Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber security" wg kryterium: Temat


Tytuł:
Smart Grid Cyber Security Challenges: Overview and Classification
Autorzy:
Mendel, Jacob
Powiązania:
https://bibliotekanauki.pl/articles/425982.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
Smart Grid Cyber Security
cyber security
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2017, 1 (68); 55-66
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 319--334
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber threats for present and future commercial shipping
Autorzy:
Pawelski, J.
Powiązania:
https://bibliotekanauki.pl/articles/24201417.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime cyber resilience
maritime cyber emergency
cyber security vulnerabilities
cyber security in shipping
Opis:
Cyber-attacks are extremely dangerous for all operations relaying upon it-technologies. Today shipping businesses cannot operated without processing large amounts of information. Four biggest shipping companies suffered break-down in their operations after they were struck by malware. International Maritime Organization also was struck by cyber-attack which took its website down. Maritime community noticed rise in cyber-attacks on virtually all computer-based systems on board of vessels. For manned vessels risks to safety of navigation are mitigated by presence of crew on board but remain financial and reputational losses. Introduction of remotely controlled and fully autonomous unmanned vessels will increase seriousness of threats. Cyber-attack may severely hamper ship’s operability or even lead to complete loss of control. International community is developing several countermeasures to protect commercial shipping presently and in future.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 2; 261--267
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Costs of Cyber-Security in a Business Entity
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1194144.pdf
Data publikacji:
2020
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
costs
costs of cyber-security
cyber threats
direct costs of cyber-security
indirect costs
of cyber-security
Opis:
Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.
Źródło:
Edukacja Ekonomistów i Menedżerów; 2020, 55, 1; 82-94
1734-087X
Pojawia się w:
Edukacja Ekonomistów i Menedżerów
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prostytucja i cyberprostytucja jako zagrożenie dla młodych ludzi – raport z badań
Prostitution and Cyberprostitution as a Threat to Young People – a Study Report
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/916026.pdf
Data publikacji:
2020-01-19
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
cyberprofit
cyber security
security policy
education for cyber security
information society
Opis:
The subject of cyberprostitution reflectsthe growing number of socio-political problems stemming from the dynamic development of cybertechonology and its expansion into every area of human life. In the age of cyberrevolution, there is an increase in the number of pornographic social networking sites. The sex industry quickly adopted all new information technologies to increase young people’s access to pornography. As a result of the link between the internet and the sex industry, the border be-tween the current phenomenon of prostitution and its form in cyberspace has blurred. This article, based on the study, discusses the main motivational factors that contribute to the growth of prostitution. The differences between prostitution in the real and virtual worlds are also indicated. The purpose of the study is moreover to show some disturbing phenomena that may have a negative impact – not only on the emotional development of man – but also on shaping future civil society.
Źródło:
Studia Edukacyjne; 2017, 46; 307-323
1233-6688
Pojawia się w:
Studia Edukacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ethical considerations in maritime cybersecurity research
Autorzy:
Oruc, A.
Powiązania:
https://bibliotekanauki.pl/articles/2172503.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
cyber security
maritime cyber security research
cyber risk
ethical considerations
ethical dilemmas
ethical principles
ethical conflicts
Opis:
Maritime transportation, an essential component of world trade, is performed by contemporary vessels. Despite the improvements that rapid advances in technology have brought to vessels’ operational efficiency and capability for safe navigation, the cyber risks associated with modern systems have increased apace. Widespread publicity regarding cyber incidents onboard ships has sparked extensive research on the part of universities, industry, and governmental organisations seeking to understand cyber risks. Consequently, researchers have discovered and disclosed an increasing number of threats and vulnerabilities in this context, providing information that in itself may pose a threat when accessed by the wrong parties. Thus, this paper aims to raise researchers’ awareness of ethical concerns and provide guidance for sound decision-making in areas where the research process must be handled carefully to avoid harm. To this end, this paper presents a literature review that explores the ethical issues involved in maritime cybersecurity research and provides specific examples to promote further understanding. Six ethical principles and four categories of ethical dilemmas are discussed. Finally, the paper offers recommendations that can guide researchers in dealing with any ethical conflicts that may arise while studying maritime cybersecurity.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 309--318
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation framework for practical cyber security training in the public service
Autorzy:
Deák, Veronika
Powiązania:
https://bibliotekanauki.pl/articles/1311502.pdf
Data publikacji:
2021
Wydawca:
Akademia Sztuki Wojennej
Tematy:
simulation framework
cyber security
cyber security education
public service
practical training
Opis:
The public service sector is a key target of cyberattacks. In order to prevent and effectively tackle such attacks, organisations should continuously develop their defence capabilities. As part of developing such capabilities, public service cybersecurity training is required to teach students about cyberattacks. The present study uses quantitative research techniques including (i) how to identify key requirements for the practical aspects of public service cybersecurity training and (ii) sampling to utilise international best practices from cybersecurity education and conceptual architectures from existing public service organisations. A schematic structure with a two-level practical training course is proposed. On the first level, the students learn about the defence mechanisms of their own info-communication devices and try to prevent attacks in a simulated environment. On the second level, the students apply protection strategies against cyberattacks in organisational infrastructure. Finally, a technical framework is defined to simulate cyberattacks against (a) personal devices and (b) a fictional organisational infrastructure. The specification of a public service cybersecurity training programme should not only focus on theoretical education but also provide practical knowledge to students. By simulating specific attacks, theoretical and practical knowledge can be combined. As a result, students will be able to recognise threats and potential risks from cyberspace.
Źródło:
Security and Defence Quarterly; 2021, 33, 1; 87-104
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber security in industrial control systems (ICS):a survey of rowhammer vulnerability
Autorzy:
Aydin, Hakan
Sertbaş, Ahmet
Powiązania:
https://bibliotekanauki.pl/articles/2097442.pdf
Data publikacji:
2022
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
RowHammer
Cyber Security
DRAM
Opis:
Increasing dependence on Information and Communication Technologies (ICT) and especially on the Internet in Industrial Control Systems (ICS) has made these systems the primary target of cyber-attacks. As ICS are extensively used in Critical Infrastructures (CI), this makes CI more vulnerable to cyber-attacks and their protection becomes an important issue. On the other hand, cyberattacks can exploit not only software but also physics; that is, they can target the fundamental physical aspects of computation. The newly discovered RowHammer (RH) fault injection attack is a serious vulnerability targeting hardware on reliability and security of DRAM (Dynamic Random Access Memory). Studies on this vulnerability issue raise serious security concerns. The purpose of this study was to overview the RH phenomenon in DRAMs and its possible security risks on ICSs and to discuss a few possible realistic RH attack scenarios for ICSs. The results of the study revealed that RH is a serious security threat to any computer-based system having DRAMs, and this also applies to ICS.
Źródło:
Applied Computer Science; 2022, 18, 2; 86--100
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A retrospective analysis of maritime cyber security incidents
Autorzy:
Meland, P. H.
Bernsmed, K.
Wille, E.
Rødseth, Ø. J.
Nesheim, D. A.
Powiązania:
https://bibliotekanauki.pl/articles/2063970.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
retrospective analysis
digital attack
cyber security incidents
maritime cyber threats
maritime incidents
Opis:
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. This study analyses and gives an overview of 46 maritime cyber security incidents from the last decade (2010-2020). We have collected information from open publications and reports, as well as anonymized data from insurance claims. Each incident is linked to a taxonomy of attack points related to onboard or off-ship systems, and the characteristics have been used to create a Top-10 list of maritime cyber threats. The results show that the maritime sector typically has incidents with low frequency and high impact, which makes them hard to predict and prepare for. We also infer that different types of attackers use a variety of attack points and techniques, hence there is no single solution to this problem.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 3; 519--530
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Will there ever be a Cyber War?
Autorzy:
Šulte, Evija
Powiązania:
https://bibliotekanauki.pl/articles/534396.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
Cyber security
Offensive cyber capabilities
Cyber warfare
Opis:
During the NATO Warsaw Summit cyberspace was recognized as a domain of operations reaffirming the necessity and requirement for the regulation of cyberspace as a potential operational environment for network-centric operations. It is linked with the fact that cyber-attacks of diverse types are continuously increasing in numbers, thus causing a significant threat to the uninterrupted functioning of governmental and public communication and information systems, data centres, financial and banking systems, national and international networks and infrastructure. This raises the question of whether it is a new domain of warfare. The paper analyses terms “cyber warfare” and “cyber war” in the contemporary context of cyber security and the forms and effects of cyber war.
Źródło:
Security Forum; 2017, 1, Volume 1 No. 2/2017; 131-140
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo informatyczne inteligentnych systemów pomiarowych w świetle ustawy o krajowym systemie cyberbezpieczeństwa
IT security of smart measurement systems in the light of the act about the national cybersecurity system
Autorzy:
Babś, Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/266637.pdf
Data publikacji:
2019
Wydawca:
Politechnika Gdańska. Wydział Elektrotechniki i Automatyki
Tematy:
inteligentne systemy pomiarowe
cyberbezpieczeństwo
advanced metering systems
cyber security
AMI
cyber security directive
Opis:
28 sierpnia 2018 weszła w życie Ustawa o Krajowym Systemie Cyberbezpieczeństwa, implementująca wymagania europejskiej dyrektywy NIS. Wszyscy operatorzy usług kluczowych będą zobowiązani do wdrożenia określonych w ustawie procedur dotyczących m.in. szacowania ryzyka w zakresie funkcjonowania świadczonych usług kluczowych, zarządzania incydentami a przede wszystkim zastosowania adekwatnych do oszacowanego ryzyka środków technicznych i organizacyjnych. Istotnym elementem szacowania tego ryzyka jest znajomość potencjalnych wektorów ataku możliwych do wykorzystania do naruszenia stabilności systemu realizującego określoną usługę kluczową. Systemy inteligentnego opomiarowania, m.in. ze względu na fakt, iż wykorzystują liczniki energii elektrycznej pozostające fizycznie poza kontrolą operatora sieci, mogą być celem cyberataku o dużym zasięgu i istotnym, negatywnym wpływie na działanie sieci elektroenergetycznej i ciągłość dostaw energii elektrycznej. Referat przedstawia wybrane scenariusze ataku na infrastrukturę inteligentnego opomiarowania oraz środki zapobiegawcze których zastosowanie może podnieść odporność na dotychczas zidentyfikowane metody cyberataku. W referacie przedstawiono sposób zapewnienia bezpieczeństwa informatycznego inteligentnych systemów pomiarowych. Określono procedury związane z badaniami poziomu bezpieczeństwa systemów inteligentnego opomiarowania w odniesieniu do poszczególnych warstw tych systemów.
On August 28, 2018, the Act on the National Cyber Security System, implementing the requirements of the European NIS Directive, came into force. All identified operators of key services are be required to implement the procedures laid down in the directive, including risk assessment in the scope of functioning of provided key services, incident management and most importantly the application of technical and organizational measures adequate to the estimated risk. An important element of estimating this risk is the knowledge of potential attack vectors that can be used to breach the stability of the system performing a specific key service. Intelligent metering systems due to the fact that they use electricity meters that remain physically beyond the control of the network operator, may become a target of a cyberattack on a massive scale and therefore have a significant negative impact on the operation of the electric grid and continuity of energy supply. The paper presents selected methods of the attack on smart metering infrastructure as well as preventive measures that may increase resistance to currently identified cyber-attack methods. Moreover the paper presents the methods of executing a security audit of AMI systems on their architectural levels.
Źródło:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej; 2019, 62; 59-62
1425-5766
2353-1290
Pojawia się w:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Introduction to Big Data Management Based on Agent Oriented Cyber Security
Autorzy:
Raiyn, J.
Powiązania:
https://bibliotekanauki.pl/articles/308285.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
big data
cyber security
information security
Opis:
This paper deals with information security and safety issues in public open spaces. Public open spaces include high streets, street markets, shopping centers, community gardens, parks, and playgrounds, each of which plays a vital role in the social, cultural and economic life of a community. Those outdoor public places are mashed up with various ICT tools, such as video surveillance, smartphone apps, Internet of Things (IoT) technologies, and biometric big data (called Cyber Parks). Security and safety in public places may include video surveillance of movement and the securing of personalized information and location-based services. The article introduces technologies used in Cyber Parks to achieve information security in big data era.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 1; 65-70
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo dzieci i młodzieży w cyberprzestrzeni na podstawie Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022
Safety of children and youth in cyberspace under the National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022
Autorzy:
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/442591.pdf
Data publikacji:
2017
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
cyberbezpieczeństwo
cyberprzestrzeń
cyber security
cyberspace
Opis:
W pierwszej części artykułu przybliżony został problem odpowiedniego zabezpieczenia dzieci i młodzieży od zagrożeń występujących w cyberprzestrzeni. W dalszej kolejności autor pracy przybliżył regulacje „Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022” i zarazem dokonał ich analizy pod kątem zabezpieczenia w cyberprzestrzeni interesu najmłodszych. Intencją autora było m. in. zweryfikowanie czy zapewnienie bezpieczeństwa dzieci i młodzieży w cyberświecie jest dla rządu polskiego priorytetem, czy może jednak problem ten jest zupełnie ignorowany? Analiza poprzedzona jest przedstawieniem status quo polskich regulacji prawnych stojących na straży bezpieczeństwa dzieci i młodzieży w cyberprzestrzeni. W podsumowaniu zawarte są wnioski, jakie autor wyciągnął z przedmiotowej analizy.
The first part of the article depicts the problem of adequate protection of children and young people against the dangers occurring in cyberspace. Subsequently, the author of the paper described the 'National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022’ ańd at the same time ańalysed it iń terms of securing in cyberspace the interests of the youngest. The intention of the author was, among other things, to verify whether ensuring the safety of children and young people in cyberspace is a priority for the Polish Government or whether this problem is completely ignored. The analysis is preceded by the presentation of the status quo of Polish legal regulations that protect the safety of children and young people in cyberspace. The final part contains the conclusions the author drew from the analysis of the issue.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2017, 13, 3; 56-69
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Operational Approach to Maritime Cyber Resilience
Autorzy:
Erstad, E.
Ostnes, R.
Lund, M. S.
Powiązania:
https://bibliotekanauki.pl/articles/1841562.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
maritime cyber resilience
cyber resilience
cyber attack
cyber risk
cyber risk managementm
maritime cyber security
maritime cyber emergency
Opis:
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present. In 2017, IMO officially recognized “… the urgent need to raise awareness on cyber threats and vulnerabilities to support safe and secure shipping, which is operationally resilient to cyber risks”. Thus, Maritime Cyber Resilience is seen as key by IMO in the improvement of the maritime cyber security. It is assumed that human error is the cause of more than half successful cyber-attacks. If technology somehow fails, in example because of a cyber threat, the human is expected to handle the problem and provide a solution. It is therefore necessary to focus on the human aspect when considering maritime cyber threats. This paper aims to provide a working definition of “Maritime Cyber Resilience”. Further, the paper argues why the human should be a focus of study, as the human is at the sharp edge in a potential maritime cyber emergency.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 27-34
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity culture in the public and private sector area in the Central European region
Культура кибербезопасности в государственном и частном секторах Центрально-Европейского региона
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2176730.pdf
Data publikacji:
2022-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber security
cyber security culture
organisational culture
public entities
innovation
cyber security management
кибербезопасность
культура кибербезопасности
организационная культура
государственные организации
инновации
управление
кибербезопасностью
Opis:
Cyber security is a growing problem associated with everything a citizen or organisation does in cyberspace. The problem thus outlined fits into a multifaceted programme that can be addressed through cyber security management. The analysis in the article compares the level of cyber security awareness among the staff of public institutions and the private sector in four Central European countries, namely Poland, the Czech Republic, Slovakia and Hungary. Public institutions are by nature open, decentralised and rich in a wide range of data about the state, society, economy, economics and research and innovation. For this reason, they are often exposed to serious cyber threats. This study examines the relationship between cyber security culture and the urgent need for preventive action against possible cyber threats. The main thesis of the study is that an adequate understanding of cyber security culture and improved awareness among employees about digital threats is key to achieving cyber security growth. The research illustrates breaches in so-called digital hygiene, which are caused by a lack of knowledge, skills and errors in employee behaviour. Following a survey of staff employed in both public and private organisations, an identification of key cyber security risk factors is made. Increasing staff competencies can help improve cyber resilience.
Кибербезопасность – это растущая проблема, связанная со всем, что гражданин или организация делают в киберпространстве. В таком виде эта проблема вписывается в многогранную повестку дня, которую можно решить с помощью управления кибербезопасностью. Анализ, проведенный в статье, сравнивает уровень осведомленности о кибербезопасности среди сотрудников государственных учреждений и частного сектора в четырех странах Центральной Европы - Польше, Чешской Республике, Словакии и Венгрии. Государственные учреждения по своей природе открыты, децентрализованы и богаты широким спектром данных о государстве, обществе, экономике, научных исследованиях и инновациях. По этой причине они часто подвергаются серьезным киберугрозам. В данном исследовании рассматривается взаимосвязь между культурой кибербезопасности и острой необходимостью превентивных действий против возможных киберугроз. Основной тезис исследования заключается в том, что адекватное понимание культуры кибербезопасности и повышение осведомленности сотрудников о цифровых угрозах является ключом к достижению роста кибербезопасности. Исследование иллюстрирует нарушения так называемой цифровой гигиены, которые вызваны недостатком знаний, навыков и ошибками в поведении сотрудников. После опроса сотрудников, работающих в государственных и частных организациях, были определены основные факторы риска кибербезопасности. Повышение компетентности персонала может способствовать повышению киберустойчивости.
Źródło:
Nowa Polityka Wschodnia; 2022, 4(35); 51-71
2084-3291
Pojawia się w:
Nowa Polityka Wschodnia
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies