cyberattacks | ISPI
Salta al contenuto principale

Form di ricerca

  • ISTITUTO
  • PALAZZO CLERICI
  • MEDMED

  • login
  • EN
  • IT
Home
  • ISTITUTO
  • PALAZZO CLERICI
  • MEDMED
  • Home
  • RICERCA
    • OSSERVATORI
    • Asia
    • Digitalizzazione e Cybersecurity
    • Europa e Governance Globale
    • Geoeconomia
    • Medio Oriente e Nord Africa
    • Radicalizzazione e Terrorismo Internazionale
    • Russia, Caucaso e Asia Centrale
    • Infrastrutture
    • PROGRAMMI
    • Africa
    • America Latina
    • Global Cities
    • Migrazioni
    • Relazioni transatlantiche
    • Religioni e relazioni internazionali
    • Sicurezza energetica
    • DataLab
  • ISPI SCHOOL
  • PUBBLICAZIONI
  • EVENTI
  • PER IMPRESE
    • cosa facciamo
    • Incontri su invito
    • Conferenze di scenario
    • Formazione ad hoc
    • Future Leaders Program
    • I Nostri Soci
  • ANALISTI

  • Home
  • RICERCA
    • OSSERVATORI
    • Asia
    • Digitalizzazione e Cybersecurity
    • Europa e Governance Globale
    • Geoeconomia
    • Medio Oriente e Nord Africa
    • Radicalizzazione e Terrorismo Internazionale
    • Russia, Caucaso e Asia Centrale
    • Infrastrutture
    • PROGRAMMI
    • Africa
    • America Latina
    • Global Cities
    • Migrazioni
    • Relazioni transatlantiche
    • Religioni e relazioni internazionali
    • Sicurezza energetica
    • DataLab
  • ISPI SCHOOL
  • PUBBLICAZIONI
  • EVENTI
  • PER IMPRESE
    • cosa facciamo
    • Incontri su invito
    • Conferenze di scenario
    • Formazione ad hoc
    • Future Leaders Program
    • I Nostri Soci
  • ANALISTI

cyberattacks

A Practical Method for Minimization of Attack Surfaces in Information Warfare

Abstract

This article discusses a practical mechanism to guard against cyber attacks by reducing the applica-tion's exposure to hostile intentions. The article provides the underlying assumptions and theory of attack surface reduction. It then relates practical steps that the user can take to that theory. The outcome of those steps will be a more robust and secure application environment that will increase the effectiveness of defensive measures 

Cybersecurity and Critical Information Infrastructures

The critical information infrastructure (CII) represents the indispensable "nerves and blood" that allow modern societies to work and live. In fact, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. The CII allows remote control and management of commodities and services, thus reducing costs, to utility companies and consumers alike, and improving efficiency. But the CII was born and developed with an intrinsic, and potentially disastrous, defect: security was never considered a top priority. Today, organized crime, rogue groups or even states may plan to disrupt or destroy portion of the CII or essential services, thus putting in serious dangers governments and economies around the world. This paper outlines the major elements of the CII and the risks to which it might be subject today and tomorrow.

SEGUICI E RICEVI LE NOSTRE NEWS

Iscriviti alla newsletter Scopri ISPI su Telegram

Chi siamo - Lavora con noi - Analisti - Contatti - Ufficio stampa - Privacy

ISPI (Istituto per gli Studi di Politica Internazionale) - Palazzo Clerici (Via Clerici 5 - 20121 Milano) - P.IVA IT02141980157