Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber-threats" wg kryterium: Temat


Wyświetlanie 1-10 z 10
Tytuł:
Manipulation techniques of cyber fraudsters using the example of phishing attempts for private content
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/45440098.pdf
Data publikacji:
2023-08-23
Wydawca:
Akademia Policji w Szczytnie
Tematy:
cyber security
cyber threats
cyber fraud
cyber manipulation
phishing
social media
Opis:
In today's digital environment, users freely use almost all available digital services, from opening and maintaining bank accounts, shopping, working, education, entertainment to sharing private content (photos, videos) and sending confidential information via email. The evolution of the Internet has also radically changed the nature of communication between individuals and influenced contemporary friendship making. The increased use of cyberspace to establish social relationships has also resulted in the emergence of new forms of crime, leading to the extortion of information, photos, videos or money. Consequently, this has increased the ability of criminals to seek out potential victims around the world and exploit ('hopeful') individuals seeking relationships with other users" . Criminals use a range of dating websites and apps to contact victims, but are increasingly using social media platforms, including Facebook, WhatsaApp, Instagram, TikTok . More often than not, these types of relationships end in a form of blackmail and the articulation of threats to disseminate intimate images or recordings if the victim does not comply with certain demands, whether behavioural (sending more sexual images or continuing an intimate relationship) or financial . The phenomenon described above is one of many pieces of evidence supporting the thesis that perceptions of the Internet have long since moved beyond the limits of technology. Analyses of cyberspace are increasingly recognising this unique environment as a set of social practices. Tools for understanding how people use technology to, among other things, interact with other users are therefore gaining importance
Źródło:
Przegląd Policyjny; 2023, 150(2); 207-220
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia dla cyberbezpieczeństwa w transporcie miejskim
Threats to cyber security in urban transportation
Autorzy:
Wcisło, Karina
Aleksandrowicz, Jan
Powiązania:
https://bibliotekanauki.pl/articles/28407378.pdf
Data publikacji:
2023
Wydawca:
Stowarzyszenie Inżynierów i Techników Komunikacji Rzeczpospolitej Polskiej
Tematy:
cyberbezpieczeństwo
transport miejski
zagrożenia cybernetyczne
cyber security
urban transportation
cyber threats
Opis:
Artykuł poświęcono problemowi cyberbezpieczeństwa w transporcie miejskim. Omówione zostały zagrożenia, jakie związane są z udostępnianiem i przesyłaniem informacji w sieci internetowej na temat elementów systemu transportowego. W artykule przedstawiono elementy miejskiego systemu transportowego najbardziej narażone na ataki cybernetyczne oraz podjęto się próby przedstawienia sposobów przeciwdziałania im. Analizę zagrożeń cybernetycznych w artykule przeprowadzono dla: systemów informacji pasażerskiej, planerów podróży, systemów nawigacji drogowej, systemów sterowania ruchem drogowym, automatycznych systemów zliczania pasażerów oraz systemów opłat parkingowych i sprzedaży biletów. W artykule opisane zostały skutki udanych ataków oraz przykłady tego typu działań, które miały już miejsce na terenie Polski. Artykuł zakończono podsumowaniem i wnioskami będącymi wstępem do dalszych prac nad opracowaniem standardów mających na celu przeciwdziałanie zagrożeniom cybernetycznym w transporcie miejskim.
The article is focused on the problem of cyber security in urban transportation. The paper discusses the threats that are associated with the sharing and transmission of information on the Internet about elements of the transportation system. The paper presents the components of the urban transport system most exposed to cyber-attacks and attempts to present measures to prevent them. The analysis of cyber threats in the article was carried out for: passenger information systems, trip planners, road navigation systems, traffic control systems, automatic passenger counting systems and parking fee and ticketing systems. The article describes the consequences of successful attacks and examples of such activities that have already taken place in Poland. The article concludes with a summary and conclusions that are an introduction to further work on developing standards to counter cyber threats in urban transportation.
Źródło:
Transport Miejski i Regionalny; 2023, 5; 16--20
1732-5153
Pojawia się w:
Transport Miejski i Regionalny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zmierzyć się z cyberzagrożeniem
Autorzy:
Szulc, Tadeusz
Powiązania:
https://bibliotekanauki.pl/articles/89447.pdf
Data publikacji:
2018
Wydawca:
Nowa Energia
Tematy:
cyberzagrożenia
cyberbezpieczeństwo
ochrona danych osobowych
cyber threats
cyber security
personal data protection
Opis:
Niedawno postawiono mi pytania: Jak bardzo nasza cywilizacja zmieni się pod wpływem nieustannego i dynamicznego rozkwitu cyfrowych zagrożeń? Jak zagrożenia te wpłyną na jakość otoczenia, w którym żyjemy? Jak będzie wyglądał przebieg kolejnych wydarzeń społecznych, politycznych i kulturalnych w obliczu zagrożenia cyberatakami?
Źródło:
Nowa Energia; 2018, 1; 57-59
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A retrospective analysis of maritime cyber security incidents
Autorzy:
Meland, P. H.
Bernsmed, K.
Wille, E.
Rødseth, Ø. J.
Nesheim, D. A.
Powiązania:
https://bibliotekanauki.pl/articles/2063970.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
retrospective analysis
digital attack
cyber security incidents
maritime cyber threats
maritime incidents
Opis:
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. This study analyses and gives an overview of 46 maritime cyber security incidents from the last decade (2010-2020). We have collected information from open publications and reports, as well as anonymized data from insurance claims. Each incident is linked to a taxonomy of attack points related to onboard or off-ship systems, and the characteristics have been used to create a Top-10 list of maritime cyber threats. The results show that the maritime sector typically has incidents with low frequency and high impact, which makes them hard to predict and prepare for. We also infer that different types of attackers use a variety of attack points and techniques, hence there is no single solution to this problem.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 3; 519--530
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring cyber resilience of ship information systems
Autorzy:
Onishchenko, O.
Shumilova, K.
Volyanskyy, S.
Volyanskaya, Y.
Volianskyi, Y.
Powiązania:
https://bibliotekanauki.pl/articles/2086300.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
ship Information systems
cyber resilience
ship information systems
cyber security
cyber attack
COVID-19
cyber threats
autonomous navigation
Opis:
The Covid-19 pandemic brought a problem related to the inability to timely update security systems on ships during a voyage and the need to encrypt data stored in ship information systems (SISs) and shipping company information systems. The analysis of new types of worldwide cyberattacks showed that they were set off by an increase in the use of remote-controlled autonomous technologies and a spread of telework. It was proved that on ships: a) there are no cybersecurity specialists; b) there is no means of identification of cyber threats and no response plans; c) there is a lack of cybersecurity training for crews; d) encryption of confidential ship data is barely used; e) crew is a vulnerability factor in ship's security. The analysis of cyber incidents allowed us to develop a basic response plan to protect ship control systems. It was demonstrated that the basic plan can be continuously updated and improved in accordance with: a) the real state of ship systems; b) the results of performance analysis of crew actions; c) the emergence of new types of cyberattacks. To improve the security of confidential data in ship information networks theoretical framework for the development of encrypted data search engines with the identification of “dangerous” keywords for the ship information systems (SISs) was proposed. A data exchange protocol, basic requirements for SISs, and an algorithm for detecting “dangerous” keywords in messages were developed. A test search engine on encrypted data was presented, and the main components of the system were highlighted. The functionality of the system was experimentally proved, and the accuracy and speed of search on encrypted data were determined.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 1; 43--50
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Autorzy:
Heering, D.
Powiązania:
https://bibliotekanauki.pl/articles/117518.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
cybersecurity in shipping
Estonian shipowners
cyber attack
cyber incidents
cyber threats
MET System in Estonia
cyber risk
Opis:
Ships, ports and offshore facilities are increasingly becoming dependent on modern information and opera-tional technology. Cyber incidents on ships can create disruptions of critical systems that cause problems for the ship’s safe operation. Therefore, the shipowners must be prepared to cope with rising cyber threats. In or-der to prevent cyber incidents happening on ships and in the companies, essential steps must be taken on the management level. This paper introduces results of two surveys on cybersecurity and cyber awareness carried out in between 2017 – 2019 among the shipping companies operating in Estonia. Feedback was received from 12 shipowners out of 19 and the results show that at least 7 organisations had been the victims to different types of cyberattacks. The results indicate that shipowners are not paying enough of attention to potential cyber threats and education of their employees. Finally, the paper proposes cyber risk mitigation means for the shipowners.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 271-278
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Raising awareness on cyber security of ECDIS
Autorzy:
Svilicic, B.
Brčić, D.
Žuškin, S.
Kalebić, D.
Powiązania:
https://bibliotekanauki.pl/articles/117444.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
risk analysis
ECDIS
ECDIS software
ECDIS cyber security
critical operational technology
ECDIS backup
ECDIS cyber threats
Opis:
In the maritime transport, the Electronic Chart Display and Information System (ECDIS) has been developed into a complex computer-based ship critical operational technology system, playing central roles in the safe ship navigation and transport. While ECDIS software maintenance is regulated by the International Maritime Organization (IMO) ECDIS performance standards and related circulars, underlying software and hardware arrangements are implemented by ship-owners and supported by ECDIS equipment manufacturers. In this paper, we estimate ECDIS cyber security in order to study the origin of ECDIS cyber security risks. A set of ECDIS systems is examined using an industry-leading vulnerability scanning software tool, and cyber threats regarding the ECDIS backup arrangement, underlying operating system and third party applications are studied.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 231-236
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kybernetická obrana: strategická úloha severoatlantickej aliancie a jej národné implikácie
Cyber defence: strategic role of nato and its national implications
Autorzy:
NEČAS, Pavel
GREGA, Matúš
Powiązania:
https://bibliotekanauki.pl/articles/550801.pdf
Data publikacji:
2016
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
Informačná technika
kybernetický priestor
NATO
bezpečnostné výzvy
iregulárne hrozby
národné záujmy
information technology
cyber space
cyber defence
cyber security
irregular threats
Opis:
Informačná technika sa rozvíja mimoriadne významným spôsobom. Stala sa na jednej strane strategickým prostriedkom priemyslu, administratívy, bankového sektoru, ale napríklad aj ozbrojených síl. V posledných rokoch sa ukazuje, že hoci digitálny svet prináša obrovské výhody, je aj zraniteľný. Incidenty v rámci kybernetickej bezpečnosti , či už úmyselné, alebo náhodné, narastajú alarmujúcim tempom a mohli by narušiť poskytovanie základných služieb, ktoré považujeme za samozrejmé, ako je zásobovanie vodou, zdravotná starostlivosť, dodávka elektrickej energie alebo mobilné služby. Hrozby môžu mať rôzny pôvod – vrátane zločineckých, politicky motivovaných, teroristických alebo štátom podporovaných útokov, ako aj prírodných katastrof a neúmyselných chýb. Rozvoj informačných a komunikačných technológií má teda aj svoju tienistú stránku. Kybernetický priestor, tak ako svet fyzický, ponúkol možnosť realizácie sa negatívnej stránke človeka, ktorá má za následok vznik nových bezpečnostných hrozieb.
Information technology is developing extremely significant. It has become the one of the strategic means of industry, administration, banking sector, but also the armed forces. In recent years, it appears that although the digital world brings enormous benefits, is also vulnerable. Incidents within the cyber security, whether intentional or accidental, are increasing at an alarming rate and could disrupt the delivery of basic services that we take for granted, such as water supply, health care, power supply and mobile services. The threats may have different sources - including criminal and politically motivated terrorist or state-supported attacks as well as natural disasters and unintentional errors. The development of ICT has therefore without its drawbacks. Cyberspace as a physical world, offered the possibility of carrying out the negative side of man, which has resulted in the emergence of new security threats.
Źródło:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne; 2016, 7(1)/2016; 306-322
2300-1739
Pojawia się w:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reflection of the Act on Cybersecurity in aviation education
Autorzy:
Kelemen, Miroslav
Polishchuk, Volodymyr
Kelemen, Martin
Polishchuk, Andriy
Powiązania:
https://bibliotekanauki.pl/articles/2046784.pdf
Data publikacji:
2021-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
hybrid threats
cyber security
protected interests
civil aviation
cybernetic
security of aviation network traffic aviation education
Opis:
The paper presents knowledge in the field of professional and legal implementation of building a strong cyber security of the European Union at the national level of a Member State, in the context of the implementation of a new legal norm on cyber security of the state. Part of the expert knowledge is the implementation of the law and the response to the praxeological problems of cyber security in the critical infrastructure sectors, including the TRANSPORT sector, resp. Air transport, as part of flight education.
Źródło:
Cybersecurity and Law; 2021, 5, 1; 129-138
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
Autorzy:
Kosmowski, Kazimierz, T.
Gołębiewski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2068692.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
cyber security
hazardous plants
oil port infrastructure
industrial automation
control systems
hazards
threats
vulnerabilities
risk analysis
key performance indicators
integrated safety
security management
business continuity management
insurance
Opis:
This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer, interested in decreasing risks to be insured, offers the expertise how to limit effectively risks in life cycle from the design conceptual stage of hazardous plant, through its reliable and safe operation, until decommissioning. Therefore, the risk evaluation model for insurance related decision making for the period considered, e.g. one year, should be plant specific with some predictive properties due to changing environment and business conditions, and usually considerable uncertainty involved. The objective is to evaluate and mitigate risks, and control them proactively, through undertaking appropriate activities within a process based management system according to elaborated policy and strategy that includes organisational and technical aspects, including preventive maintenance activities of sensitive equipment and updating in time the training programmes. Careful evaluating and controlling risks is also crucial for the insurance company. Basic activities of the risk engineers and underwriters in the insurance process are outlined in the context of identified hazards/threats and defined factors that significantly influence risks to be considered in evaluating the insurance premium in the context of terms and conditions specified.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 99--126
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies