Published in Hungarian:
Abstract: A good example of NATO transformation is the institution and the operation of Centres of Excellence. The article shows how the institution of COEs was born, explains the principles of their operations and helps to understand their true role within the Alliance, through showing examples of their current activities and identifying some of their future challenges.
Abstract: The expexted rapid growth of Hungary’s National Databases and the protection of similar databases result in complex challenges for systems operators. Their voulnerability poses a growing risk due to their increasing value plus the possible damage that can be caused by their failure. The goal of this article is to show how distributed data storage can increase the protection of such data and also to demonstrate how higher levels of redundancy can be assets to critical data infrastructure – with maintaining the possibility of dynamic scaling and priority flexibility.
Elektronikus határvédelmi rendszerek jellemző sebezhetőségei és védelmük lehetőségei – Common Vulnerabilities of Electronic Perimeter Protection Systems and Possible Methods of Their Defense [ in Hadmérnök (2019/1 pp. 271-282) ]
Abstract: Both owners and operators of critical infrastructures are facing a rapidly growing challenge of defending themselves and their infocommunication systems from various cyber threats. This article wishes to demonstrate the cyber vulnerabilities of electronic perimeter protection systems and the need for their adequate protection. Shows certain possibilities of using Electronic Protection (EP) with particular emphasis on protection against various SIGINT threats. Underlines the absolute necessity of cyber threat risk-analysis and assessment, while creating and maintaining system-wide confidentiality, integrity, and availability.
A villamosenergia-rendszer kiber- és nemzetbiztonsági kockázatai (1. rész) – Cyber- and National Security Risks of the Electric Energy System (part one) [ in National Security Review (2019/3 pp. 40-57) ]
Abstract: The placement of the electric energy subsector among critical infrastructures doesn’t always reflect the real threat they pose to other sectors of critical infrastructures. With different examples, the first part of our study shows certain cyber-vulnerabilities of the electric energy system, the actual risks of attacks thereon and the real necessity of systems’ resilience. The study investigates the organizational and theoretical resources required for the cyber defense of the electric energy sector, including its state-, commercial- and national security players.
Abstract: It is essential to have a proper definition of cyberspace as it is the foundation of the proper understanding operations being performed therein. The increasing role of state actors both on the defensive and on the offensive side together with the economic and political risks and interconnections further emphasizes the importance of cyberspace. Through clitical infrastructures, infocommunication systems and artificial intelligence, cyberspace became an integral part of our day-to-day lives. Cyberspace will keep changing its role due to future technological advancements – that is why we should understand its evolution curve.
Állami célú adatátviteli rendszerek, hálózatok részleges integrálhatóságának egyes kérdései – Certain Aspects of Integration Possibilities of State Data Transmission Systems in: Hausner Gábor (szerk): Szemelvények a katonai műszaki tudományok eredményeiből II., Ludovika Egyetemi Kiadó, 2020. Budapest (pp. 179-195)
Abstract: It is a natural need and vital requirement of every country to maintain its cyber-sovereignty. One of the most critical elements of this is a secure and continuously accessible operation of state data transmission systems for the organizations concerned. Our paper presents a new and complex concept that offers far more flexibility and operational reserves than many countries’ current systems. It shows a capability where the services of such systems can be more widely available to state (local and federal) agencies.
A kibertér fejlődése (második rész) – Kiberműveletek és kritikus infrastruktúrák egyes kapcsolatai – The Evolution of Cyberspace (part 2) – certain connections between cyber operations and critical infrastructures [in Hadmérnök (2021/1 pp. 145-159) ]
Cyber operations are becoming robust tools in a nation state’s policy. The applications thereof require far more caution than the tools used in conventional domains. Inaccurately evaluated interdependencies of attacked infrastructures can cause substantial collateral damages to the attacker. This paper investigates certain aspects and connections of such interdependencies.
To be published in English:
Certain connections between Cyber Operations, Artificial Intelligence and Operational Domains – Műveleti tartományok egyes kapcsolatai kiberműveletekkel és a mesterséges intelligenciával
Abstract: The relationship of operational domains with various systems based on artificial intelligence is becoming more profound and more diverse. The ability to influence decision-making mechanisms can pose serious risks that need to be identified and interpreted. Cyberspace is the carrier of artificial intelligence, but the latter as an operational domain has not yet been identified. The goal of this study is to examine certain relationships between cyberspace, artificial intelligence, and operational domains from a state-will enforcement perspective, using mostly qualitative tools, combined with quantitative elements. As a result, this paper finds the need to review defense doctrines from a cyber-operational perspective and suggests addressing artificial intelligence in a much broader context, especially in the defense and military contexts.