Jump to ContentJump to Main Navigation
The Handbook of European Defence Policies and Armed Forces$
Users without a subscription are not able to see the full content.

Hugo Meijer and Marco Wyss

Print publication date: 2018

Print ISBN-13: 9780198790501

Published to Oxford Scholarship Online: July 2018

DOI: 10.1093/oso/9780198790501.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 19 June 2019

Cyber-Security Challenges

Cyber-Security Challenges

Chapter:
(p.523) 30 Cyber-Security Challenges
Source:
The Handbook of European Defence Policies and Armed Forces
Author(s):

Frédérick Douzet

Publisher:
Oxford University Press
DOI:10.1093/oso/9780198790501.003.0031

With the expansion of cyberspace, European armed forces are confronted by new challenges. Cyber threats keep growing more sophisticated, targeted, and powerful. Not only states, but also individuals, political groups, and criminal and terrorist organizations use these rather affordable and widely accessible technologies remotely to conduct operations such as espionage, sabotage, information warfare, or influence. Russian nationalist propaganda has made a powerful comeback on social networks, along with ISIS propaganda. Cyber attacks for neutralization or strategic espionage have increased in worrying proportions. The specificities inherent to cyberspace and the unusual intertwining of political, economic, and military issues represent a real challenge for the elaboration and the implementation of a strategic or tactical response. They also represent a challenge for international cooperation in crisis resolutions and the conduct of military operations.

Keywords:   cyber security, conflicts, war, critical infrastructures, geopolitics, Internet, cyberspace, warfare, networks, cyber attacks

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .