EconPapers    
Economics at your fingertips  
 

Analysis and Estimation of Expected Cyber-Attack Scenarios and Consequences

Roberto Mugavero and Valentina Sabato

Journal of Information Privacy and Security, 2014, vol. 10, issue 3, 138-152

Abstract: The cyberspace is becoming one of the main elements of vulnerability in national security and has led to a critical situation because the system is always more focused on information sharing and on quick communication all over the world than security. The cyberspace is, in fact, the “easier vector” of the information environment, comprising independent networks of different communication and telecommunication infrastructures. Through this vector it is possible to perform a wide range of cyber-attacks, causing possibly huge negative effects on systems and assets; however, these attacks do not cause human loss or physical damages to the society. In order to protect from this danger, it is necessary to understand and analyze how many and which are the risks as well as the possible actions needed to minimize the consequences of a dangerous event.

Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2014.952963 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:10:y:2014:i:3:p:138-152

Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20

DOI: 10.1080/15536548.2014.952963

Access Statistics for this article

Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit

More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

 
Page updated 2025-03-20
Handle: RePEc:taf:uipsxx:v:10:y:2014:i:3:p:138-152