Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cybersecurity" wg kryterium: Temat


Tytuł:
Cybersecurity as the Basis for State and Society Security in the 21st Century
Autorzy:
Bujek, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/466214.pdf
Data publikacji:
2017
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyberspace
cybersecurity
threats
cybersecurity system
Opis:
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
Źródło:
Safety & Defense; 2017, 3; 8-13
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Autorzy:
Wiechetek, Łukasz
Mędrek, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2168351.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
computer security
cybersecurity
cybersecurity awareness
security education
cybersecurity education
business students
Opis:
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and cybersecurity incidents. Members of Generation Z use information technology as a main tool for broadening their knowledge and skills. For such digital natives, proficiency in ICTs appears as an indispensable element of life. This is even more apparent during the COVID-19 pandemic, when they are forced to use IT tools more often, both for the entertainment, education, and work. Such acceleration generates new possibilities, but also new threats.Purpose of the article: The aim of the paper is to check if members of Generation Z are aware of cybersecurity issues and whether they know basic threats and methods/tools that can improve the safety. We analyse students’ behaviour in the event of cyber incident and examine whether the analysed group is willing to improve cyber knowledge, skills, and attitudes.Research methods: We explored data collected from business students (N = 182). The online questionnaire was prepared in LimeSurvey. Finally, data analysis and visualization were performed in Microsoft Excel and Tableau.Main findings: The analysis indicates that business students have rather poor knowledge in cybersecurity. The results demonstrate the need for targeted educational campaigns and trainings that address the specific cyber weaknesses to build secure ecosystem, combining both technical, organizational, and behavioural aspects.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska, sectio H – Oeconomia; 2022, 56, 1; 119-142
0459-9586
2449-8513
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska, sectio H – Oeconomia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Szacowanie ryzyka dla usług kluczowych opartych o systemy OT. Wymagania Krajowego Systemu Cyberbezpieczeństwa
Autorzy:
Kister, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/89318.pdf
Data publikacji:
2019
Wydawca:
Nowa Energia
Tematy:
cyberbezpieczeństwo
cybersecurity
Opis:
Cyberbezpieczeństwa nie można pozostać na pastwę niepewności czy polskiego „jakoś to będzie”. Zauważył to nawet ustawodawca, który na wszystkich podmiotach Krajowego Systemu Cyberbezpieczeństwa, wymusza systematyczne szacowanie ryzyka dla systemów informacyjnych służących do zarządzania usługą kluczową dla normlanego funkcjonowania państwa i jego mieszkańców. Czy jednak rozumiemy, że świadomość prawdopodobieństwa wystąpienia oraz skutków materializacji konkretnych zagrożeń w sieciach przemysłowych, to nie „wypełnienie” nakazów prawnych, a biznesowa konieczność?
Źródło:
Nowa Energia; 2019, 3; 37-39
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity Politics – Conceptualization of the Idea
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2019097.pdf
Data publikacji:
2021-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cybersecurity policy
cybersecurity
political theory
international relations
Opis:
The cybersecurity issue discussed in the paper is seen from the perspective of political science with the indication that the subject under discussion concerns the multifaceted nature of the state’s actions, which consists of political, economic, social, and cultural factors. At the same time, the work also intends to prove that cybersecurity is not only a domain of technology because it is the mentioned aspects that shape the conditions of stable development of the state and its citizens in a space dominated by cyber technology in a much more decisive way. Given the growing role of cybertechnology in almost all areas of human life, its importance also forces and inspires political science to question the shape and model of modern policy, which is significantly evolving under the influence of new technologies. On the one hand, emerging cyber threats reveal the weakness of the state and the dependence of state institutions on cybertechnologies, but on the other hand, existing cyber incidents may also motivate many governments to take action to increase the level of cybersecurity.
Źródło:
Polish Political Science Yearbook; 2021, 1 (50); 71-89
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena poziomu wydatków publicznych na funkcjonowanie systemu cyberbezpieczeństwa w Polsce na tle Unii Europejskiej
Assessment of the level of public expenditure on the functioning of the cybersecurity system in Poland compared to the European Union
Autorzy:
Kiestrzyn, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/2895533.pdf
Data publikacji:
2020
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
cybersecurity
threats in cyberspace
EU expenditure on cybersecurity
expenditure on cybersecurity in Poland
Opis:
The main purpose of the article is to present and assess the changes in the directions of expenditure on cybersecurity in Poland from the state budget and their impact on the assessment of technological advancement in comparison with the EU. The formal and legal regulations that came into force over the last years in the EU and in Poland in this area are reviewed as well. The first part of the article focuses on the evolution of definitions and regulations regarding cyberspace, cybercrime and cybersecurity. It also highlights the entities involved in the cybersecurity system and their role in preventing threats in cyberspace. Next, the author briefly examines main threats in the digital space of the European Union and Poland. The final section assesses directions of financing cybersecurity in Poland versus the EU. The author argues that as the use of technology increases, it will be necessary to increase public spending on cybersecurity in order to maintain the level of security.
Źródło:
Studia BAS; 2020, 3(63); 127-153
2080-2404
2082-0658
Pojawia się w:
Studia BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
“Every knock is a boost”. Cyber risk behaviour among Poles
Autorzy:
Cichowicz, Ewa
Iwanicz-Drozdowska, Małgorzata
Kurowski, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/1891366.pdf
Data publikacji:
2021-12-17
Wydawca:
Uniwersytet Ekonomiczny w Poznaniu
Tematy:
cybersecurity behaviour
knowledge of cybersecurity
instrumental variables
financial services
Opis:
The purpose of this study is to evaluate the safety of individuals’ behaviour in the cyber world, especially when using financial services. The article focuses on knowledge of cybersecurity issues, cyber risk awareness and respondents’ self-assessment as potential determinants of individual behaviour. The data obtained from a survey of a representative group of Polish citizens during the second wave of the COVID-19 pandemic was analysed. Ordinal logistic regression and instrumental variable analysis confirm the existence of a positive relationship between knowledge and awareness of cyber risk and safe behaviour in the cyber world. Older generations exhibit safer behaviour which may be linked to their life experience; however, the results do not confirm that experiencing a loss due to cyber risk convinces individuals to use Internet-based solutions in a safer manner. Therefore, educational campaigns should be expanded to include cyber risk issues and tailored to the needs of various users.
Źródło:
Economics and Business Review; 2021, 7, 4; 94-120
2392-1641
Pojawia się w:
Economics and Business Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Laboratorium Oceny Cyberbezpieczeństwa Instytutu Łączności – wymagania i wytyczne
IT Security Evaluation Facility at the National Institute of Telecommunications – requirements and guidelines
Autorzy:
Andrukiewicz, E.
Tekampe, N.
Powiązania:
https://bibliotekanauki.pl/articles/317488.pdf
Data publikacji:
2018
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cyberbezpieczeństwo
ocena cyberbezpieczeństwa
certyfikacja
cybersecurity
cybersecurity evaluation
certification
Opis:
Rozwój technologii telekomunikacyjnych zwiększa zapotrzebowanie na certyfikację bezpieczeństwa produktów i usług. W połączonych gospodarkach, w tym w szczególności w Unii Europejskiej, istotne znaczenie ma wzajemne uznawanie certyfikatów wydawanych na podstawie wiarygodnych i kompletnych ocen bezpieczeństwa. Obecnie jest to możliwe dzięki porozumieniom międzynarodowym, takim jak Common Criteria Recognition Agreement (CCRA) i Senior Officers Group Information Security – Mutual Recognition Agreement (SOG-IS MRA). Proces certyfikacji produktu lub usługi składa się z dwóch etapów: ewaluacji (oceny), którą wykonują laboratoria oraz wydawania certyfikatów, które wykonują jednostki certyfikujące. Laboratoria przeprowadzające ewaluację muszą spełnić szereg kryteriów, określanych przez krajowe jednostki certyfikujące. W opracowaniu przeanalizowano wymagania i praktyki laboratoriów w krajach należących do porozumień międzynarodowych, zapewniających wzajemne uznawanie certyfikatów zgodnych z Common Criteria wraz z wnioskami i wytycznymi dla Laboratorium Oceny Cyberbezpieczeństwa w Instytucie Łączności.
The development of telecommunications technologies increases the need to certify the cybersecurity of products and services. In the connected economies, in particular in the European Union, mutual recognition of certificates issued on the basis of reliable and complete security assessments is essential. This is now possible thanks to international agreements such as the Common Criteria Recognition Agreement (CCRA) and the Senior Officers Group Information Security – Mutual Recognition Agreement (SOG-IS MRA). The certification process is divided into two stages: evaluation, carried out by independent laboratories, and certification, performed by a national certification body. Laboratories performing the evaluation shall meet a series of requirements defined by national certification bodies. In the study an analysis of the requirements and practices of laboratories in the CCRA member states was performed, resulting in the conclusions and guidelines for the cybersecurity assessment laboratory at the National Institute of Telecommunications.
Źródło:
Telekomunikacja i Techniki Informacyjne; 2018, 1-2; 53-68
1640-1549
1899-8933
Pojawia się w:
Telekomunikacja i Techniki Informacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity
Autorzy:
Karpiuk, Mirosław
Makuch, Anna
Soler, Urszula
Powiązania:
https://bibliotekanauki.pl/articles/22180772.pdf
Data publikacji:
2023-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
social security
cyberspace
cybersecurity
public security
cybersecurity strategy
Opis:
Cybersecurity belongs to the area of activity of state and supra-state actors, giving direction to national and international systems of law as components of national and supranational systems of political, economic, military cooperation, etc. Still, the state has a monopoly on the causality of lawmaking, which forms the basis of cyberspace use security activities. The state responds to national security needs by actively participating in the formation of the collective security order of the supranational level. The aim of this paper is to demonstrate the significance of the national Cybersecurity Strategy of the Republic of Poland for ensuring the safe use of cyberspace. The Strategy, while referring to the national order, is at the same time an implementation of supranational arrangements within the scopes adopted by the state authorities, which means that the Strategy is subjected to logical evaluation depending on the impact of cyber conditions or binding arrangements of the international environment. The text is based on two research methods: the doctrinal legal research method to analyse the applicable legal regulations governing the issues related to the strategic aspects of cybersecurity and the law theory method aimed at evaluating the strategic solutions in respect of security in cyberspace.
Źródło:
Polish Political Science Yearbook; 2023, 3(53); 155-163
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The legal status of the cyberarmy in Hungary and Poland. An overview
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311673.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberarmy
cyberspace
cybersecurity
Opis:
Cybersecurity tasks concern not only civilians but also the military. Similar to other spheres, cyberspace, as an operational domain, is exposed to threats. This includes destructive threats, ones that destabilise the state or its institutions. Given the need to ensure cybersecurity in the military dimension, individual states establish cyber armies to safeguard the stability of cyberspace, which is exposed to constant attacks. Cyberspace defence in a digital state, where ICT systems are also used to complete military tasks, must be considered a priority not only in national but also in international defence policies.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 19-31
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The State as a Learning Organization and Cybersecurity
Autorzy:
Szreniawski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2158435.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
state
learning
Opis:
In a contemporary state, cybersecurity is becoming an increasingly important issue. In order for a state to adequately respond to changing threats, it must be a learning organization. Learning about cybersecurity should include specialist knowledge, but also knowledge about cybersecurity shaping the behaviours of the general public and policy makers. Legal regulations are an important instrument of shaping cybersecurity in a learning state.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 36-43
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kierunki działań instytucji europejskich na rzecz podnoszenia poziomu bezpieczeństwa podmiotów państwowych i niepaństwowych w cyberprzestrzeni – wybrane przykłady
Autorzy:
Cichosz, Jolanta
Powiązania:
https://bibliotekanauki.pl/articles/624615.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
cybersecurity, European cybersecurity, challenges, cyberthreats
cyberbezpieczeństwo, europejskie cyberbezpieczeństwo, wyzwania, cyberzagrożenia
Opis:
The article analyzes the state of European cybersecurity on selected examples. In the face of the increasing cybersecurity challenges in the European Union (legislative, institutional, research, industry), it is necessary to verify the models that ensure cybersecurity. In addition, this verification should concern the coherence of the digital single market strategy, the implementation of large projects and the allocation of duties to the interested representatives. At the same time, the changes should include the coherence of legal provisions and definitions relating to cyberthreats. Priority actions in the field of cybersecurity should include: the increasing of the required capabilities and readiness to respond to cyberthreats, the strengthening cooperation and coordination between Member States of the European Union as well as between the institutions, the agencies, the authorities and the industry.
Artykuł analizuje stan europejskiego bezpieczeństwa cybernetycznego na wybranych przykładach. W obliczu rosnących wyzwań w zakresie bezpieczeństwa cybernetycznego w Unii Europejskiej (legislacyjnych, instytucjonalnych, badawczych, przemysłowych) konieczne jest zweryfikowanie modeli zapewniających bezpieczeństwo cybernetyczne. Ponadto weryfikacja ta powinna dotyczyć spójności strategii jednolitego rynku cyfrowego, realizacji dużych projektów i przydzielania obowiązków zainteresowanym przedstawicielom. Jednocześnie zmiany powinny dotyczyć doskonalenia spójności przepisów prawnych i uaktualnienia definicji związanych z zagrożeniami cybernetycznymi. Priorytetowe działania w dziedzinie bezpieczeństwa cybernetycznego powinny obejmować: zwiększenie wymaganych zdolności i gotowości do reagowania na zagrożenia cybernetyczne, wzmocnienie współpracy i koordynacji między państwami członkowskimi Unii Europejskiej, a także między instytucjami, agencjami, władzami oraz przemysłem.
Źródło:
Teka Komisji Politologii i Stosunków Międzynarodowych; 2018, 13, 2
1896-8279
Pojawia się w:
Teka Komisji Politologii i Stosunków Międzynarodowych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Türkey’s Cybersecurity Policy Framework
Autorzy:
Liszkowska, Dominika
Powiązania:
https://bibliotekanauki.pl/articles/31341977.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Türkiye
cybersecurity
Türkiye’s cybersecurity policy
cyberspace
security
Policy
Opis:
The Internet and cyberspace are a gradually developing structure. Every second, new devices, systems and users connect within the network, which causes constant growth and changes in the sphere of threats arising from cyberspace. Türkiye is one of the countries in the world most exposed to cyber threats. However, one of its goals was to bring the field of cybersecurity to an international level. The aim of this article is to present the framework of Türkiye’s cybersecurity policy and answer the following questions: What steps have been taken in Türkiye to protect the state and society against the effects of threats in cyberspace? In which areas has Türkiye achieved significant progress in cyberspace protection, and which are still the biggest challenges?
Źródło:
Cybersecurity and Law; 2024, 11, 1; 79-91
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber(in)security
Autorzy:
Szczypiorski, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/226455.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cybersecurity
cryptology
conversations
Opis:
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanced technical and cultural creation – it is an embodiment of dreams of numerous creators, inventors and engineers; (2) a technical one: security and cyberspace are inseparable components (hence cybersecurity); (3) and a paranoid one: complete security, if achievable, is not a permanent state (hence cyber(in)security). Cyberspace is conceived as a set of digital techniques used to exchange information but also as a new type of social space, partially virtual, which may constitute a being entirely separated from a physical one. A pivotal date for arising of cyberspace may be considered the year 1968 in which routing in the ARPANET network appeared and so did the first programmable logical controller (PLC). For cyberspace this will be the year 1976 – publishing of the key agreement protocol by Witfield Diffie and Martin Hellman. Development of security is correlated with warfare and armament – the military sector has historically made the most significant investments in this area.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 1; 243-248
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberthreats in Ukraine, Poland and Slovakia
Autorzy:
Evsyukova, Oksana
Karpiuk, Mirosław
Kelemen, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/31341976.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
cyberthreats
Opis:
This article focuses on cyberthreats in Ukraine, Poland and Slovakia. As the ICT system in a digital state plays an important role, states are obliged to ensure their adequate protection. Interference with the proper functioning of such systems can have farreaching consequences, potentially leading to the paralysis of specific economic sectors. The continually emerging cyberthreats, their intensity and types trigger the need to constantly monitor the phenomena occurring in cyberspace. With such monitoring cyberattacks can be countered and their destructive outcomes avoided. The article indicates, inter alia, the types of cybersecurity incidents and their frequency.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 58-78
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
System Approach to Coherent Cybersecurity Strategy
Autorzy:
MICHALSKI, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/466152.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cybersecurity
cyber defense,
system approach,
cyber defense strategies
cybersecurity strategies
Opis:
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.
Źródło:
Safety & Defense; 2019, 5, 1; 31-36
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies