Security Policy: Rules for Cyberspace

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A computer worm infests Iranian nuclear power plant systems, a cyberattack cripples sections of the Ukrainian electrical grid, intruders penetrate the German Parliament’s IT system and steal sensitive data. No longer merely the stuff of science fiction novels, cyberspace as a setting for security policy disputes and even a stage for conflicts, has long since become part of our reality.

Cite

CITATION STYLE

APA

Ischinger, W. (2017). Security Policy: Rules for Cyberspace. In Management for Professionals (Vol. Part F602, pp. 13–20). Springer Nature. https://doi.org/10.1007/978-3-319-46529-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free