EconPapers    
Economics at your fingertips  
 

Security Policy: Rules for Cyberspace

Wolfgang Ischinger ()
Additional contact information
Wolfgang Ischinger: Stiftung Münchner Sicherheitskonferenz gemeinnützige GmbH

Chapter 2 in Cyber Security. Simply. Make it Happen, 2017, pp 13-20 from Springer

Abstract: Abstract A computer worm infests Iranian nuclear power plant systems, a cyberattack cripples sections of the Ukrainian electrical grid, intruders penetrate the German Parliament’s IT system and steal sensitive data. No longer merely the stuff of science fiction novels, cyberspace as a setting for security policy disputes and even a stage for conflicts, has long since become part of our reality.

Keywords: Security Policy; Critical Infrastructure; Intelligence Service; Nuclear Bomb; Autonomous Weapon System (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-319-46529-6_2

Ordering information: This item can be ordered from
http://www.springer.com/9783319465296

DOI: 10.1007/978-3-319-46529-6_2

Access Statistics for this chapter

More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-11
Handle: RePEc:spr:mgmchp:978-3-319-46529-6_2