AbstractThrough an application of Regional Security Complex Theory and empirical examination, this article explores the pros and cons of regional and inter‐regional energy co‐operation. In spite of present unilateral and bilateral manoeuvres on the part of EU Member States to the contrary, a common energy security policy appears feasible over the next five to ten years. However, EU–Russian co‐operation in the energy sector is not likely to improve considerably over this period, and EU attempts to counterbalance the dominant and growing position that Russia has occupied in the supply of gas to EU countries by seeking alternative energy supply from central Asia are likely to be thwarted by countervailing Russian measures.
Cyber security for Information Technology (IT)/Operational Technology (OT) is about the protection of Internet protocol (IP) networks from cyber attacks. Control system cyber security is about protecting physical processes from unintentional incidents and malicious attacks. Technologically, control system cyber security is different than IT cyber security because of the control system devices and their low‐level communication protocols. Yet IT and OT cyber security policy has been developed by the network security organization with minimal participation from the engineering organizations that "own" the hardware and control systems.Control system cyber security is real—there have been more than 1,250 actual incidents identified to date.1 But there currently is widespread lack of appropriate control system cyber forensics and cyber security training. With the availability of IT cyber security hardware, testing, and training, IT systems continue to be compromised, and control system cyber security is arguably 5‐10 years behind IT.In addition to the need to upgrade control system cyber security at the levels of individual organizations and critical infrastructures, this is a matter of national security import. It was widely reported that a large Chinese‐built electric transformer may have contained hardware backdoors, allowing access to transformer equipment control parameters. (Wall Street Journal, 2020). Attack vectors in the control system area resulted in Presidential Executive Order (EO) 13920 in May 2020.2Consequently, this paper advocates a paradigm shift to work around the current lack of a robust capability to secure control system networks. In order to address the limitations in securing control legacy and "next generation" control systems and networks, new approaches for improving control system cyber security and the ability to widely deploy them are needed.
Given the importance of the Taiwan is- sue for U.S. foreign and security policy in East Asia, it is striking that relatively little has been written on Taiwan's de- fense reform and modernization programs, especially in contrast to the substantial amount of work scholars and policy analysts have produced in recent years on Chinese military mod- ernization and its implications for re- gional security. Bernard Cole's Taiwan's Security: History and Prospects, which provides a comprehensive and well written assessment of recent develop- ments in Taiwan's defense establish- ment, represents an important step in filling this gap.
Fatma H. Sayed is an academic at the European University Institute,Florence, Italy, specializing in development assistance, policy analysis, and governance in the Euro-Mediterranean region and a consultant to the United Nations Department of Economic and Social Development.
Examines the strategy that has characterized the Terrorism and Homeland Security department's first five years. This book includes contributions from top military, international relations, and security experts. It addresses a variety of issues including privacy and civil liberties, nuclear terrorism, WMDs, and military force vs diplomacy
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.
The use of lethal technologies by global terror networks has elevated domestic security policy to a central concern of 21st-century public administration. Twentieth-century public administration scholars, influenced by Progressivism, Pluralism, and Public Choice, led the field to believe that it could both develop and administer domestic security policy without a coherent state theory to guide this policy. This scission between security policy and state theory must be repaired. The relevance of the field to pressing 21st-century security questions as well as the security of the public depends on renewing this linkage.