Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "smishing" wg kryterium: Wszystkie pola


Wyświetlanie 1-2 z 2
Tytuł:
The impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland
Autorzy:
Macierzyński, Wiesław Łukasz
Boczoń, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/16729748.pdf
Data publikacji:
2022
Wydawca:
Instytut Naukowo-Wydawniczy "SPATIUM"
Tematy:
cybersecurity
cyber threat
ransomware
phishing
smishing
vishing
spoofing
malware
Opis:
Purpose: The purpose of the article is to present both theoretical and practical basis for cybersecurity in electronic banking in Poland during the COVID-19 pandemic. During this period a major reorganisation of IT solutions occurred, which allowed to extend the range of online products and services offered both to bank customers and employees. As our life is more and more dependent on digital technologies, cyber attacks have become more costly and more dangerous. Driven by dynamic technological development regulations have changed, which resulted in cybersecurity becoming a key priority in financial institutions. All the more so because the rapid technological development has been followed by more and more advanced techniques used by criminals searching for easy financial profits. Methodology: The paper uses the method of literature review - mostly electronic sources,  descriptive and comparative analyses. Findings: From customers, perspective, the impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland may be recognized as negative. The years 2020-2021 brought a dynamic growth in the number of digital banking customers, especially mobile banking. In those years financial institutions recorded  an enormous increase in online payments, which was the result of strong, forced by the pandemic, surge in sales in E-commerce. At the same time, there was a sharp rise in the crime rate targeted at banks, but most of all, at bank customers. While the security of the very financial institutions remained unthreatened, there was an explosion in the number of cybercrimes  targeted at E-banking users, with the losses giving dozens of millions PLN in total. That is reflected by the data provided by the National Bank of Poland, numerous complaints to the Financial Ombudsman, the Office of Competition and Consumer Protection, as well as the police investigations. Practical implications: The analysis of relations between theoretical and practical bases of cybersecurity in E-banking in Poland during the COVID-19 pandemic is a key factor for financial institutions. Cybercrime undermines customers' trust in E-channels and therefore negatively influences how banks are perceived, the level of the users' activity in digital channels, and consequently, activity and sales in E-channels. Besides the image and financial risks, banks need to take into consideration the increase in reputation, operation and legal risks. On these grounds, it is possible for state organisations and financial institutions to develop professional education concerning cybersecurity, not only for E-banking customers, but for the whole society.
Źródło:
Central European Review of Economics & Finance; 2022, 39, 4; 39-55
2082-8500
2083-4314
Pojawia się w:
Central European Review of Economics & Finance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Criminal liability for CLI spoofing
Autorzy:
Gryszczyńska, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/31342859.pdf
Data publikacji:
2023
Wydawca:
Stowarzyszenie SILGIS
Tematy:
spoofing
cybercrime
smishing
abuse of electronic communication
hacking
cybersecurity
cyberprzestępczość
nadużycia komunikacji elektronicznej
cyberbezpieczeństwo
Opis:
Spoofing involves masking the identity of a person, group or organisation, by manipulating addresses, identifiers or other data used to identify a user or system. This can range from falsifying IP addresses, phone numbers and email addresses to generating persuasive, fake signals capable of disrupting the reception of legitimate GPS signals by receivers. The article aims to analyse the criminal liability of spoofing attacks, with a focus on CLI spoofing. Additionally, the article will identify the most common methods used by perpetrators of spoofing attacks. This will be followed by an examination of the statutory measures implemented in Poland to mitigate the effects of spoofing attacks, which are considered as reasons for criminal responsibility. The article confirms the research hypothesis that effective reduction of CLI spoofing requires not only legislation that introduces criminal liability for spoofing, but also appropriate legal regulations that impose certain obligations on telecommunications entrepreneurs, efficient international cooperation, and comprehensive education in the fields of cybersecurity and cyber hygiene.
Źródło:
GIS Odyssey Journal; 2023, 3, 2; 37-49
2720-2682
Pojawia się w:
GIS Odyssey Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies