Tools for Strategic Research of the National Security System – Methodology for Research Using Simulation Business Game

2020 ◽  
Author(s):  
Venelin Terziev ◽  
Mitko Stoykov
2018 ◽  
Vol 28 (6) ◽  
pp. 1849-1854
Author(s):  
Marin Petkov

The rapid development of science and technology has led to the emergence of a crisis in society. Science "pushes" religion, but does not offer a new moral code in its place. The definitions of "security" are almost as many and as controversial as postmodernism. For the purposes of this study, however, it will be sufficient to define security as "the functional state of a system that provides for the neutralization and counteraction of external and internal factors affecting or potentially damaging the system." This scientific article presents a study, which seeks to answer the question why the paradigm "security" is so important in the postmodern society, what are the roots of its influence and meaning, and to seek conclusions and guidelines for its increase.


2019 ◽  
Author(s):  
Azian Ibrahim ◽  
Noorfadhleen Mahmud ◽  
Nadrawina Isnin ◽  
Dina Hazelbella Dillah ◽  
Dayang Nurfauziah Fauz Dillah

This study analyzed the cyber warfare impact on national security and focusing on Malaysia experiences. The issues regarding cyber warfare have become a serious concern since it was a risk of national security in Malaysia. The objectives of the study are to analyze issues related to cyber warfare that affected Malaysian system security, to determine causes that caused to cyber warfare. This study used a qualitative research approach to evaluate the current defense approaches related to cyber warfare in Malaysia. The interviews were conducted with the respective respondents: the Senior Manager, Research Management Centre, Strategic Research, and Advisory Department of Cyber Security Malaysia Department. This study can contribute to expanding the security of national security by demanding the government to adopt a broad acquisition risk management strategy. It can assist in the development of highly effective aggressive and defensive methods to any company dealing with future cyber warfare challenges and risk.


Sign in / Sign up

Export Citation Format

Share Document