Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2021 | 6 | 2 | 91-101

Article title

Cybersecurity of nuclear weapon systems

Authors

Content

Title variants

Languages of publication

Abstracts

EN
In my article, I would like to describe the history of cybersecurity related to nuclear safety, to answer the question of what cybersecurity is and how the development of cybersecurity was related to the development of nuclear safety and nuclear systems. Continuing, I will also describe the cyber risks associated with nuclear systems. I would also like to try to make recommendations for cybersecurity related to nuclear safety. I would also like to try to make recommendations for cybersecurity related to nuclear safety

Year

Volume

6

Issue

2

Pages

91-101

Physical description

Dates

published
2021

Contributors

  • War Studies University in Warsaw

References

  • Baylon C., Challenges at the Intersection of Cyber Security and Space Security: Country and International Institution Perspectives, Research Paper, London, https://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/20141229CyberSecuritySpaceSecurityBaylonFinal.pdf [dostęp: 20.08.2021].
  • Borning A., Computer System Reliability and Nuclear War, „Communications of the ACM” 1987, no. 2.
  • Feaver P., Command and Control in Emerging Nuclear Nations, „International Security” 1992, no. 3.
  • Glenny M., Organized crime finally embraces cyber theft, „Financial Times” 2017, https://www.ft.com/content/a038cd98-0041-11e7-8d8e-a5e3738f9ae4 [dostęp: 20.08.2021].
  • Glover W., Defence Video Imagery Distribution System (DVIDS), https://www.dvidshub.net/news/76668/their-own-words-norad-members-recall-september-11-william-glover [dostęp: 20.08.2021].
  • Greenberg A., For Pentagon Contractors, Cyberspying Escalates, „Forbes” 2010, https://www.forbes.com/2010/02/17/pentagon-northrop-raytheon-technology-security-cyberspying. html [dostęp: 20.08.2021].
  • Halloran R., Nuclear Missiles: Warning System and the Question of When to Fire, „New York Times” 1983, http://www.nytimes.com/1983/05/29/us/nuclear-missiles-warning-system-andthe-question-of-when-to-fire.html [dostęp: 20.08.2021].
  • Hodyr E., Cybersecurity – new challenges in international law, „Journal of Polish-American Science and Technology” 2016, vol. 10.
  • Jopson B., Kuchler H., US official defends NSA over Wanna Cry cyber attack, „Financial Times” 2017, https://www.ft.com/content/74ae2600-39a3-11e7-ac89-b01cc67cfeec [dostęp: 20.08.2021].
  • Keller J., Navy continues buying radar-spoofing electronic warfare (EW) equipment from Mercury Systems, „Military & Aerospace” 2017, http://www.militaryaerospace.com/articles/2017/06/radar-spoofing-electronic-warfare-ew.html [dostęp: 20.08.2021].
  • Tertrais B., The Unexpected Risk: the Impact of Political Crises On the Security and Control of Nuclear Weapons [w:], Nuclear Weapons Security Crises: What Does History Teach?, eds. H. Sokolski, B. Tertrais, Carlisle, PA 2013.
  • Williams P., Organized Crime and Cybercrime: Synergies, Trends, and Responses, http://www.crime-research.org/library/Cybercrime.htm [dostęp: 20.08.2021].

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
1987358

YADDA identifier

bwmeta1.element.ojs-issn-2658-1493-year-2021-volume-6-issue-2-article-oai_editorialsystem_com_article-146469
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.