VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased t...
| Published in: | Vestnik MGIMO-Universiteta |
|---|---|
| Main Author: | Elena Vladimirovna Batueva |
| Format: | Article |
| Language: | English |
| Published: |
MGIMO University Press
2014-01-01
|
| Subjects: | |
| Online Access: | http://mgimoreview.elpub.ru/jour/article/view/123 |
Similar Items
Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension
by: Elena Vladimirovna Batueva
Published: (2014-01-01)
by: Elena Vladimirovna Batueva
Published: (2014-01-01)
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
by: E. V. Batueva
Published: (2014-06-01)
by: E. V. Batueva
Published: (2014-06-01)
To the question of cyberterrorism and cybercrime
by: A A Galushkin
Published: (2014-12-01)
by: A A Galushkin
Published: (2014-12-01)
Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe
by: Vitaly V. Kabernik, et al.
Published: (2015-01-01)
by: Vitaly V. Kabernik, et al.
Published: (2015-01-01)
Cybersecurity policy of Obama’s Administration
by: E. V. Batuevа
Published: (2010-08-01)
by: E. V. Batuevа
Published: (2010-08-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
From cyber threat to hostile action in cyberspace
by: Adrian Victor VEVERA
Published: (2018-10-01)
by: Adrian Victor VEVERA
Published: (2018-10-01)
Hybrid nature of modern threats for cybersecurity and information security
by: Oleksandr TSARUK, et al.
Published: (2020-03-01)
by: Oleksandr TSARUK, et al.
Published: (2020-03-01)
Crimes in the sphere of information and communication technologies
by: Ilya Viktorovich Kalyukarin
Published: (2022-05-01)
by: Ilya Viktorovich Kalyukarin
Published: (2022-05-01)
SYSTEM APPROACH TO A SAFE INFORMATION AND EDUCATIONAL ENVIRONMENT OF A HIGH SCHOOL
by: Aleksandr Nicolaevich Privalov, et al.
Published: (2022-10-01)
by: Aleksandr Nicolaevich Privalov, et al.
Published: (2022-10-01)
Development of the Country’s Sustainable Cyberspace Strategy to Ensure the Country’s National Security
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
Cyber Security and Impact on Computer Crimes
by: Andrei Pântea
Published: (2022-10-01)
by: Andrei Pântea
Published: (2022-10-01)
Detection of unseen malware threats using generative adversarial networks and deep learning models
by: Chirag Joshi, et al.
Published: (2025-10-01)
by: Chirag Joshi, et al.
Published: (2025-10-01)
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
Cyber Threats for Organizations of Financial Market Infrastructures
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
Cyber threats to the Private Academic Cloud
by: Valerii Lakhno, et al.
Published: (2024-06-01)
by: Valerii Lakhno, et al.
Published: (2024-06-01)
Trends, challenges and solutions of digital information security in Central and Eastern Europe
by: Serhii Lubenets, et al.
Published: (2024-06-01)
by: Serhii Lubenets, et al.
Published: (2024-06-01)
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)
by: Bader Al-Sada, et al.
Published: (2024-01-01)
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
by: Ali Shan, et al.
Published: (2024-07-01)
by: Ali Shan, et al.
Published: (2024-07-01)
Editorial: The impacts of cyber threat in the maritime ecosystem
by: Adam Turner, et al.
Published: (2024-02-01)
by: Adam Turner, et al.
Published: (2024-02-01)
Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe
by: V. V. Kabernik, et al.
Published: (2015-08-01)
by: V. V. Kabernik, et al.
Published: (2015-08-01)
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
by: Kyoungmin Kim, et al.
Published: (2021-09-01)
by: Kyoungmin Kim, et al.
Published: (2021-09-01)
Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
The 2022-2023 Russia-Ukraine War and Cyberspace Threats
by: Lika Lagvilava
Published: (2023-08-01)
by: Lika Lagvilava
Published: (2023-08-01)
Current problems of international information security
by: Serhii Lubenets, et al.
Published: (2023-06-01)
by: Serhii Lubenets, et al.
Published: (2023-06-01)
Detection of «Telegram Rat» virus
by: A. I. Dubrovina, et al.
Published: (2024-04-01)
by: A. I. Dubrovina, et al.
Published: (2024-04-01)
ТЕНДЕНЦІЇ РОЗВИТКУ КІБЕРЗАГРОЗ У СВІТОВОМУ ІНФОРМАЦІЙНОМУ ПРОСТОРІ
by: Oleg R. Cherniak, et al.
Published: (2015-01-01)
by: Oleg R. Cherniak, et al.
Published: (2015-01-01)
A new lightweight data security system for data security in the cloud computing
by: Shameer Mohammed, et al.
Published: (2023-10-01)
by: Shameer Mohammed, et al.
Published: (2023-10-01)
Cybersecurity in The Health Sector in The Reality of Artificial Intelligence, And Information Security Conceptually
by: Muhammet Damar, et al.
Published: (2024-12-01)
by: Muhammet Damar, et al.
Published: (2024-12-01)
Cyber Security Scenarios and Control for Small and Medium Enterprises
by: Nilaykumar Kiran SANGANI, et al.
Published: (2012-01-01)
by: Nilaykumar Kiran SANGANI, et al.
Published: (2012-01-01)
CYBERSPACE RISKS AND THREATS TO CRITICAL INFORMATION INFRASTRUCTURE
by: Constantin MINCU, et al.
Published: (2011-12-01)
by: Constantin MINCU, et al.
Published: (2011-12-01)
Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks
by: Chinthamu Narender, et al.
Published: (2025-01-01)
by: Chinthamu Narender, et al.
Published: (2025-01-01)
As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»
by: Nikita S. Ryazanov
Published: (2017-09-01)
by: Nikita S. Ryazanov
Published: (2017-09-01)
Cyber Threats as One of the Most Serious Asymmetric Security Threats in 21st Century
by: Radoslav IVANČÍK
Published: (2020-06-01)
by: Radoslav IVANČÍK
Published: (2020-06-01)
Cyber threats in rail traffic in Poland
by: Alina Paklerska
Published: (2023-12-01)
by: Alina Paklerska
Published: (2023-12-01)
Hacker and the Treat for National Security: Challenges in Law Enforcement
by: Muhammad Amin Rais, et al.
Published: (2022-01-01)
by: Muhammad Amin Rais, et al.
Published: (2022-01-01)
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)
by: A. V. Vasilyev
Published: (2023-11-01)
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
by: Chuvakov O.
Published: (2024-06-01)
by: Chuvakov O.
Published: (2024-06-01)
Similar Items
-
Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension
by: Elena Vladimirovna Batueva
Published: (2014-01-01) -
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
by: E. V. Batueva
Published: (2014-06-01) -
To the question of cyberterrorism and cybercrime
by: A A Galushkin
Published: (2014-12-01) -
Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe
by: Vitaly V. Kabernik, et al.
Published: (2015-01-01) -
Cybersecurity policy of Obama’s Administration
by: E. V. Batuevа
Published: (2010-08-01)
