Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber" wg kryterium: Temat


Tytuł:
An Operational Approach to Maritime Cyber Resilience
Autorzy:
Erstad, E.
Ostnes, R.
Lund, M. S.
Powiązania:
https://bibliotekanauki.pl/articles/1841562.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
maritime cyber resilience
cyber resilience
cyber attack
cyber risk
cyber risk managementm
maritime cyber security
maritime cyber emergency
Opis:
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present. In 2017, IMO officially recognized “… the urgent need to raise awareness on cyber threats and vulnerabilities to support safe and secure shipping, which is operationally resilient to cyber risks”. Thus, Maritime Cyber Resilience is seen as key by IMO in the improvement of the maritime cyber security. It is assumed that human error is the cause of more than half successful cyber-attacks. If technology somehow fails, in example because of a cyber threat, the human is expected to handle the problem and provide a solution. It is therefore necessary to focus on the human aspect when considering maritime cyber threats. This paper aims to provide a working definition of “Maritime Cyber Resilience”. Further, the paper argues why the human should be a focus of study, as the human is at the sharp edge in a potential maritime cyber emergency.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 27-34
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Will there ever be a Cyber War?
Autorzy:
Šulte, Evija
Powiązania:
https://bibliotekanauki.pl/articles/534396.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
Cyber security
Offensive cyber capabilities
Cyber warfare
Opis:
During the NATO Warsaw Summit cyberspace was recognized as a domain of operations reaffirming the necessity and requirement for the regulation of cyberspace as a potential operational environment for network-centric operations. It is linked with the fact that cyber-attacks of diverse types are continuously increasing in numbers, thus causing a significant threat to the uninterrupted functioning of governmental and public communication and information systems, data centres, financial and banking systems, national and international networks and infrastructure. This raises the question of whether it is a new domain of warfare. The paper analyses terms “cyber warfare” and “cyber war” in the contemporary context of cyber security and the forms and effects of cyber war.
Źródło:
Security Forum; 2017, 1, Volume 1 No. 2/2017; 131-140
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measurement of Cyber-Bullying Severity
Autorzy:
Hollá, Katarína
Fenyvesiová, Lívia
Hanuliaková, Jana
Powiązania:
https://bibliotekanauki.pl/articles/1998412.pdf
Data publikacji:
2017-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber-bullying
cyber-aggressor
cyber-victim
IRT model
cyber-bullying severity
Opis:
The presented study presents results of research conducted in 2015 within the project of the Ministry of Education, Science, Research and Sport of the Slovak Republic VEGA No. 1/0244/15 Detection and Resolving Cyber-Bullying. The aim of the research was to find out and analyze levels of cyber-bullying severity. Participants in the research were 1118 respondents 11-18 years old (average age 15.25, SD 2.55) across the Slovak Republic. The severity of cyber-bullying was assessed through the GRM (Graded Response Model). The most severe forms of cyber-bullying were posting a mean video, creating a hurtful web-page and threats of bodily injury sent through a text message. The least severe forms were mean comments on the Internet, spreading rumours and posting mean or hurtful photographs of others.
Źródło:
The New Educational Review; 2017, 47; 29-38
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Manipulation techniques of cyber fraudsters using the example of phishing attempts for private content
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/45440098.pdf
Data publikacji:
2023-08-23
Wydawca:
Akademia Policji w Szczytnie
Tematy:
cyber security
cyber threats
cyber fraud
cyber manipulation
phishing
social media
Opis:
In today's digital environment, users freely use almost all available digital services, from opening and maintaining bank accounts, shopping, working, education, entertainment to sharing private content (photos, videos) and sending confidential information via email. The evolution of the Internet has also radically changed the nature of communication between individuals and influenced contemporary friendship making. The increased use of cyberspace to establish social relationships has also resulted in the emergence of new forms of crime, leading to the extortion of information, photos, videos or money. Consequently, this has increased the ability of criminals to seek out potential victims around the world and exploit ('hopeful') individuals seeking relationships with other users" . Criminals use a range of dating websites and apps to contact victims, but are increasingly using social media platforms, including Facebook, WhatsaApp, Instagram, TikTok . More often than not, these types of relationships end in a form of blackmail and the articulation of threats to disseminate intimate images or recordings if the victim does not comply with certain demands, whether behavioural (sending more sexual images or continuing an intimate relationship) or financial . The phenomenon described above is one of many pieces of evidence supporting the thesis that perceptions of the Internet have long since moved beyond the limits of technology. Analyses of cyberspace are increasingly recognising this unique environment as a set of social practices. Tools for understanding how people use technology to, among other things, interact with other users are therefore gaining importance
Źródło:
Przegląd Policyjny; 2023, 150(2); 207-220
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Same threat, different answers? Comparing and assessing national cyber defence strategies in Central-Eastern Europe
Autorzy:
Niedermeier, Alexander
Powiązania:
https://bibliotekanauki.pl/articles/576155.pdf
Data publikacji:
2017-09-24
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
Cyber Defense
Cyber Doctrine
Cyber Strategy
Cyber
cooperation
Central-Eastern Europe
European Union
Opis:
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states are compared and assessed. After it had become evident that a variety of crucial new threats to national security had emerged over recent years, virtually all states reacted with national strategies. These strategies are aimed at securing national cyberspace from cyber threats through legal, operational, technical and policy-related measures. They exist in addition to general national security strategies and are meant to support these. Even if most countries have National Cyber Security Strategies, the author demonstrates that these strategies show, at least in part, remarkable differences. The role national particularities play is explained, whether they are really this specific and whether they might be generalised and transferred to other national contexts and what approaches turned out best under what circumstances. Based on these results, existing strengths, weaknesses and best practices are explained to open avenues for improving existing strategies and generate a higher degree of strategy interoperability in an environment that maybe like no other requires international cooperation. It is evident that precise definitions of terms and concepts are essential. However, not all strategies provide those definitions, which might lead to misunderstandings and complicate cooperation both on domestic and international level. While some strategies offer clear cut responsibilities for the actors involved, others remain unclear. Even if laws are there to specify concrete procedures, the NCSS should not be too superficial. The NCSS itself should already make clear statements, particularly when it comes to the crucial aspect of coordinating the various cyber actors and stake holders. The author demonstrates that National Cyber Security Strategies ought to be detailed enough to clearly determine actors and responsibilities, but open and flexible enough for adaptability to fast developments.
Źródło:
Security and Defence Quarterly; 2017, 16, 3; 52-74
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
State-sponsored and organized crime threats to maritime transportationsystems in the context of the attack on Ukraine
Autorzy:
Cichocki, R.
Powiązania:
https://bibliotekanauki.pl/articles/24811512.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber attack
cyber incidents
maritime cyber resilience
cyber resilience
maritime cyber security
maritime cyber threats
cybersecurity
advanced persistent threat
Opis:
Due to its strategic importance and vast impact on the world economy, maritime transport has become a cyber battlefield. Cybersecurity organizations across the world notice and analyze adversaries such as Bear from Russia, Panda from China, Buffalo from Vietnam, Chollima from North Korea (DPRK), and others from Columbia, India, Turkey, and Iran, as well as hacktivist and E-Crime. In 2014 - 2023, Ukraine became the object of massive cyberattacks aimed at its political, social, and economic destabilization. This situation changes the perception of cyberspace and its importance for ensuring the security of the global economy, in particular, the maritime economy. Reports published by the US Coast Guard show that. In this publication, the author reviews the cybersecurity threat landscape targeting the maritime industry and transportation systems and analyzes the technics, tactics, and procedures (TTPs) used by threat actors.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 3; 717--721
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber threats for present and future commercial shipping
Autorzy:
Pawelski, J.
Powiązania:
https://bibliotekanauki.pl/articles/24201417.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime cyber resilience
maritime cyber emergency
cyber security vulnerabilities
cyber security in shipping
Opis:
Cyber-attacks are extremely dangerous for all operations relaying upon it-technologies. Today shipping businesses cannot operated without processing large amounts of information. Four biggest shipping companies suffered break-down in their operations after they were struck by malware. International Maritime Organization also was struck by cyber-attack which took its website down. Maritime community noticed rise in cyber-attacks on virtually all computer-based systems on board of vessels. For manned vessels risks to safety of navigation are mitigated by presence of crew on board but remain financial and reputational losses. Introduction of remotely controlled and fully autonomous unmanned vessels will increase seriousness of threats. Cyber-attack may severely hamper ship’s operability or even lead to complete loss of control. International community is developing several countermeasures to protect commercial shipping presently and in future.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 2; 261--267
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/31342006.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber risk
cyber threats to the elderly
cyber hygiene
personal cyber insurance
Opis:
The paper investigates the growing cyber threats to personal finance, faced by the elderly in the digital age. It begins by acknowledging the surge in cyber incidents, particularly impacting seniors amid their increasing engagement in the digital space. The research explores the theoretical background of individual attitudes towards cybersecurity, emphasizing the unique vulnerabilities of the elderly population and their heightened susceptibility to cyber threats. It offers practical recommendations for personal cyber hygiene. Moreover, it introduces personal cyber insurance (PCI) and discusses its advantages and challenges. As the main contribution to the body of knowledge, the study provides a comprehensive understanding of the specific challenges faced by the elderly in the digital realm. It offers practical strategies for risk mitigation and introduces PCI as a means of enhancing resilience. It also sets the groundwork for further exploration and targeted strategies to protect individuals, especially older adults, in the dynamic landscape of cybersecurity.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 281-298
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Autorzy:
Heering, D.
Powiązania:
https://bibliotekanauki.pl/articles/117518.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
cybersecurity in shipping
Estonian shipowners
cyber attack
cyber incidents
cyber threats
MET System in Estonia
cyber risk
Opis:
Ships, ports and offshore facilities are increasingly becoming dependent on modern information and opera-tional technology. Cyber incidents on ships can create disruptions of critical systems that cause problems for the ship’s safe operation. Therefore, the shipowners must be prepared to cope with rising cyber threats. In or-der to prevent cyber incidents happening on ships and in the companies, essential steps must be taken on the management level. This paper introduces results of two surveys on cybersecurity and cyber awareness carried out in between 2017 – 2019 among the shipping companies operating in Estonia. Feedback was received from 12 shipowners out of 19 and the results show that at least 7 organisations had been the victims to different types of cyberattacks. The results indicate that shipowners are not paying enough of attention to potential cyber threats and education of their employees. Finally, the paper proposes cyber risk mitigation means for the shipowners.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 271-278
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity as a challenge for modern state and society
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1595475.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
security policy
cyber security
cyberspace
cyber power
cyber conflict
polityka bezpieczeństwa
cyberbezpieczeństwo
cyberprzestrzeń
cyber konflikt
Opis:
The Internet makes social and political life more dynamic by increasing the access to information, facilitating political discussion, development of social networking and offering alternative and convenient areas of political involvement. This work focuses on analyzing the political structure of the Internet. An emphasis is put on understanding the theoretical connection between technology and politics. It is also an attempt at answering the question, is World Wide Web the answer to the needs of socio-political potential? How can the Internet have a negative influence on political life? So, in order to understand contemporary events, one needs to understand the specificity of cyberspace, which consists both of continuation and new quality of identity and values for the users.
Internet dynamizuje życie społeczne i polityczne poprzez zwiększenie dostępu do informacji, ułatwia dyskusje polityczne, rozwój sieci społecznościowych oraz oferuje alternatywne i dogodne miejsca do zaangażowania politycznego. Praca skupia się na analizie struktury politycznej Internetu. Położony zostaje akcent na zrozumienie teoretycznych relacji między technologią i polityką. To także próba odpowiedzi na pytanie o to, czy Internet odpowiada na zaistniałe potrzeby społeczno-polityczne, oraz o to, czy istnienie Internetu może mieć negatywny wpływ na życie polityczne. Aby zrozumieć współczesne wydarzenia, należy zrozumieć specyfikę cyberprzestrzeni, która stanowi z jednej strony kontynuację rzeczywistości, a z drugiej daje nową tożsamość uczestnikom życia społecznego.
Źródło:
Acta Politica Polonica; 2018, 44, 2; 29-39
2451-0432
2719-4388
Pojawia się w:
Acta Politica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Advanced persistent threats as a manifestation of states’ military activity in cyber space
Autorzy:
Olszewski, B.
Powiązania:
https://bibliotekanauki.pl/articles/30147076.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
APT
cyber warfare
cyber weapon
state
Opis:
The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States’ government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been linked to the evolution of the hacker underground that took place after 2000. The activity of specialists swelling the Black Hat ranks had the nature of criminal offences, targeting data collected by corporations and state institutions. Despite a dozen or so years of experience with APTs, they continue to be a dynamic category of contemporary cyber security threats, with many evolving components beyond simple classification. Their unambiguous identification as a strictly separate type is obstructed mainly by the complex structure of such attacks, prompting analysts to locate them in a catalog containing various known vulnerabilities, mechanisms, cycles and variables. The analysis of the problem and the evolution of attacks to date has led to the hypothesis that Advanced Persistent Threats are now in the phase of their further modification and testing as a means of offensive action in inter-state and asymmetric conflicts. Armed forces and special services of states saw in them not only a tool per se to achieve economic and military advantage, but a theoretical basis for further research on the development of advanced cyber weapon.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 3(189); 57-71
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Smart Grid Cyber Security Challenges: Overview and Classification
Autorzy:
Mendel, Jacob
Powiązania:
https://bibliotekanauki.pl/articles/425982.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
Smart Grid Cyber Security
cyber security
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2017, 1 (68); 55-66
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapobieganie i zwalczanie zagrożeń ze strony cyberprzestrzeni
Prevention and fight against threats from cyber space
Autorzy:
Iskierka, Iwona
Powiązania:
https://bibliotekanauki.pl/articles/446045.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberzagrożenie
cyberatak
cyber threats
cyber attack
Opis:
W pracy omówiono zagadnienia związane z ochroną przed cyberzagrożeniami. Zwrócono uwagę na wzrost cyberzagrożeń i konieczność skoordynowania działań w zakresie zapobiegania i zwalczania zagrożeń ze strony cyberprzestrzeni. Ukazano działania zespołu CERT.GOV.PL, funkcjonującego w ramach Departamentu Bezpieczeństwa Teleinformatycznego ABW, które szczególnie uwzględniają ataki ukierunkowane na infrastrukturę obejmującą systemy i sieci telein-formatyczne. Wskazano na potrzebę cyberedukacji dla bezpieczeństwa.
The work discusses the issues related to the protection against cyber threats. Attention on the growth of cyber threats and the need to coordinate activities in the field of the prevention and control of risks on the part of cyberspace. Discusses the Team CERT.GOV.PL functioning within the framework of the Security Department of the ABW, which particularly include targeted attacks on infrastructure, including information and communication systems and networks. Indicated the need of education for cyber security.
Źródło:
Dydaktyka informatyki; 2014, 9; 82-90
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna
Contemporary cyber threats on the example of the phenomenon of cyberwarfare. A theoretical analysis
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1592353.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
cyber warfare
cyber threats
cyber security policy
cyberwojna
cyberzagrożenia
polityka cyberbezpieczeństwa
Opis:
Po raz pierwszy w historii postęp w obszarze technologii cyfrowych stał się na tyle masowym zjawiskiem, że jest potencjalnie dostępny dla znacznej części populacji na świecie. Pozwala to niemal każdej osobie na rozpowszechnianie przekaz w, co oznacza, że wielu ludzi ma możliwości omijania oficjalnych kanałów w komunikacji, dyskredytowania i krytykowania sposobu sprawowania władzy w państwie. Kluczowym problemem jest to, że technologia cyfrowa zdominowała funkcjonowanie gospodarki, a także społeczeństwa, a jej powszechne zastosowanie jest również jednym z podstawowych fundamentów ze współczesnych działań militarnych. Zagrożenia w obszarze cyberprzestrzeni państwa, stają się coraz bardziej złożone, co wynika z tego, że przeciwnikiem mogącym wyrządzić wiele szkód może być zarówno obce i wrogo nastawione państwo jak i organizacje bądź pojedyncze osoby, które są profesjonalne i zdecydowane w swych działaniach.
For the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channels of communication, to discredit and criticize the way government is run. A key problem is that digital technology dominates the functioning of the economy as well as society, and its widespread use is also one of the basic foundations of modern military operations. Threats in the area of the state’s cyberspace are becoming more and more complex, because the adversary that can cause a lot of damage can be a foreign and hostile state as well as organizations or individuals who are professional and determined in their actions.
Źródło:
Acta Politica Polonica; 2021, 51, 1; 5-21
2451-0432
2719-4388
Pojawia się w:
Acta Politica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Costs of Cyber-Security in a Business Entity
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1194144.pdf
Data publikacji:
2020
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
costs
costs of cyber-security
cyber threats
direct costs of cyber-security
indirect costs
of cyber-security
Opis:
Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.
Źródło:
Edukacja Ekonomistów i Menedżerów; 2020, 55, 1; 82-94
1734-087X
Pojawia się w:
Edukacja Ekonomistów i Menedżerów
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies