Security Policy: Rules for Cyberspace
Wolfgang Ischinger ()
Additional contact information
Wolfgang Ischinger: Stiftung Münchner Sicherheitskonferenz gemeinnützige GmbH
Chapter 2 in Cyber Security. Simply. Make it Happen, 2017, pp 13-20 from Springer
Abstract:
Abstract A computer worm infests Iranian nuclear power plant systems, a cyberattack cripples sections of the Ukrainian electrical grid, intruders penetrate the German Parliament’s IT system and steal sensitive data. No longer merely the stuff of science fiction novels, cyberspace as a setting for security policy disputes and even a stage for conflicts, has long since become part of our reality.
Keywords: Security Policy; Critical Infrastructure; Intelligence Service; Nuclear Bomb; Autonomous Weapon System (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-319-46529-6_2
Ordering information: This item can be ordered from
http://www.springer.com/9783319465296
DOI: 10.1007/978-3-319-46529-6_2
Access Statistics for this chapter
More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().