Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber" wg kryterium: Temat


Tytuł:
State-sponsored and organized crime threats to maritime transportationsystems in the context of the attack on Ukraine
Autorzy:
Cichocki, R.
Powiązania:
https://bibliotekanauki.pl/articles/24811512.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber attack
cyber incidents
maritime cyber resilience
cyber resilience
maritime cyber security
maritime cyber threats
cybersecurity
advanced persistent threat
Opis:
Due to its strategic importance and vast impact on the world economy, maritime transport has become a cyber battlefield. Cybersecurity organizations across the world notice and analyze adversaries such as Bear from Russia, Panda from China, Buffalo from Vietnam, Chollima from North Korea (DPRK), and others from Columbia, India, Turkey, and Iran, as well as hacktivist and E-Crime. In 2014 - 2023, Ukraine became the object of massive cyberattacks aimed at its political, social, and economic destabilization. This situation changes the perception of cyberspace and its importance for ensuring the security of the global economy, in particular, the maritime economy. Reports published by the US Coast Guard show that. In this publication, the author reviews the cybersecurity threat landscape targeting the maritime industry and transportation systems and analyzes the technics, tactics, and procedures (TTPs) used by threat actors.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 3; 717--721
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/31342006.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber risk
cyber threats to the elderly
cyber hygiene
personal cyber insurance
Opis:
The paper investigates the growing cyber threats to personal finance, faced by the elderly in the digital age. It begins by acknowledging the surge in cyber incidents, particularly impacting seniors amid their increasing engagement in the digital space. The research explores the theoretical background of individual attitudes towards cybersecurity, emphasizing the unique vulnerabilities of the elderly population and their heightened susceptibility to cyber threats. It offers practical recommendations for personal cyber hygiene. Moreover, it introduces personal cyber insurance (PCI) and discusses its advantages and challenges. As the main contribution to the body of knowledge, the study provides a comprehensive understanding of the specific challenges faced by the elderly in the digital realm. It offers practical strategies for risk mitigation and introduces PCI as a means of enhancing resilience. It also sets the groundwork for further exploration and targeted strategies to protect individuals, especially older adults, in the dynamic landscape of cybersecurity.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 281-298
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo w Federacji Rosyjskiej. Zarys problemu
Cybersecurity in the Russian Federation. Outline of the problem
Autorzy:
Giebień, Helena
Powiązania:
https://bibliotekanauki.pl/articles/521558.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Wrocławski. Wydział Nauk Społecznych. Instytut Studiów Międzynarodowych
Tematy:
cybersecurity
cyber terrorism
cyber attack
cyberwar
Russian Federation
Opis:
The article undertakes the issues of cybersecurity in Russia. It shows the scale of cybercrime, their impact on the functioning of the states and attempts to solve the problem. The main thesis of the article states that the Russia Federation seeks to enhance its cyberspace security systems both on the legislative and executive level, trying to protect state’s institutions and critical infrastructure as well as cooperating with other states and international organizations. The articles analyses primary and secondary sources such as legal acts, reports, scientific literature, and Russian press, to present the research problem and draw conclusions. The research shows that the Russian authorities are aware of the multiple challenges they have to face to ensure the eÐ cient security of the cyberspace. Among the key elements are the raise of the level of competence of Russian specialists fighting cybercrimes, creation of the efficient infrastructure and protection against cyber attacks as well as improving the international system of information exchange on threats in the network. Russia faces also the challenge to strengthen multilateral cooperation with other states, based on mutual trust, especially in the face of a negative image of Russia resulting from the activities of hackers, connected to the state, who can paralyze the critical infrastructure of the other states.
Źródło:
Wschodnioznawstwo; 2018, 12; 187-204
2082-7695
Pojawia się w:
Wschodnioznawstwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phishing wall - jak zbudować ludzką zaporę przeciwko cyberatakom?
Autorzy:
Masztalerz, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/2080433.pdf
Data publikacji:
2021
Wydawca:
Nowa Energia
Tematy:
cyberbezpieczeństwo
cyberatak
cyberzagrożenie
phishing
cybersecurity
cyber attack
cyber threat
Opis:
O cyberzagrożeniach łatwo mówić, gdy doszło już do incydentu bezpieczeństwa. Wówczas dowiadujemy się, że firma musiała zapłacić okup za uzyskanie klucza do zaszyfrowanych przez złośliwe oprogramowanie danych. Biznes na chwilę obniża poziom ciśnienia krwi, a cyberprzestępca liczy wpływy. Jak wynika z rynku zachodniego i badań zajmującej się cyberbezbieczeństwem firmy Infrascale: już 78% małych i średnich przedsiębiorców działających w modelu B2B zapłaciło pierwsze okupy w wyniku cyber ataku.
Źródło:
Nowa Energia; 2021, 5/6; 70--71
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
System Approach to Coherent Cybersecurity Strategy
Autorzy:
MICHALSKI, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/466152.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cybersecurity
cyber defense,
system approach,
cyber defense strategies
cybersecurity strategies
Opis:
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.
Źródło:
Safety & Defense; 2019, 5, 1; 31-36
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How Are Czech Individuals Willing to Protect Themselves: A Comparison of Cyber and Physical Realms
Autorzy:
Kleiner, Jan
Drmola, Jakub
Mares, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/27294854.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
cyber-physical comparison
cybersecurity
survey
porównanie cyber-fizyczne
cyberbezpieczeństwo
ankieta
Opis:
Endpoint users are usually viewed as the highest-risk element in the field of cybersecurity. At the same time, they need to be protected not just from the individual-level prism but also, from the state’s perspective, to counter threats like botnets that harvest weakly secured endpoints and forge an army of so-called zombies that are often used to attack critical infrastructure or other systems vital to the state. Measures aimed at citizens like the Israeli hotline for cybersecurity incidents or Estonian educational efforts have already started to be implemented. However, little effort is made to understand the recipients of such measures. Our study uses the survey method to partly fill this gap and investigate how endpoint users (citizens) are willing to protect themselves against cyber threats. To make results more valid, a unique comparison was made between cyber threats and physical threats according to the impact which they had. The results show statistically significant differences between comparable cyber-physical pairs indicating that a large portion of the sample was not able to assess the threat environment appropriately and that state intervention with fitting countermeasures is required. The resultant matrix containing frequencies of answers denotes what portion of respondents are willing to invest a certain amount of time and money into countering given threats, this enables the possible identification of weak points where state investment is needed most.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-14
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rozwój zdolności NATO wobec zagrożeń cybernetycznych
The Development of NATO’s Capabilities of Tackling Cyber Threats
Autorzy:
Kulczycki, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2139670.pdf
Data publikacji:
2020-11-30
Wydawca:
Wydawnictwo Naukowe Dolnośląskiej Szkoły Wyższej
Tematy:
NATO
cyberbezpieczeństwo
cyberprzestrzeń
cyberzagrożenia
cyberobrona
cybersecurity
cyberspace
cyber threats
cyber defence
Opis:
Zagrożenia, które związane są z cyberprzestrzenią, obejmują wszystkie podmioty współczesnego środowiska bezpieczeństwa, w tym również Organizację Traktatu Północnoatlantyckiego. Z uwagi na to, że stają się one coraz częstsze, bardziej złożone i dotyczą coraz więcej sektorów bezpieczeństwa, NATO zmuszone było podjąć określone kroki w dziedzinie cyberbezpieczeństwa. Przedmiotem badania w przedstawionym artykule są działania, które zostały podjęte przez Sojusz w odpowiedzi na dotychczasowe cyberzagrożenia. Zasadniczym celem badań było zidentyfikowanie tych działań, które przyczyniły się do rozwoju zdolności NATO do walki z zagrożeniami cybernetycznymi. W artykule wykorzystano metodę analizy krytycznej (literatury przedmiotu, artykułów naukowych, dokumentów, raportów, materiałów prasowych) oraz metodę historyczną. Głównym pytaniem badawczym jest: jakie dotychczasowe działania przyjęte przez Sojusz Północnoatlantycki przyczyniły się do budowy jego zdolności do zwalczania cyberzagrożeń? Główna teza artykułu zakłada, że dotychczasowe działania Sojuszu Północnoatlantyckiego będące odpowiedzią na zagrożenia cybernetyczne, miały wpływ na rozwój i wzmocnienie jego zdolności do obrony w tym obszarze. Rezultaty badań przedstawione w artykule wskazują na aktywność Sojuszu Północnoatlantyckiego w sferze cyberobrony, w szczególności tę, podjętą w okresie ostatnich pięciu lat. Należy się spodziewać, że działania te będą podstawą do dalszej aktywności Sojuszu, która obejmować będzie nie tylko działania defensywne, ale i również inne proaktywne służące poprawie bezpieczeństwa cybernetycznego wszystkich jego członków. 
Manifold dangers related to cyberspace concern all modern security environment entities, including the North Atlantic Treaty Organization. Due to the fact that they become ever more frequent and complex, NATO is in need of taking specific steps in this field. This paper presents the measures undertaken by the Alliance in response to current cyber threats. The main goal of the research was to identify those activities that have contributed to the development of NATO’s capabilities concerning cyber threats. The article uses the method of critical analysis (literature on the subject, scientific articles, documents, reports, press materials) and the historical method. The main research question is: what actions taken so far by the North Atlantic Alliance have contributed to extending its cyber threats capabilities? The thesis advanced in the article says that the North Atlantic Alliance’s activities in this matter have impacted the development and the strengthening of its ability to defend this area. It should be expected that they will be the basis for the Alliance’s further activity which will include not only defense policies, but also other proactive activities in terms of contributing to the improvement of cyber security of all its members.
Źródło:
Rocznik Bezpieczeństwa Międzynarodowego; 2020, 14, 2; 146-163
1896-8848
2450-3436
Pojawia się w:
Rocznik Bezpieczeństwa Międzynarodowego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity in the European Union
Autorzy:
Wołyniec, Jakub
Powiązania:
https://bibliotekanauki.pl/articles/1047954.pdf
Data publikacji:
2019
Wydawca:
Fundacja Niepodległości
Tematy:
cybersecurity
cyber threats
european union.
Opis:
Because of the asymmetric nature of cyber threats and the dynamics of their evolution, there is a tendency for a growing role of security cooperation activities in cyberspace through joint efforts of states and non-state actors in international relations. New challenges and threats caused by the global pandemic are linked with an increased internet activity. The recent spread of fake news related to COVID-19 illness caused by SARS-CoV-2 coronavirus might be seen as part of sharp power disinformation strategy applied by state actors. International organisations serve as a forum for discussion to disseminate and analyse knowledge about cybersecurity and the effects of cyber threats, they are at the same time creators of common principles of prevention, legal and institutional solutions, and are complementary to the activities of states in this field. By adopting the regional level of analysis as its methodological perspective, the article shows a natural evolution of cybersecurity means from the time of the 1990s and early 2000s when the focus was set on computer and cyberspace as a tool of serious and organised crime, through the stage when computer crime was endangering cyberspace of the EU Member States, to the period when finally the EU objectives were to achieve an open, safe and secure cyberspace keeping in mind the importance of raising awareness and acquiring skills and knowledge how to avoid or face cyber threats. At the early stages of establishing the EU cybersecurity policy, the documents focused on definitions and identifications of threats and trends. Later stages included organising institutional and legal framework, and setting up specialised institutions, centres and teams. Not only did the understanding of cyber-related issues changed but also the response of the EU to cyber threats. The transition is from the soft law instruments (recommendations) such as guidelines, communications, declarations, roadmaps, actions plans, and strategies towards more hard law instruments (obligations) such as directives and other legislative acts. The character of directives has also changed – from directives on cyber-related issues to those characterised as cyber-oriented, each being more ambitious than the previous one. The complete appraisal of the effectiveness of the EU cyber security policy is impeded by a specific nature of cyberspace and its security, as well as problems with gathering appropriate data.
Źródło:
Prawo i Polityka; 2019, 9; 31-44
2080-5799
Pojawia się w:
Prawo i Polityka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity of E-government
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Strizzolo, Nicola
Powiązania:
https://bibliotekanauki.pl/articles/31342025.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
e-government
cyber threats
cybersecurity
Opis:
Modern administration often uses ICT systems to deliver public services, which must be adequately secured. Public administration bodies must, therefore, also include cybersecurity in their policies. E-services should be the standard. Unfortunately, this standard does not always apply in administration. New technologies in a digital state and information society must be widely used, including by public bodies, so that the quality and accessibility of the services provided meet social needs. The public administration is responsible for continuously developing computerisation, making it possible to function normally in cyberspace where citizens have long been present.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 146-160
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity of Air Force
Autorzy:
Hodyr, Elżbieta
Powiązania:
https://bibliotekanauki.pl/articles/2158437.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
Offensive Cyber Operation
Defensive Cyber Operation
satellite technologies
Air Force
Air and Space Force
Opis:
Cybersecurity of air force is new challenges topic in cyberspace. I would like to describe that challenges in my article. I think important is influence of Warsaw Summit 2016 and declaration, that Nato will be use in the future also Offensive Cyber Operation. I would like to describe them. Later I would like to focus how technology changes – satellite technologies should make an evolution in Air Force (maybe Air and Space Force should be). I will also describe India develop in cybersecurity of Air Force. In the and I will describe cybersecurity of Air Force objectives, gaps of cybersecurity of Air Force and try to give recommendation what to do to strengthen cybersecurity of Air Force.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 56-69
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Importance of Dealing with Cybersecurity Challenges and Cybercrime in the Senior Population
Autorzy:
Lošonczi, Peter
Powiązania:
https://bibliotekanauki.pl/articles/1808146.pdf
Data publikacji:
2018-11-07
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
cybersecurity
cyber threats
cybercrime
prevention
senior
Opis:
This article deals with the importance of focusing seniors’ attention on cybercrime and cybersecurity. We should perceive cybersecurity as a key component of state security. Technological development has brought new forms of crime in this area. The people above 55 belong to the most vulnerable group in terms of cybersecurity threats and consequently they become a common target for cyber criminals. Prevention in this area is therefore of the utmost importance. Information and communication technologies make our lives easier. They speed up communication and information access and as well as access to various services on one hand. But in case of insufficient security, an increasing dependency of the public and private sector on these technologies is increasing the threat of a cybercrime. This makes cybersecurity one of the biggest challenges that need to be properly addressed by the state.
Źródło:
Security Dimensions; 2018, 26(26); 173-186
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity of nuclear weapon systems
Autorzy:
Hodyr, Elżbieta
Powiązania:
https://bibliotekanauki.pl/articles/1987358.pdf
Data publikacji:
2022-02-07
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
nuclear weapon systems
cyber risks
Opis:
In my article, I would like to describe the history of cybersecurity related to nuclear safety, to answer the question of what cybersecurity is and how the development of cybersecurity was related to the development of nuclear safety and nuclear systems. Continuing, I will also describe the cyber risks associated with nuclear systems. I would also like to try to make recommendations for cybersecurity related to nuclear safety. I would also like to try to make recommendations for cybersecurity related to nuclear safety
Źródło:
Cybersecurity and Law; 2021, 6, 2; 91-101
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected issues of threat management in cyberspace
Autorzy:
Barczak, Andrzej
Barczak, Michał
Powiązania:
https://bibliotekanauki.pl/articles/27323575.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cybersecurity
threat management
cyber threat intelligence
Opis:
The paper describes the cyber threat management system. Three essential components of such a system are presented. With reference to such documents as ISO 2700, the NIST Cyber Security Framework, U.S. presidential executive orders, European Union regulations or STIX and TAXIS standards, norms, legal and standards regulations for managing cyber threats are described. The cyber threat management model is presented. Kill Chain and MITRE ATT&CK threat description methods are presented. A toolkit to support various stages of the cyber threat management process is also described.
Źródło:
Studia Informatica : systems and information technology; 2023, 1(28); 5--28
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity and cyber risk in integrated and management reports of key service operators
Autorzy:
Ferens, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1917428.pdf
Data publikacji:
2021-06-21
Wydawca:
Stowarzyszenie Księgowych w Polsce
Tematy:
cybersecurity
cyber risk
business model
IT security
Opis:
Purpose: The scope of interactive information processed and exchanged through cyberspace has grown exponentially. Therefore, there is a need to develop cybersecurity that protects this space against both internal and external threats, as well as to work out an appropriate reporting system on the cybersecurity model operating in the company. The aim of the paper is to identify and assess the disclosures on cybersecurity and cyber risk in the integrated and management reports of selected companies listed on the Warsaw Stock Exchange. Methodology: The study focused on the integrated and management reports of 17 selected companies identified as operators of so-called key services. The representative sample was chosen through purposive sampling. This process was preceded by a preliminary analysis of companies listed in the WIG 30 Index, drawing on the number of integrated reports prepared by the operators of key services. The research involved an analysis of the literature and legal regulations, as well as the structure and scope of information on cybersecurity reported by the surveyed companies, along with the deductive method. The results of the analysis showed that only some companies present information on existing cyber risks and cybersecurity, while information is scattered in different parts of the business reports and non-comparable due to the lack of a unified data structure. It was noted that the reports do not contain detailed information on the activities in the field of cybersecurity, which makes it impossible to perform a multifaceted and multisectoral assessment of the results reported by the entities. Originality: The paper builds on and thus complements the scientific achievements in the field of non-financial reporting, including the business model, by identifying the shortcomings related to reporting on how to protect companies against the risk related to cyber threats in the reports to date. The study also confirms the need to improve the content of business reports with quantitative and qualitative information in this regard
Źródło:
Zeszyty Teoretyczne Rachunkowości; 2021, 45(2); 31-50
1641-4381
2391-677X
Pojawia się w:
Zeszyty Teoretyczne Rachunkowości
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybercrime on the Example of Selected Botnets
Autorzy:
Mazurczak, Przemysław
Powiązania:
https://bibliotekanauki.pl/articles/2020073.pdf
Data publikacji:
2021-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber threats
botnet
computer network
cyberspace
cybersecurity
Opis:
The article presents threat analysis resulting from botnet activity on the Internet. Botnet networks are a very common tool among cybercriminals. They enable the acquisition of large amounts of data from computers infected with the virus that creates the given network entirely subordinated to its creator. Currently, many unidentified botnets are a threat to Internet users. Those identified and diagnosed answer the problem of how dangerous a botnet is in the hands of cybercriminals. The article presents statistics and analysis of selected botnets. Currently, there is a decline in the interest in botnets in cybercrime, although many new threats appear, suggesting that botnets will continue to be popular and are still a dangerous weapon in the hands of criminals.
Źródło:
Polish Political Science Yearbook; 2021, 3 (50); 53-65
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies