Have a personal or library account? Click to login
Information-Sharing Challenges and Issues in Multinational Operations, Part 1 Cover

Information-Sharing Challenges and Issues in Multinational Operations, Part 1

By: András Toth  
Open Access
|Dec 2020

References

  1. Advenica. (2019). What is a data diode and how does it work? available at: https://www.advenica.com/en/blog/2019-02-19/what-is-a-data-diode-and-how-does-it-work.
  2. European Network and Information Security Agency. (2015). Definition of Cybersecurity, Gaps and overlaps in standardisation V1.0. Greece: Author.
  3. EUR-Lex Document 22003A0327(01). (2013). Agreement between the European Union and the North Atlantic Treaty Organization, available at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:22003A0327(01)&from=EN
  4. Kassai, K. (2015). Elektronikus információbiztonsági alapismeretek a honvédelmi szervezetek által kezelt minősített adatok biztonsága érdekében, Hadmérnök, Vol. X, No. 1, 210-223.
  5. Koumartzis, N., & Veglis, A. (2011). Internet regulation: The need for more transparent Internet filtering systems and improved measurement of public opinion on Internet filtering. First Monday, Volume 16, Number 10, 1-17.10.5210/fm.v16i10.3266
  6. Lord, N. (2018). What is Advanced Threat Protection (ATP)?, Digital Guardian, available at: https://digitalguardian.com/blog/what-advanced-threat-protection-atp.
  7. Melnick, J. (2019). 10 Best Practices Essential for Your Data Loss Prevention (DLP) Policy, Netwrisk, available at: https://blog.netwrix.com/2019/07/16/10-best-practices-essential-for-your-data-loss-prevention-dlp-policy/.
  8. OPSWAT. (2020). Multiscanning, Advanced Threat Prevention with Simultaneous Anti-Malware Engines, available at: https://www.opswat.com/technologies/multiscanning
  9. Rababah, B., Zhou, S., & Bader, M. (2018). Evaluation the Performance of DMZ. International Journal of Wireless and Microwave Technologies, 2018-1, Vol. 8, Issue 1, 1-13.
  10. RedHat. (2018). What is malware? available at: https://www.redhat.com/en/topics/security/what-is-malware.
  11. Vacca, J. (2009). Computer and Information Security Handbook. Burlington. USA: Elsevier.
  12. Verma, R., & Agrawal, S. (2013). Data security for any organization by using public key infrastructure components and MD5, RSA algorithms. International Journal of Research in Engineering and Technology (IJRET), Vol. 2, Issue 5.
DOI: https://doi.org/10.2478/raft-2020-0037 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 307 - 316
Published on: Dec 16, 2020
In partnership with: Paradigm Publishing Services

© 2020 András Toth, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.