863 resultados para information security policy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fifteen years have passed since the adoption of Security Council Resolution 1325 on Women, Peace and Security, through which time the EU has grown as a security actor. The keys to produce a change in implementing gender mainstreaming in the Common Security and Defence Policy (CSDP) are well known by member states; the EU and external implementation reports1 are repeated again and again, but real change requires real willingness on the part of member states, and leadership.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2012, negotiations over an EU–China bilateral investment agreement were launched to fully tap into the potential of bilateral investments. This policy brief gives an overview of the current negotiation process and argues that the high hopes advanced politically and economically in the agreement must be weighed against the many challenges and obstacles the negotiations face, regarding current events in EU–China relations, in global trade and investment regimes, and the limits of EU competencies. Strategically, the agreement could be important, as it offers the potential to strengthen the EU’s global economic relevance. This brief concludes that there is much to gain if the EU follows a coordinated approach and remains mindful of these (potential) obstacles.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The EU’s effective multilateralism doctrine is hardly a defining characteristic of the international system of today. While established multilateral structures are far from reflective of the realities of the twenty-first century, multilateral practices remain dominant in most parts of the world. Multilateralism, however, carries a different meaning to different actors. Emerging powers have become increasingly assertive in promoting their own multilateral approach and now set the pace in international affairs. The EU remains, nonetheless, well-placed to respond to this challenge through a revision of its multilateral agenda.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The setting up of a Special Operations Command (SOCOM) constitutes a key element of the ongoing Belgian defence reforms. This Policy Brief aims to put the present demand for special operations forces in its historical context and engage in the discussion on how to structure and employ this special instrument of policy. Building on the legacy of the paracommando regiment, the future Belgian SOCOM constitutes a critical capability within an adaptive force structure. This new entity must be able to deliver results in a variety of unconventional missions that require high readiness, intellectual flexibility and maximum discretion or surprise. At the same time, special operations forces do not constitute a substitute for having a comprehensive security policy. They function best when used as force multipliers alongside other instruments of power towards joint effect. As the proverbial tip of the spear, they must lead the way for Belgian defence regeneration in general.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prepared by Marcia Freedman and Anna Dutka.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.