, NATO, and the EU embrace the concept of resilience in their security strategies and policies. This article provides a brief overview of the concept, a sample of definitions used in policy documents, and the types of problems they seek to resolve. Then we introduce the reader to the 15 articles published in the Summer and Fall 2020 issues of Connections that present the evolution of the concept of resilience and its implementation by and within political, defense, and law enforcement organizations, as well as its anticipated contribution to cybersecurity, disaster preparedness, peacebuilding, post-conflict restoration and countering hybrid threats.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">big data</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure Protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT security</style></keyword><keyword><style  face="normal" font="default" size="100%">IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2020, and summarises the results from five of its sessions: Protecting Critical Infrastructures from Cyberattacks; Security Implications and Solutions for IoT Systems; Big Data and Artificial Intelligence for Cybersecurity; Secure Communication and Information Protection; and Advanced ICT Security Solutions.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arvid Kok</style></author><author><style face="normal" font="default" size="100%">Ivana Ilic Mestric</style></author><author><style face="normal" font="default" size="100%">Giavid Valiyev</style></author><author><style face="normal" font="default" size="100%">Michael Street</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threat Prediction with Machine Learning</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">auto-encoding</style></keyword><keyword><style  face="normal" font="default" size="100%">clustering with outliers</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">DBSCAN</style></keyword><keyword><style  face="normal" font="default" size="100%">deep learning</style></keyword><keyword><style  face="normal" font="default" size="100%">KNIME Analytics Platform</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">MITRE ATT@CK framework</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">203-220</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we address the approaches, techniques and results of applying machine learning techniques for cyber threat prediction. Timely discovery of advanced persistent threats is of utmost importance for the protection of NATO’s and its allies’ networks. Therefore, NATO and NATO Communication and Information Agency’s Cyber Security service line is constantly looking for improvements. During Coalition Warrior Interoperability Exercise (CWIX) event data was captured on a Red-Blue Team Simulation. The data set was then used to apply a variety of Machine Learning techniques: deep-learning, auto-encoding and clustering with outliers.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">203</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gabriela Boshnakova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber threats modification during the COVID-19. Cyber pandemia</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">effectiveness</style></keyword><keyword><style  face="normal" font="default" size="100%">pandemic</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">136</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A microscopic pathogen, an invisible malicious enemy that spreads rapidly, imperceptibly, and destructively with different shapes, types and uses, for different purposes &amp;ndash; to harm, disrupt, damage. SARS-CoV-2 or malware, the biological or the technological infection will more strongly affect our societies? This report presents the challenges of cybersecurity during a pandemic, the spread of fear in the increasing demand for information. The new world brings unfamiliar challenges and provocations. Overcoming them requires increased general and technical competences, culture, personal and online hygiene.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stanislav Atanasov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity Risks and Challenges in the Covid-19 Pandemic</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">disinformation</style></keyword><keyword><style  face="normal" font="default" size="100%">distant work</style></keyword><keyword><style  face="normal" font="default" size="100%">propaganda</style></keyword><keyword><style  face="normal" font="default" size="100%">social isolation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">38</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The COVID-19 pandemic caused a worldwide crisis with health, social, psychological, economic and political consequences. The imposed social isolation has leа to an exceptionally intensive use of Internet and revolutionary digitalization of human life in its interactive professional, academic and entertainment aspects. The cybersecurity risks also increased, which made cyber risk reduction, protection and response more challenging. This analysis reviews the typical risks and vectors of cyberattacks in a situation of increased digitalisation, as well as main countermeasures. Special attention is paid to propaganda and disinformation as specific cybercrimes critical to the social systems.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Evgeni Andreev</style></author><author><style face="normal" font="default" size="100%">Mariya Nikolova</style></author><author><style face="normal" font="default" size="100%">Veselka Radeva</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">mobile lunar base</style></keyword><keyword><style  face="normal" font="default" size="100%">NASA</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation exploration experience</style></keyword><keyword><style  face="normal" font="default" size="100%">space computing simulations</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">321-333</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The article presents research and numerical experiments related to the participation of authors and students from Nikola Vaptsarov Naval Academy in the NASA International Program: Simulation Exploration Experience (SEE) 2020 for the creation of computer simulations of federations on the moon. A Mobile Lunar Base has been designed, in which the fol-lowing processes are controlled with Artificial Intelligence: movement of three lunar platforms; control of the biosphere used to produce and purify air, water and food; control of a space airport for transfer of employees, passengers and tourists; control of security systems and a cybersecurity module.&lt;/p&gt;&lt;p&gt;The following simulation and programming tools are used: Specially licensed software from NASA; 3D modeling with SketchUP, Blender and AutoCAD; Java programming. The authors analyze the dangers in the Mobile Lunar Base; the possible methods, ways and means for protection, prevention and dealing with each of the analyzed threats. He article concludes with a summary on the security of the systems for provision of cyber and space security of the Mobile Lunar Base.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">321</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Governance Model of a Collaborative Networked Organization for Cybersecurity Research</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CNOs</style></keyword><keyword><style  face="normal" font="default" size="100%">Collaborative Networked Organisations</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">governance model</style></keyword><keyword><style  face="normal" font="default" size="100%">Science and Technology</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">79-98</style></pages><abstract><style face="normal" font="default" size="100%">This article presents the results of the analysis of governance and management practices of Collaborative Network Organisations (CNOs) in the Science and Technology domain. The aim is to support the process of de-signing a governance model of a cybersecurity network by identifying best governance and management practices of existing collaborative networks. The results presented in the article are based on the analysis of governance models of three relevant organisations: (1) NATO Science and Technology Organization; (2) the Gigabit European Academic Network; and (3) the European Defence Agency’s Capability Technology Groups. The common ground is that they are regarded as CNOs with a high degree of centralisation of funding streams and a high degree of centralisation of the main business and governance decisions. The method of analysis includes a literature review and desktop research. The information sources used for the analysis are official legal documents about the CNO’s governance and management, especially for potential members and customers’ engagement; organisation and expected competence level and behaviour of CNOs’ members; the charters, decisions, reports issued and approved by the central or regional governance bodies of the organisations.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">79</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author><author><style face="normal" font="default" size="100%">Vasilis Katos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">case study</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning system</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing models</style></keyword><keyword><style  face="normal" font="default" size="100%">trust models</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">198-214</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share information to provide up to date information to all constituents involved in the EWS. The development of EWSs will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains. This article is the result of a qualitative multiple-case study analysis. It consists of theory development by systematic reviews of academic articles, seven case studies, and cross-case conclusions, from which a set of system requirements and features were established to support a model that promotes information sharing among partners, while also meeting regulatory requirements. Moreover, the final analysis includes the requirements for information sharing within and between partners across organisational boundaries as derived from multi-sector analysis. The study consists of a comprehensive review of information sharing and trust models from within the cyber domain (n &gt; 50), as well as models from other domains, such as healthcare, maritime and critical infrastructure protection.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">198</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lior Tabansky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Israel Defense Forces and National Cyber Defense</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cyber defence</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber operations</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">doctrine</style></keyword><keyword><style  face="normal" font="default" size="100%">roles of the Israel Defense Forces</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">45-62</style></pages><abstract><style face="normal" font="default" size="100%">Cybersecurity in and of itself is not particularly new. Contemporary opportunities to exploit vulnerabilities, however, make this a challenging field. It is only natural that rivals exploit newly created opportunities. Conflict, in which adversarial relationships have a cyber dimension, is here to stay. Accordingly, societies must devise an appropriate organization to protect themselves from intentional threats. This article surveys Israel’s approach, outlining the origins and the evolution of the national cyber defense, prevailing threats, doctrinal challenges, and the role military services play in cyber defense.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Salvatore Marco Pappalardo</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Logical Model for Multi-Sector Cyber Risk Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber risk assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">E-MAF</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">essential services</style></keyword><keyword><style  face="normal" font="default" size="100%">interdependencies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">13-26</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The increasing reliance on digital infrastructures makes whole sectors of the economy and public services vulnerable to attacks through cyberspace. Some progress has been made in understanding vulnerabilities and ways of reducing cyber risk at the sub-sectoral level. While the sectoral level remains a significant challenge, this study goes beyond, also addressing cyber risk resulting from the cross- and multi-sectoral interdependencies in a consistent logical model. The paper presents the scope of this logical model, outlines the problem of risk assessment, structured around the triplet &amp;ldquo;Threats &amp;ndash; Vulnerabilities &amp;ndash; Impact,&amp;rdquo; and the structuring of risk mitigation around types of risk reduction measures, the objective of decision-making on risk treatment, and the modalities of application. We provide examples of the implementation of the logical model, underlying the ECHO Multi-sector Assessment Framework, and conclude by emphasising the advantages the logical model and the framework provide.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">13</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digitization</style></keyword><keyword><style  face="normal" font="default" size="100%">PRNG</style></keyword><keyword><style  face="normal" font="default" size="100%">RNG</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">62-76</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The provision of cybersecurity is of basic importance for every effective information system. It is possible to provide most rich information services, but only one neglected cybersecurity risk may compromise the system and all services it provides. Therefore, meeting the cybersecurity requirements is a prerequisite for the safety and security of IT infrastructures, digital resources, and the protection of private data. In that respect, the themes of cryptography and sufficiently robust random number generation are of particular interest. This article looks for the “golden ratio” between the provision of mass services and the efforts to meet cybersecurity requirements. It suggests a method and discusses the possibilities to increase the cryptographic protection in information systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">62</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dimo Dimov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">encryption</style></keyword><keyword><style  face="normal" font="default" size="100%">extraction</style></keyword><keyword><style  face="normal" font="default" size="100%">malicious</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">measurement</style></keyword><keyword><style  face="normal" font="default" size="100%">ransomware</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">317-327</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A  of HDD metrics is successfully collected and extracted.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">317</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Andrey Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Public Key Generation Principles Impact Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Miller-Rabin primality test improvement</style></keyword><keyword><style  face="normal" font="default" size="100%">Public Key Cryptography</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">249-260</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">249</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Inna V. Stetsenko</style></author><author><style face="normal" font="default" size="100%">Maksym Demydenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Signature-based Intrusion Detection Hardware-Software Complex</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">SQL injection</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword><keyword><style  face="normal" font="default" size="100%">web attack</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">221-231</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users’ private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet connection; therefore, the efforts should be directed to the way in which data packets are transmitted. The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices on one subnetwork with access to the Internet, simultaneously analysing and filtering both downstream and upstream traffic at packet level, resolving scumware and securing the perimeter of each device in the subnet. The concept and the architecture of the developed hardware-software complex are described. The implemented complex will not allow malicious traffic to pass through, providing protection of all endpoint devices in a subnetwork. The experimental results of malware detected are presented, and the security related metrics are evaluated.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">221</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kirsi Aaltola</style></author><author><style face="normal" font="default" size="100%">Harri Ruoslahti</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Societal Impact Assessment of a Cyber Security Network Project</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competence development</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">innovation</style></keyword><keyword><style  face="normal" font="default" size="100%">network co-creation</style></keyword><keyword><style  face="normal" font="default" size="100%">organisational learning</style></keyword><keyword><style  face="normal" font="default" size="100%">skills acquisition</style></keyword><keyword><style  face="normal" font="default" size="100%">societal impact assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">53-64</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The European Union promotes innovation through its funding programmes for research and innovation. To support the innovation process, one of these projects, ECHO, aims to deliver a Societal Impact Assessment (SIA) toolkit to assess the impact of establishing a European network of cybersecurity competence centres. This article provides an overview of the theoretical foundations on network co-creation and inter-organizational knowledge transfer as learning outcomes, and discusses these approaches in performing impact assessment at the societal level. Literature review on evaluation and assessment, co-creative innovation, and learning approaches are examined, summarized and combined into a learning and SIA-outcomes Matrix. Measurement of impacts through a digital Societal Impact Assessment toolkit can improve the quality of the value creation. Towards that purpose, we offer an approach that combines traditional evaluation and assessment, co-creative innovation, learning and SIA-outcomes in a practical Matrix to provide an applicable element towards a more comprehensive SIA-toolkit for the ECHO network.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">53</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mariia Pleskach</style></author><author><style face="normal" font="default" size="100%">Valentyna Pleskach</style></author><author><style face="normal" font="default" size="100%">Andrii Semenchenko</style></author><author><style face="normal" font="default" size="100%">Danylo Myalkovsky</style></author><author><style face="normal" font="default" size="100%">Taras Stanislavsky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity standards</style></keyword><keyword><style  face="normal" font="default" size="100%">standardization organizations</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">45</style></volume><pages><style face="normal" font="default" size="100%">57-76</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;This article demonstrates the similarity of approaches to standardization in the field of cybersecurity carried out by international standardization organizations (ISO, ITU, ETSI), leading regional organizations and selected countries. The authors consider necessary that Ukrainian committees of standardization report on the effectiveness of adopted cybersecurity standards. The harmonization of national with the international standards is essential for saving financial resources and time, and ensuring cross-border cooperation. The article considers a number of standardization organizations and approaches and a list of priority international standards of highest priority for improving the Ukrainian system of regulatory and technical documents on cybersecurity.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Variety of University Cyber Security Programs - Is it Useful and Justified?</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bachelor program</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">higher education</style></keyword><keyword><style  face="normal" font="default" size="100%">master program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybersecurity capabilities have long been not a luxury but a real necessity stemming from the development of technology and the associated threats, vulnerabilities and risks. A key component of these capabilities are the cybersecurity experts, who contribute their knowledge, skills and experience. In this regard, universities&amp;#39; efforts to launch cybersecurity programs seem justified and understandable. Is it possible that competition between universities and oversaturation with the university programs in the field of cybersecurity will lead to an unjustified expansion of the portfolio of taught knowledge and a shift in the focus from building the required capabilities? This report seeks answer to this and related questions on the academic contribution to cybersecurity.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Notis Mengidis</style></author><author><style face="normal" font="default" size="100%">Theodora Tsikrika</style></author><author><style face="normal" font="default" size="100%">Stefanos Vrochidis</style></author><author><style face="normal" font="default" size="100%">Ioannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">blockchain</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Energy Grid</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Contracts</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Grid</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">21-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Renewable energy sources and the increasing interest in green energy have been the driving forces behind many innovations in the energy sector, such as how utility companies interact with their customers and vice versa. The introduction of smart grids is one of these innovations in what is basically a fusion between the traditional energy grid with the IT sector. Even though this new combination brings a plethora of advantages, it also comes with an increase of the attack surface of the energy grid, which becomes susceptible to cyberattacks. In this work, we analyse the emerging cybersecurity challenges and how the ensuing risks could be alleviated by the advancements in AI and blockchain technologies.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author><author><style face="normal" font="default" size="100%">Ilkka Tikanmäki</style></author><author><style face="normal" font="default" size="100%">Jari Räsänen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">maritime surveillance</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">215-235</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ECHO project aims at organizing and coordinating an approach to strengthen proactive cyber security in the European Union through effective and efficient multi-sector collaboration. One important tool for this aim is the ECHO Early Warning System (E-EWS). The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains. In 2009, the Commission adopted a Communication Towards the integration of maritime surveillance in the EU: “A common information sharing environment for the EU maritime domain (CISE),” setting out guiding principles towards its establishment. The aim of the COM(2010)584 final was to generate a situational awareness of activities at sea and impact overall maritime safety and security. As a outcome of COM(2010)584 final, the EUCISE2020 project has developed a test-bed for maritime information sharing. This case study analyses information sharing models in the maritime domain, the EUCISE2020 test bed and the CISE itself as an alternative for cyber information sharing system. The maritime sector represents a suitable research case because it is already digitized in many aspects. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">215</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computationally intensive functions in designing and operating distributed cyber secure and resilient systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agility</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">distributed systems</style></keyword><keyword><style  face="normal" font="default" size="100%">high-performance computing</style></keyword><keyword><style  face="normal" font="default" size="100%">operations</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">risk management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> 21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%"> 8-18</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Increasing incorporation of advanced information technologies makes business and public organisations more effective and efficient, while often introducing exploitable vulnerabilities. The efficient provision of security of interconnected, and interdependent, processes and sectors against cyberattacks requires deep understanding of vulnerabilities, exposure, potential negative impact, as well as the contribution existing and emerging organisational and technological solutions will potentially have on preventing attacks, reducing vulnerabilities, protecting digital infrastructures, response and recovery, and resilience. Such understanding will allow minimisation of risks against a spectrum of plausible cyber threats and reducing negative consequences of one or a series of cyberattacks.&lt;/p&gt;&lt;p&gt;Due to the complexity of the problem, the effective implementation of a number of functions and tasks in designing and operating distributed cyber secure and resilient systems require significant computational resources. This paper outlines six high-level, computationally demanding functions. The first three relate to the formulation and implementation of cybersecurity policy: understanding risk; planning and implementing cybersecurity measures; and continuous adaptation to the changing technological, threat and policy landscape. The other three functions are operational: situational awareness, including detection of cyberattacks and hybrid malicious activities; operational decision making, e.g. selecting a course of action under attack; and cyber forensics.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikola Saranov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">private sector</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">98-112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Digital transformation is not only a one-time effort that a company wishes to go through, but an entirely new vision on the evolution of business processes in the context of inevitable movement to the information age. Having in mind the nature of this movement, organizations should work hand in hand with each other and together to cooperate with the governments worldwide in order to establish secure environment for developing and implementing new technologies and innovations. This paper is focused on the essence of such interactions and the challenges before the organizations and gives valuable examples and suggestions for ensuring on-site security, as well as the best practices which demonstrate how the business could impact the creation of cybersecurity norms locally and globally. Additionally, the paper reviews the most recognized regulations in the area of cybersecurity and industry best practices applicable to the demands of the digital transformation.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">98</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jouni Pöyhönen</style></author><author><style face="normal" font="default" size="100%">Viivi Nuojua</style></author><author><style face="normal" font="default" size="100%">Martti Lehto</style></author><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">vital societal functions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">236-256</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cybersecurity-related capabilities play an ever-growing role in national security, as well as securing the functions vital to society. The national cyber capability includes the resilience of companies running critical infrastructures, their cyber situational awareness (SA) and the sharing of cybersecurity information required for cyber SA. As critical infrastructures become more complex and interdependent, ramifications of incidents multiply. The EU Network and Information Security Directive calls for cybersecurity collaboration between EU member states regarding critical infrastructures and places the most crucial service providers and digital service providers under security-related obligations. Developing better SA requires information sharing between the different interest groups and enhances the preparation for and management of incidents. The arrangement is based on drawing correct situation-specific conclusions and, when needed, on sharing critical knowledge in the cyber networks. The target state is achieved with an efficient process that includes a three-level—strategic, operational and technical/tactical—operating model to support decision-making by utilizing national and international strengths. In the dynamic cyber environment strategic agility and speed are needed to prepare for incidents. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">236</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">DIGILIENCE - A Platform for Digital Transformation,  Cyber Security and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">DIGILIENCE</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">emerging technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid influence</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">intuitionist fuzzy logic</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The ongoing digital transformation requires significant investments and innovation to provide security of cyberspace and variety of critical infrastructures and essential services that increasingly depend on the digital infrastructure, as well as to enhance the resilience of organizations, communities, industries, nations, and alliances in the face of malicious use of cyberspace.&lt;/p&gt;&lt;p&gt;This volume presents 28 of the papers, accepted for presentation at the DIGILIENCE 2019 conference, dealing with cyber information sharing and situational awareness, the benefits and challenges of emerging technologies, such as artificial intelligence, the human factor, education and training for cyber security and resilience, the need to incorporate the cybersecurity efforts into the search for effective and efficient exploitation of information technologies, policies and solutions for security and resilience of Industry 4.0 and critical infrastructures, analysing and countering hybrid influence through social networks and more traditional media. The DIGILIENCE series of conferences will promote the sharing of knowledge and experience and facilitate the spread of good practice in IT governance, cyber security and resilience.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Kopchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competence</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial capacity</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Regulation 630</style></keyword><keyword><style  face="normal" font="default" size="100%">research and technology</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">67-81</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to a dispersed research and industrial capacity and often disconnected national markets, it is challenging for the European Union to compete with world leaders providing cybersecurity products and services and thus to support its ambition to achieve strategic autonomy in the cyber domain. This article explores one of the intended remedies - the proposal for an EU Regulation establishing the European Cybersecurity Industrial, Technology and Research Competence Centre and the Network of National Coordination Centres. Analysing legal, organisational and financial measures, the author posits that the expected regulation, if properly implemented, can fill in an important gap in the current legislative framework of the European Union.  </style></abstract><section><style face="normal" font="default" size="100%">67</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tobias Fiebig</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Governance Challenges for European Cybersecurity Policies: Stakeholders Views</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">Horizon 2020</style></keyword><keyword><style  face="normal" font="default" size="100%">network organization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The author outlines possible approaches to cybersecurity governance and compares them against the EU proposal of a Network of Competence Centers, which should manage all European cybersecurity funding. He then presents results of testing this policy proposal against the opinions of key stakeholders (senior administrators from European Agencies, Data Protection Authorities, CISOs, managers, and academics) from the European economic area.&lt;/p&gt;&lt;p&gt;The presentation reflects results of the from the &lt;a href=&quot;https://www.cybersec4europe.eu/&quot;&gt;CyberSec4Europe project&lt;/a&gt; &amp;ndash; one of the four pilot projects aiming to establish and operate a pilot for a European Cybersecurity Competence Network and develop a common European Cybersecurity Research &amp;amp; Innovation Roadmap.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Walter Matta</style></author><author><style face="normal" font="default" size="100%">Alessandro Cantelli-Forti</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An innovative Airport Physical-cyber Security System (APSS)</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">airport security</style></keyword><keyword><style  face="normal" font="default" size="100%">Counterterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-physical systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Data Fusion</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">285-293</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Considering the number of airports in the world, the 100 of millions of people who work at or pass through them and the relatively small amount of vulnerabilities, which have come to fruition to date, it must be concluded that airports already have a largely adequate level of security and resilience. Recent attacks in Brussels and Paris have, however, indicated that there is still room for improvement. In addition, one should be aware of the increased number of terrorist attacks also exploiting the increased availability of advanced low-cost technology, such as jammers. Thus, we propose to operate the logical division of the airport into physical-cyber security-control, where a multi sensor data fusion is made on two levels: (i) data fusion within each segment, in order to generate the alarms, and (ii) correlation of the &amp;ldquo;segment alarms&amp;rdquo; in order to reduce the false (positive and negative) detection rate.&lt;/p&gt;&lt;p&gt;In the proposed solution, data resulting from the two fusion processes are viewed and made available by a Web Portal accessible by security officers and police, increasing the physical-cyber situational awareness and decision making. This approach dramatically increases the confidence level of threat detection, minimizes the false (positive and negative) rate, due to both initial correlation of alarms within the same segment and the final correlation of the alarm coming from different segments. This allows to proactively take countermeasures against such threats.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">285</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Main considerations in elaborating organizational information security policies</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information security management</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%">68-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the increasing reliance on information technologies, cloud services and internet as communications media, businesses, public and societal organizations face growing threats from cyberspace and, respectively, demands to protect sensitive data and information they collect, use, and disseminate. This paper elaborates on the key considerations organisations with more limited resources, such as schools, universities, research institutes and public organizations need to take into account in designing and implementing a respective information security policy. We start with a description of context and definition of the scope of information security policy, in particular delineating &amp;#39;information&amp;#39; and &amp;#39;cyber&amp;#39; security, and provide an overview of the most prominent frameworks and standards. On that basis we elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Depending of the specifics of their work, any school, university, institute and municipality may use this elaboration as a starting point in devising its own information security policy.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">expert assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;While technological solutions are being developed to enhance cyber security, there is increasing awareness that besides a technical approach the role of human performance, decision making and organizational culture are critical to increase the effectiveness of responses to evolving cyber threats. Hence, the focus of this paper is on the role of the human factors in cyber security. It presents an analysis of data from a Subject Matter Experts&amp;rsquo; study carried out in Bulgaria in the end of 2018 in the framework of the project &amp;ldquo;Cyber security and opportunities for application of innovative technologies in the state administration of the Republic of Bulgaria.&amp;rdquo; The data was collected via online survey from 92 experts from the state administration, academia and business organizations.&lt;/p&gt;&lt;p&gt;&amp;nbsp; The paper covers the following topics: 1) The most important issues in cyber security in Bulgaria and the role of the human factors among them; 2) Recruitment, Retention, Education &amp;amp; Training of IT personnel; 3) The human factors as a source of security breaches; and 4) Future research in the area of human factors in cyber security. Based on the analysis of the data, conclusions and recommendations are summarized regarding the ways to change the role of the human factor from the system&amp;rsquo;s &amp;ldquo;weakest link&amp;rdquo; to a powerful resource to detect and mitigate cyber threats.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Strategy, Partnerships and Human Capital for Cyber Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">academic network</style></keyword><keyword><style  face="normal" font="default" size="100%">civil-military cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">e-signature</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">strategic planning</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The editorial article introduces volume 42 of &lt;em&gt;Information &amp;amp; Security: An International Journal&lt;/em&gt; covering topics from strategy development through building of digital ecosystem to academic support of cyber security entities and the European Union initiative to enhance cybersecurity competencies through coordination among national centres and networks. The review covers specific aspects of talent development by an innovative e-platform for training. Specific aspects of the role of Chief Information Officer / Chief Information Security Officer in public administration are highlighted and approaches for improvement using new IT are discussed. A review of the EU legal developments in cyber research and network of expertise evolving are addressed. As in every issue special paper is covering STEM problem, related to &lt;em&gt;ElGamal digital signature&lt;/em&gt;.&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Volodymyr Zaslavskyi</style></author><author><style face="normal" font="default" size="100%">Maya Pasichna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">diversification and optimization</style></keyword><keyword><style  face="normal" font="default" size="100%">energy mix</style></keyword><keyword><style  face="normal" font="default" size="100%">information technology</style></keyword><keyword><style  face="normal" font="default" size="100%">type-variety principle</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">318-330</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">As the nexus between sustainability, economic efficiency and energy security becomes closer, the creation of reliable and accessible power systems becomes critical. This study seeks to find, analyse and synthesize information from various sources to assess the structure of electricity generation in order to create information technology for diversification and optimization of the energy portfolio/mix. This is essential in order to ensure electricity supply (generation) stability and reliability, guarantee power quality for the end users of electricity. With the goal of optimising and managing the structure of electricity generation mix for electricity providers, our research focuses on combining different electricity generation technologies, maximising the value of the portfolio, e.g. ensuring energy security, and minimising the portfolio’s environmental footprint. One of the major findings is that the most effective and optimal scenario for energy mix development does not always coincide with the policies of the governments and companies’ strategies. The paper presents also the difference between the current and future optimal mix.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">318</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kirsi Aaltola</style></author><author><style face="normal" font="default" size="100%">Petteri Taitto</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">education and training</style></keyword><keyword><style  face="normal" font="default" size="100%">exercises</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational learning</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">123-133</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Development of information technology and the globalization require constant investment in people. New and emerging technologies such as autonomous systems, machine learning and AI radically re-contextualize the human dimension of the organization. Strategic changes have revealed new critical vulnerabilities such as social media-based election meddling and disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Education and training raise the level of expertise, skills and competences and ensure better performance in complex cyber situations. Researchers have addressed assumptions, models, concepts and cognitive aspects of human performance in the cyber domain. However, the theories and approaches of human learning in training and exercises are only partly touched. New techniques for enhancing organizational cyber resilience to cyber-attacks are needed and they still lack sound theoretical foundations.&lt;/p&gt;&lt;p&gt;This article aims to advance the discussion suggesting viewpoints on training and exercises in the cyber domain, taking into consideration specifics of skills in cyber security. It provides overview of theories of learning to better support human performance. Our critical interpretation enhances the comprehensive understanding of decision-making, learning theories, and design of cyber security training and exercises. Furthermore, our intention is to constructively promote discussion on current issues about human learning in cyber training and education and thus boost multidisciplinary studies to enhance cyber awareness.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sean Costigan</style></author><author><style face="normal" font="default" size="100%">Greg Gleason</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">blockchain</style></keyword><keyword><style  face="normal" font="default" size="100%">Counterterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptocurrency</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">international security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">13-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems--or creating new ways of business--are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">13</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">William Chim</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Russia’s Digital Awakening</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Eastern Europe</style></keyword><keyword><style  face="normal" font="default" size="100%">foreign policy</style></keyword><keyword><style  face="normal" font="default" size="100%">information operations</style></keyword><keyword><style  face="normal" font="default" size="100%">intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">5-17</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;Since the fall of the Soviet Union, Russia has been unprecedented in its embrace of modern technology for the execution of its foreign policy and intelligence operation. This article examines Russia&amp;rsquo;s relationship to the internet and computer technology, beginning with the early 1990s and detailing the growth of technology&amp;rsquo;s popularity with the Russian public and Russian government up through 2017. Particular attention is paid to the skill with which Russia&amp;rsquo;s illiberal political institutions and security services exploit the &amp;lsquo;wild west&amp;rsquo; nature of the internet and the manipulable nature of modern technology and media, as well as how and why the West and U.S. failed to anticipate Russia&amp;rsquo;s rise as a digital superpower and continue to fail to counter its dominance.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security and Resilience of Modern Societies: A Research Management Architecture</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bio-integrated systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">drone</style></keyword><keyword><style  face="normal" font="default" size="100%">ERP</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial control systems</style></keyword><keyword><style  face="normal" font="default" size="100%">R&amp;T management</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">systems of systems</style></keyword><keyword><style  face="normal" font="default" size="100%">UxVs</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">38</style></volume><pages><style face="normal" font="default" size="100%">93-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advanced information and communications technologies (ICT) facilitate the increase of effectiveness and efficiency of defence and security organizations, governmental services, the economy, and quality of life, while at the same time providing opportunities for malicious actors to cause significant damage without exercising physical coercion. Policies for security and resilience of modern societies to threats and risks from the cyberspace account for foreseen cyber threats, their immediate impact on ICT infrastructure, consequent effects on critical services, as well as cascading effects across systems and infrastructures. This paper presents the architecture used to plan and, consequently, manage cybersecurity research in Bulgaria. It covers five application areas (information management systems; industrial control systems; unmanned and remotely piloted vehicles; bio-integrated systems; and cognitive processes and decision-making), the study of systems of systems, and support to the formulation and implementation of cybersecurity policy.</style></abstract><section><style face="normal" font="default" size="100%">93</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lachezar Petrov</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">critical information infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber model</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2-6, 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Brunow, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">National and international security, our financial, industrial as well as economic prosperity, healthcare system and national well-being as a whole are dependent on critical infrastructures, which could be described as highly interdependent. Many examples are available such as the national electrical grid, oil and natural gas systems, telecommunication and information networks, transportation networks, water systems, and banking and financial systems. Keeping them in reliable and secure state and study their dependencies is paramount for every government or organization. There is an urgent need of their classification. Creation and development of model and methodology which could describe their behaviors is going to make this world safer. The presented here model and based on it study and initial results are steps toward reliable and secure critical information infrastructure.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jüri Vain</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enhanced Education for Cybersecurity and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">SEREIN</style></keyword><keyword><style  face="normal" font="default" size="100%">TEMPUS</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Inna Skarga-Bandurova</style></author><author><style face="normal" font="default" size="100%">Alexandr Ryazantsev</style></author><author><style face="normal" font="default" size="100%">Katerina Kiryushatova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">curriculum</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">enterprise</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial control system</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">123-132</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the results of designing and implementing an educational programme in risk analysis of security and resilience of critical infrastructures. The main goal of the programme is to create a knowledge base for multidisciplinary research on critical infrastructure risk management and develop a security curriculum for suitable and recognized industry and academic experts. It is expected that this programme will allow training of highly-qualified specialists and arm them with up-to-date tools and techniques enabling security risk assessment, risk management, and response to new challenges of cyber society.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Generic Reference Curriculum on Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competence framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">policy-making</style></keyword><keyword><style  face="normal" font="default" size="100%">technical expertise</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">181-184</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A volunteer group of academics and practitioners embarked on a two-year project to develop a generic reference curriculum on cybersecurity on behalf of NATO and the Partnership for Peace Consortium. This paper provides a brief overview of the result of this work - a curriculum that is recommended as a starting point for any university or training organization considering a program in the field of cybersecurity. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">181</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Raymond Collier</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Obama Administration and Incident Response: A Report</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Barack Obama</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">incident response</style></keyword><keyword><style  face="normal" font="default" size="100%">law</style></keyword><keyword><style  face="normal" font="default" size="100%">legislature</style></keyword><keyword><style  face="normal" font="default" size="100%">NCIRP</style></keyword><keyword><style  face="normal" font="default" size="100%">Obama Administration</style></keyword><keyword><style  face="normal" font="default" size="100%">proposals</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">105-120</style></pages><abstract><style face="normal" font="default" size="100%">This article takes an in-depth look at the Obama Administration’s incident response plan and its utilization in regard to cyber security throughout their Presidential and Executive-Administrative terms. A focal point and outlining the tool used in the report is the National Cyber Incident Response Plan (Interim Version), released in September 2010 by the Department of Homeland Security. Contents of the response plan are analyzed through brief descriptions, government reports, supportive literature, and comparison of actual efforts conducted by the Administration that reflect sections of the plan. A brief review of legislature that could directly affect the process, assurance, or future of incident response and cyber security proposed by the Administration is included. Discussion of the current presiding President, Barack Obama, and his mannerisms in the wake of incidents, thoughts and views on the nature of the subject, actions planned as well as taken to secure the United States’ technological realm, that is the internet, from digital terrorism are micro-scoped and provide a real-time wealth of how incident response is being handled in the U.S.; the past struggles appertained and a glimpse into its architectural future. The report collectively parallels the Administration’s formulated incident response plan with their actual actions on real-life incidents in an attempt to provide present-day documentation of resolutions pertaining to incidents and cyber security in the U.S.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">105</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleksandr V. Potii</style></author><author><style face="normal" font="default" size="100%">Roman V. Oliynykov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ukrainian Educational System in the Field of Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">educational system</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">11-27</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Main threats and challenges to cybersecurity are considered in this article from an educational perspective. The authors analyse the system of higher educa¬tion in the field of information and cybersecurity, present the standards of education in the field of information security, outline the system of universities in Ukraine, as well as analysis of a number of practical cases.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">11</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Natalia Spinu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Creating and Strengthening Cybersecurity in the Republic of Moldova</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">law enforcement</style></keyword><keyword><style  face="normal" font="default" size="100%">legal base</style></keyword><keyword><style  face="normal" font="default" size="100%">Republic of Moldova</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">97-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Like most of the countries, Republic of Moldova faced the need of protecting its cyberspace against emerging cybersecurity threats. The lack of coordination between responsible institutions, established cybersecurity mechanisms, and well-trained specialists made private companies and public institutions an easy target for cyber attacks performed by malicious actors like hacktivist groups, terrorist organisations and state-sponsored companies. The consequences of such attacks damage reputation, business processes and affect the image of the country on the international scene. This article shares the experience of Moldova in the efforts of planning and building cybersecurity. It is written from the point of view of Moldova&amp;rsquo;s Cybersecurity Centre &amp;ndash; CERT-GOV-MD, whose governmental status and active involvement in national cybersecurity development processes allow to provide a broad overview of different situations, in which Moldova and its state institutions found themselves, and the problems faced along the road to achieving the stated goal. In this regard, the article covers the period from the initiation of building cybersecurity until the most current results.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Angela Okuku</style></author><author><style face="normal" font="default" size="100%">Karen Renaud</style></author><author><style face="normal" font="default" size="100%">Brandon Valeriano</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity Strategy’s Role  in Raising Kenyan Awareness  of Mobile Internet Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Mobile Internet threats</style></keyword><keyword><style  face="normal" font="default" size="100%">mobile security threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">155-174</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybersecurity has become a global concern, particularly in rapidly developing countries like Kenya. Kenya&amp;rsquo;s ICT revolution followed the laying of undersea cables in 2009. Kenya&amp;rsquo;s growth in Internet use has been facilitated by high proliferation and adoption of mobile communications. Speedy diffusion and adoption has exposed the Kenyan public to unprecedented individual security threats via the mobile platform. A national drive to foster awareness and nurture detection and coping skills is urgently required. This paper focuses on the role of governmental cybersecurity strategy in this area and explores the approaches to be used for improving public awareness of mobile Internet threats. Without addressing this vital aspect, the core aim of the strategy could be defeated, despite its comprehensiveness and excellence in other areas. This paper presents the outcome of an online study and comparative analysis of cybersecurity strategies of two developing countries. We conclude by proposing techniques for raising national awareness of cyber threats of mobile Internet, with a clear mandate to governments in developing countries to address this as a matter of urgency, and to include it in their respective cybersecurity strategies.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ata Atalay</style></author><author><style face="normal" font="default" size="100%">Gurur Sanci</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">2013-2014 Action Plan</style></keyword><keyword><style  face="normal" font="default" size="100%">counter-cyberterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberat-tack</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberpace</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberwar</style></keyword><keyword><style  face="normal" font="default" size="100%">Turkey</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Procon Ltd.</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">42-64</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Technological innovations leading to the industrial revolution in the 19th century have proceeded in an accelerated manner to lead to an information revolution in the 21st century. In addition to warfare in land, sea and air domains, &amp;ldquo;space&amp;rdquo; has emerged as a new field of operation. Further technological innovations have yet again set up another domain called &amp;ldquo;cyberspace,&amp;rdquo; dominated by information technologies with the capability to change the course of war on land, sea, air and/or space. Besides, organised crime and terrorist organisations, following the progress in cyberspace technologies, have increased their profits and developed new types of crime using new types of weapons. Attacks in the cyber domain evolve so rapidly that legal arrangements cannot cope with meeting security requirements and need to be frequently updated. On the other hand, new threats, such as &amp;ldquo;cyberterrorism,&amp;rdquo; necessitate wide-scope interpretation of the norms in international law. Turkey has taken several counter-cyberterrorism precautions. The establishment of the Cybersecurity Council, the adoption of the National Cybersecurity Strategy and of the 2013-2014 Action Plan are major steps in this regard. The rapid development in communication technologies has removed the national boundaries, increasing and gradually deepening the interaction between countries. Therefore, in order to strengthen cybersecurity efforts, it is necessary to further international cooperation as well as the cooperation between local public authorities and the private sector.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Philippe Vitel</style></author><author><style face="normal" font="default" size="100%">Henrik Bilddal</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">French Cyber Security and Defence: An Overview</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">ANSSI</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber defence</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberwar</style></keyword><keyword><style  face="normal" font="default" size="100%">defence and security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">France</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">07/2015</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Procon Ltd.</style></publisher><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">29-41</style></pages><language><style face="normal" font="default" size="100%">English</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;As threats to and in cyber space as well as the threats enabled by cyber space have burgeoned, cybersecurity and defence has emerged as a key policy area for governments around the world. For a long time, France has lagged behind its main strategic partners in these areas. However, in the recent years, the country has undertaken considerable efforts to catch up, leading to conceptual reformulation, organisational reforms, and substantial increases in resources. This article provides an overview of the conceptual basis for French cybersecurity and defence policies, the most important elements of its organisational set-up, and recent cyber efforts and initiatives. The article does not claim to be exhaustive, but aims to provide a starting point for structuring related research. While many French ministries and agencies are involved in cybersecurity, this article focuses on the efforts of the National Information Systems Security Agency (L&amp;#39;Agence nationale de la sécurité des systèmes d&amp;#39;information, ANSSI) and the ministries of defence and interior &amp;ndash; the actors most heavily involved in French cybersecurity and defence.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Threats and Challenges in Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 3.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">31</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report is based on an expert study and findings of related studies on the evolution of threats and challenges in cyberspace with a five-year outlook. The focus is technological and social aspect of current and future web solutions and services in the processes of communication and enhancing living environments in the digital age. We can forecast preservation of the role of the human factor as generator and user of technological innovation, with the consequent cyber threats in the new security environment. Anticipated threats in the 2020 horizon relate to the development of Web 3.0 technologies and 4G/5G communications, with emphasis on protection and control of personal space and data, cloud services, multimedia communication in social media, internet of things, robotic systems with artificial intelligence, and the effects of digital money. This report aims to support the development and the discussions of Bulgaria’s national cybersecurity strategy.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Levels of Cybersecurity Training and Education</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attribution theory</style></keyword><keyword><style  face="normal" font="default" size="100%">awareness based training</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">risk appetite</style></keyword><keyword><style  face="normal" font="default" size="100%">„balance of consequences“</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">117</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ambition of individuals and their organizations to achieve a desired level of cybersecurity may be subject to the application of different strategies. Known approaches to achieving cybersecurity involve the establishment of effective legal systems, innovative technical solutions, rational organizational structures, etc. The focus in discussions of cybersecurity remains on people and their training, which can lower the vulnerability to cyber attacks. Counting on such a strategy to build cybersecurity, it is important to properly understand that cybersecurity training can be constructed at several levels. Each of these levels has specific characteristics, such as the approach and methods used for training, and as a consequence is associated with different results in terms of the cybersecurity achieved.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Іhor Chernukhin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">legislation measures</style></keyword><keyword><style  face="normal" font="default" size="100%">Wi-Fi technology</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">79-86</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Along with WIMAX, Wi-Fi technology is one of the standards for construction of broadband wireless networks, WLAN, and provides an opportunity to ensure data communication at the distance of up to 100 m with the rate of 11-300 Mbit/sec within the range of 2.4-2.5 or 5.9 GHz. Along with a number of advantages (rate of scanning, equipment commissioning, data communication, possibility of informatisation of rural and remote areas), the main disadvantage of Wi-Fi networks is the low level of protection against unauthorized access. The current article focuses on problems related to such use of the Wi-Fi technology posing a threat to information security. It elaborates on the main vulnerabilities of the Wi-Fi technology and points out drawbacks of a legal nature. Finally, it suggests solutions to increased cybersecurity on the background of the mounting use of Wi-Fi technology in Ukraine.</style></abstract><section><style face="normal" font="default" size="100%">79</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yoana Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policies for the Protection of Critical Infrastructure from Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">simulations</style></keyword><keyword><style  face="normal" font="default" size="100%">threat</style></keyword><keyword><style  face="normal" font="default" size="100%">US</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">116</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper is addressed in details the policy of the US regarding the issues of cyber security that are contained in Presidential Policy Directive (PPD-21). The tasks that should be solved for evaluation and planning of critical infrastructure protection are clearly defined. The following are specific examples of approaches and means to protect critical infrastructure from cyber attacks.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Volodymyr Bik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">international cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">SBU</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">69-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The development of modern information technologies and innovations in all areas of life resulted in new threats to national and international security. Over the past decade, such threats as transnational cybercrime, cyber terrorism, the use of cyber weapons transformed from potential and hypothetical into real ones. Combating those threats has become a priority of the national security and defence sector. The article focuses on how the profound changes in the global security system, in combination with the evolution of the cyber threats, influenced the activities of the Security Service of Ukraine (SBU), turning the Service in a key element of the future national cyberse¬curity system. The author reasons for enhanced international cooperation and systematises practical examples of effective international efforts to counter cyber threats.</style></abstract><section><style face="normal" font="default" size="100%">69</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: A National Strategic Issue</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">108</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The modern information and communication age brought a complex of interdependencies among infrastructures that are essential for society and led to an exponential growth of vulnerabilities and risks. Hence, security of cyberspace turned into one of the most important challenges of Twenty first century, while cybersecurity is already seen as a cross-cutting, strategic national issue that impacts all societal levels. National cybersecurity strategies are expected to provide answers to the novel challenges and to guarantee security of cyberspace. This report provides analysis available national cyber strategies that allows identification of good practices and remaining gaps. For Member States of the European Union it is important to synchronize their national strategies with the EU strategy for cybersecurity.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Luca Urciuoli</style></author><author><style face="normal" font="default" size="100%">Toni Männistö</style></author><author><style face="normal" font="default" size="100%">Juha Hintsa</style></author><author><style face="normal" font="default" size="100%">Tamanna Khan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Supply Chain Cyber Security – Potential Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain crime</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">51-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The same Information and Communication Technologies (ICT) that have contributed tremendously to the productivity of supply chain companies and gov¬ernments alike, as well as to the global competitiveness of the European Union, ex¬pose modern societies to a range of cyber threats. ICT systems are fundamental to ensure that undisrupted flows of merchandise and critical supplies, such as oil, minerals, rare earths, pharmaceuticals and food are moved in and out of the EU ter¬ritory. Past events have revealed the vulnerability of global supply chains to crime and terrorism. However, previous research does not highlight how these threats may be affected with the support of cyber attacks. Hence, by means of a literature review and experts’ validation, this study develops a set of three scenarios that outline how cybercrime could jeopardize security of supply chains and, consequently, the well-being of European citizens. Fi¬nally, implications for managers and EU agencies are discussed.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">51</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity as a Relative Concept</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Economic Analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Illegal Behavior</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">11-24</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Based on the relativity of the concept of cybersecurity, this article analyzes the economic impact of cybersecurity breaches, identifies cybersecurity as a private good that should be provided mainly by the private sector. However, public provision is also necessary when severe security breaches occur and liability mechanisms should be triggered.</style></abstract></record></records></xml>