Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyberwar" wg kryterium: Temat


Wyświetlanie 1-2 z 2
Tytuł:
The contemporary multi-layered cybersecurity landscape and emerging nano-threats. An overview
Współczesny wielowarstwowy krajobraz cyberbezpieczeństwa i pojawiające się nano-zagrożenia. Przegląd
Autorzy:
Olszewski, Bogusław
Powiązania:
https://bibliotekanauki.pl/articles/16539466.pdf
Data publikacji:
2022-06-30
Wydawca:
Uniwersytet Opolski
Tematy:
cyberspace
persona
cyberpersona
layers
cyberwar
adversary
Opis:
Presented article attempts to identify the key node located in the three-tier model of cyberspace, the node which is characterized by the greatest potential impact on the other elements essential for the functioning of the whole network, especially in the security context. Based on the network analysis, it was proposed to place the ‘persona’ in the center of interest, in other words the human factor. In this way – regardless of the future direction of the further development of artificial intelligence – an individual adversary is able to dispose the historically unprecedented ability to put an impact on the critical and – potentially – military infrastructure of the state. Thus, individual digitally-skilled person is capable of destabilizing the post-industrial society not only in the context of network/computer security, but also physical security (through the cyber-physical systems).
Źródło:
Studia Krytyczne/ Critical Studies; 2021, 10; 63-72
2450-9078
Pojawia się w:
Studia Krytyczne/ Critical Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
From Terrorism to Cyberterrorism
Autorzy:
Smejkal, Vladimír
Powiązania:
https://bibliotekanauki.pl/articles/1835827.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
cyberterrorism
information war
cyberwar
Czech Cyber Security Act
cybercrime
Opis:
The paper deals with a new phenomenon of crime – the terrorism in cyberspace. Terrorism, cyberterrorism and cyberwar are defined here. The paper focuses on the systemic integration of cyberterrorism into the structure of terrorist attacks, describes various types of attacks in cyberspace, and deals with the legal definition of cyberterrorism. Since the 1990´s, war and armed conflict have been moving increasingly from the interstate to the intrastate area. In the postmodern conflict, besides government troops, various irregular paramilitary groups, most commonly defined tribally, ethnically, or religiously, keep on fighting. However, their military activities are usually linked to a largescale criminal activity. Whereas, in standard wars, we expect states and their armed forces to be parties to the conflict, in the case of the postmodern conflict, hybrid wars, and the so-called asymmetric threats, war is not separated from the life of the civil society, as it used to be in standard wars of the 20th century. It is also increasingly difficult to separate war and terrorist attacks. Cyberattacks are becoming a part of terrorist attacks. Modern information technologies are becoming more and more important in spreading ideologies which provide a fertile ground for terrorism, as they are increasingly important for training and teaching terrorist practices. Terrorists use the Internet as a means of spreading propaganda aimed at recruiting sympathizers as well as instructions and manuals for training or attack planning. Cryptocurrencies such as bitcoins are used to transfer finances. In this context, cyberterrorism could be defined as the use of the means of modern information and communication technologies to implement an act of violence, in order to provoke a certain reaction (from the point of view of terrorists, in ideal case, the by them required psychological reaction) of the audience of the terrorist act. In the case of cyberterrorism, it would be a politically motivated attack on instruments and / or the process of obtaining and / or processing electronic data which, as a result, means violence against non-military targets and the purpose of which is to influence, in a certain way, a wider circle of recipients rather than the direct victims of such an attack. While mostly natural persons are the target of typical terrorism, in the case of cyberterrorism, on the contrary, the attacks are aimed at state authorities, corporations, and the critical infrastructure. It is a question whether in these cases we are able to correctly assess whether it is a terrorist attack or an (unreported) information or cyberwar conducted by a foreign state. In some cases, we cannot even be sure whether it is a criminal act which is masked as a terrorist one or vice versa, which is easier to do in cyberspace rather than in the material world.
Źródło:
Security Dimensions; 2018, 25(25); 118-130
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies