As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This paper begins by tracing the itemization and sharing of threat information to ancient times. It then demonstrates how cybersecurity cannot be adequately addressed only by technology people and cannot be ignored because it is the core of warfare in the twenty-first century, renders the fog of war even foggier, and it is difficult to create “cyber borders.” The article also argues that cyber risk has greatly increased due to the Internet of Things (IoT), lack of sufficient security in new defense devices, and hackers. Recommendations are presented for developing a more robust cybersecurity architecture at the national and international levels which include various ways of sharing public-private information in this domain and incorporating a multitude of fields.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.