A computer worm infests Iranian nuclear power plant systems, a cyberattack cripples sections of the Ukrainian electrical grid, intruders penetrate the German Parliament’s IT system and steal sensitive data. No longer merely the stuff of science fiction novels, cyberspace as a setting for security policy disputes and even a stage for conflicts, has long since become part of our reality.
CITATION STYLE
Ischinger, W. (2017). Security Policy: Rules for Cyberspace. In Management for Professionals (Vol. Part F602, pp. 13–20). Springer Nature. https://doi.org/10.1007/978-3-319-46529-6_2
Mendeley helps you to discover research relevant for your work.