Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber" wg kryterium: Temat


Tytuł:
An Operational Approach to Maritime Cyber Resilience
Autorzy:
Erstad, E.
Ostnes, R.
Lund, M. S.
Powiązania:
https://bibliotekanauki.pl/articles/1841562.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
maritime cyber resilience
cyber resilience
cyber attack
cyber risk
cyber risk managementm
maritime cyber security
maritime cyber emergency
Opis:
As a result of the last decades development of technology and increased connectivity of maritime vessels, the need for maritime cyber security is undoubtedly present. In 2017, IMO officially recognized “… the urgent need to raise awareness on cyber threats and vulnerabilities to support safe and secure shipping, which is operationally resilient to cyber risks”. Thus, Maritime Cyber Resilience is seen as key by IMO in the improvement of the maritime cyber security. It is assumed that human error is the cause of more than half successful cyber-attacks. If technology somehow fails, in example because of a cyber threat, the human is expected to handle the problem and provide a solution. It is therefore necessary to focus on the human aspect when considering maritime cyber threats. This paper aims to provide a working definition of “Maritime Cyber Resilience”. Further, the paper argues why the human should be a focus of study, as the human is at the sharp edge in a potential maritime cyber emergency.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 27-34
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Will there ever be a Cyber War?
Autorzy:
Šulte, Evija
Powiązania:
https://bibliotekanauki.pl/articles/534396.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
Cyber security
Offensive cyber capabilities
Cyber warfare
Opis:
During the NATO Warsaw Summit cyberspace was recognized as a domain of operations reaffirming the necessity and requirement for the regulation of cyberspace as a potential operational environment for network-centric operations. It is linked with the fact that cyber-attacks of diverse types are continuously increasing in numbers, thus causing a significant threat to the uninterrupted functioning of governmental and public communication and information systems, data centres, financial and banking systems, national and international networks and infrastructure. This raises the question of whether it is a new domain of warfare. The paper analyses terms “cyber warfare” and “cyber war” in the contemporary context of cyber security and the forms and effects of cyber war.
Źródło:
Security Forum; 2017, 1, Volume 1 No. 2/2017; 131-140
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measurement of Cyber-Bullying Severity
Autorzy:
Hollá, Katarína
Fenyvesiová, Lívia
Hanuliaková, Jana
Powiązania:
https://bibliotekanauki.pl/articles/1998412.pdf
Data publikacji:
2017-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber-bullying
cyber-aggressor
cyber-victim
IRT model
cyber-bullying severity
Opis:
The presented study presents results of research conducted in 2015 within the project of the Ministry of Education, Science, Research and Sport of the Slovak Republic VEGA No. 1/0244/15 Detection and Resolving Cyber-Bullying. The aim of the research was to find out and analyze levels of cyber-bullying severity. Participants in the research were 1118 respondents 11-18 years old (average age 15.25, SD 2.55) across the Slovak Republic. The severity of cyber-bullying was assessed through the GRM (Graded Response Model). The most severe forms of cyber-bullying were posting a mean video, creating a hurtful web-page and threats of bodily injury sent through a text message. The least severe forms were mean comments on the Internet, spreading rumours and posting mean or hurtful photographs of others.
Źródło:
The New Educational Review; 2017, 47; 29-38
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Manipulation techniques of cyber fraudsters using the example of phishing attempts for private content
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/45440098.pdf
Data publikacji:
2023-08-23
Wydawca:
Akademia Policji w Szczytnie
Tematy:
cyber security
cyber threats
cyber fraud
cyber manipulation
phishing
social media
Opis:
In today's digital environment, users freely use almost all available digital services, from opening and maintaining bank accounts, shopping, working, education, entertainment to sharing private content (photos, videos) and sending confidential information via email. The evolution of the Internet has also radically changed the nature of communication between individuals and influenced contemporary friendship making. The increased use of cyberspace to establish social relationships has also resulted in the emergence of new forms of crime, leading to the extortion of information, photos, videos or money. Consequently, this has increased the ability of criminals to seek out potential victims around the world and exploit ('hopeful') individuals seeking relationships with other users" . Criminals use a range of dating websites and apps to contact victims, but are increasingly using social media platforms, including Facebook, WhatsaApp, Instagram, TikTok . More often than not, these types of relationships end in a form of blackmail and the articulation of threats to disseminate intimate images or recordings if the victim does not comply with certain demands, whether behavioural (sending more sexual images or continuing an intimate relationship) or financial . The phenomenon described above is one of many pieces of evidence supporting the thesis that perceptions of the Internet have long since moved beyond the limits of technology. Analyses of cyberspace are increasingly recognising this unique environment as a set of social practices. Tools for understanding how people use technology to, among other things, interact with other users are therefore gaining importance
Źródło:
Przegląd Policyjny; 2023, 150(2); 207-220
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Same threat, different answers? Comparing and assessing national cyber defence strategies in Central-Eastern Europe
Autorzy:
Niedermeier, Alexander
Powiązania:
https://bibliotekanauki.pl/articles/576155.pdf
Data publikacji:
2017-09-24
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
Cyber Defense
Cyber Doctrine
Cyber Strategy
Cyber
cooperation
Central-Eastern Europe
European Union
Opis:
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states are compared and assessed. After it had become evident that a variety of crucial new threats to national security had emerged over recent years, virtually all states reacted with national strategies. These strategies are aimed at securing national cyberspace from cyber threats through legal, operational, technical and policy-related measures. They exist in addition to general national security strategies and are meant to support these. Even if most countries have National Cyber Security Strategies, the author demonstrates that these strategies show, at least in part, remarkable differences. The role national particularities play is explained, whether they are really this specific and whether they might be generalised and transferred to other national contexts and what approaches turned out best under what circumstances. Based on these results, existing strengths, weaknesses and best practices are explained to open avenues for improving existing strategies and generate a higher degree of strategy interoperability in an environment that maybe like no other requires international cooperation. It is evident that precise definitions of terms and concepts are essential. However, not all strategies provide those definitions, which might lead to misunderstandings and complicate cooperation both on domestic and international level. While some strategies offer clear cut responsibilities for the actors involved, others remain unclear. Even if laws are there to specify concrete procedures, the NCSS should not be too superficial. The NCSS itself should already make clear statements, particularly when it comes to the crucial aspect of coordinating the various cyber actors and stake holders. The author demonstrates that National Cyber Security Strategies ought to be detailed enough to clearly determine actors and responsibilities, but open and flexible enough for adaptability to fast developments.
Źródło:
Security and Defence Quarterly; 2017, 16, 3; 52-74
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
State-sponsored and organized crime threats to maritime transportationsystems in the context of the attack on Ukraine
Autorzy:
Cichocki, R.
Powiązania:
https://bibliotekanauki.pl/articles/24811512.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber attack
cyber incidents
maritime cyber resilience
cyber resilience
maritime cyber security
maritime cyber threats
cybersecurity
advanced persistent threat
Opis:
Due to its strategic importance and vast impact on the world economy, maritime transport has become a cyber battlefield. Cybersecurity organizations across the world notice and analyze adversaries such as Bear from Russia, Panda from China, Buffalo from Vietnam, Chollima from North Korea (DPRK), and others from Columbia, India, Turkey, and Iran, as well as hacktivist and E-Crime. In 2014 - 2023, Ukraine became the object of massive cyberattacks aimed at its political, social, and economic destabilization. This situation changes the perception of cyberspace and its importance for ensuring the security of the global economy, in particular, the maritime economy. Reports published by the US Coast Guard show that. In this publication, the author reviews the cybersecurity threat landscape targeting the maritime industry and transportation systems and analyzes the technics, tactics, and procedures (TTPs) used by threat actors.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 3; 717--721
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber threats for present and future commercial shipping
Autorzy:
Pawelski, J.
Powiązania:
https://bibliotekanauki.pl/articles/24201417.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime cyber resilience
maritime cyber emergency
cyber security vulnerabilities
cyber security in shipping
Opis:
Cyber-attacks are extremely dangerous for all operations relaying upon it-technologies. Today shipping businesses cannot operated without processing large amounts of information. Four biggest shipping companies suffered break-down in their operations after they were struck by malware. International Maritime Organization also was struck by cyber-attack which took its website down. Maritime community noticed rise in cyber-attacks on virtually all computer-based systems on board of vessels. For manned vessels risks to safety of navigation are mitigated by presence of crew on board but remain financial and reputational losses. Introduction of remotely controlled and fully autonomous unmanned vessels will increase seriousness of threats. Cyber-attack may severely hamper ship’s operability or even lead to complete loss of control. International community is developing several countermeasures to protect commercial shipping presently and in future.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 2; 261--267
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/31342006.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber risk
cyber threats to the elderly
cyber hygiene
personal cyber insurance
Opis:
The paper investigates the growing cyber threats to personal finance, faced by the elderly in the digital age. It begins by acknowledging the surge in cyber incidents, particularly impacting seniors amid their increasing engagement in the digital space. The research explores the theoretical background of individual attitudes towards cybersecurity, emphasizing the unique vulnerabilities of the elderly population and their heightened susceptibility to cyber threats. It offers practical recommendations for personal cyber hygiene. Moreover, it introduces personal cyber insurance (PCI) and discusses its advantages and challenges. As the main contribution to the body of knowledge, the study provides a comprehensive understanding of the specific challenges faced by the elderly in the digital realm. It offers practical strategies for risk mitigation and introduces PCI as a means of enhancing resilience. It also sets the groundwork for further exploration and targeted strategies to protect individuals, especially older adults, in the dynamic landscape of cybersecurity.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 281-298
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners
Autorzy:
Heering, D.
Powiązania:
https://bibliotekanauki.pl/articles/117518.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
cybersecurity in shipping
Estonian shipowners
cyber attack
cyber incidents
cyber threats
MET System in Estonia
cyber risk
Opis:
Ships, ports and offshore facilities are increasingly becoming dependent on modern information and opera-tional technology. Cyber incidents on ships can create disruptions of critical systems that cause problems for the ship’s safe operation. Therefore, the shipowners must be prepared to cope with rising cyber threats. In or-der to prevent cyber incidents happening on ships and in the companies, essential steps must be taken on the management level. This paper introduces results of two surveys on cybersecurity and cyber awareness carried out in between 2017 – 2019 among the shipping companies operating in Estonia. Feedback was received from 12 shipowners out of 19 and the results show that at least 7 organisations had been the victims to different types of cyberattacks. The results indicate that shipowners are not paying enough of attention to potential cyber threats and education of their employees. Finally, the paper proposes cyber risk mitigation means for the shipowners.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2020, 14, 2; 271-278
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity as a challenge for modern state and society
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1595475.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
security policy
cyber security
cyberspace
cyber power
cyber conflict
polityka bezpieczeństwa
cyberbezpieczeństwo
cyberprzestrzeń
cyber konflikt
Opis:
The Internet makes social and political life more dynamic by increasing the access to information, facilitating political discussion, development of social networking and offering alternative and convenient areas of political involvement. This work focuses on analyzing the political structure of the Internet. An emphasis is put on understanding the theoretical connection between technology and politics. It is also an attempt at answering the question, is World Wide Web the answer to the needs of socio-political potential? How can the Internet have a negative influence on political life? So, in order to understand contemporary events, one needs to understand the specificity of cyberspace, which consists both of continuation and new quality of identity and values for the users.
Internet dynamizuje życie społeczne i polityczne poprzez zwiększenie dostępu do informacji, ułatwia dyskusje polityczne, rozwój sieci społecznościowych oraz oferuje alternatywne i dogodne miejsca do zaangażowania politycznego. Praca skupia się na analizie struktury politycznej Internetu. Położony zostaje akcent na zrozumienie teoretycznych relacji między technologią i polityką. To także próba odpowiedzi na pytanie o to, czy Internet odpowiada na zaistniałe potrzeby społeczno-polityczne, oraz o to, czy istnienie Internetu może mieć negatywny wpływ na życie polityczne. Aby zrozumieć współczesne wydarzenia, należy zrozumieć specyfikę cyberprzestrzeni, która stanowi z jednej strony kontynuację rzeczywistości, a z drugiej daje nową tożsamość uczestnikom życia społecznego.
Źródło:
Acta Politica Polonica; 2018, 44, 2; 29-39
2451-0432
2719-4388
Pojawia się w:
Acta Politica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Advanced persistent threats as a manifestation of states’ military activity in cyber space
Autorzy:
Olszewski, B.
Powiązania:
https://bibliotekanauki.pl/articles/30147076.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
APT
cyber warfare
cyber weapon
state
Opis:
The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States’ government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been linked to the evolution of the hacker underground that took place after 2000. The activity of specialists swelling the Black Hat ranks had the nature of criminal offences, targeting data collected by corporations and state institutions. Despite a dozen or so years of experience with APTs, they continue to be a dynamic category of contemporary cyber security threats, with many evolving components beyond simple classification. Their unambiguous identification as a strictly separate type is obstructed mainly by the complex structure of such attacks, prompting analysts to locate them in a catalog containing various known vulnerabilities, mechanisms, cycles and variables. The analysis of the problem and the evolution of attacks to date has led to the hypothesis that Advanced Persistent Threats are now in the phase of their further modification and testing as a means of offensive action in inter-state and asymmetric conflicts. Armed forces and special services of states saw in them not only a tool per se to achieve economic and military advantage, but a theoretical basis for further research on the development of advanced cyber weapon.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 3(189); 57-71
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Smart Grid Cyber Security Challenges: Overview and Classification
Autorzy:
Mendel, Jacob
Powiązania:
https://bibliotekanauki.pl/articles/425982.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
Smart Grid Cyber Security
cyber security
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2017, 1 (68); 55-66
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapobieganie i zwalczanie zagrożeń ze strony cyberprzestrzeni
Prevention and fight against threats from cyber space
Autorzy:
Iskierka, Iwona
Powiązania:
https://bibliotekanauki.pl/articles/446045.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberzagrożenie
cyberatak
cyber threats
cyber attack
Opis:
W pracy omówiono zagadnienia związane z ochroną przed cyberzagrożeniami. Zwrócono uwagę na wzrost cyberzagrożeń i konieczność skoordynowania działań w zakresie zapobiegania i zwalczania zagrożeń ze strony cyberprzestrzeni. Ukazano działania zespołu CERT.GOV.PL, funkcjonującego w ramach Departamentu Bezpieczeństwa Teleinformatycznego ABW, które szczególnie uwzględniają ataki ukierunkowane na infrastrukturę obejmującą systemy i sieci telein-formatyczne. Wskazano na potrzebę cyberedukacji dla bezpieczeństwa.
The work discusses the issues related to the protection against cyber threats. Attention on the growth of cyber threats and the need to coordinate activities in the field of the prevention and control of risks on the part of cyberspace. Discusses the Team CERT.GOV.PL functioning within the framework of the Security Department of the ABW, which particularly include targeted attacks on infrastructure, including information and communication systems and networks. Indicated the need of education for cyber security.
Źródło:
Dydaktyka informatyki; 2014, 9; 82-90
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna
Contemporary cyber threats on the example of the phenomenon of cyberwarfare. A theoretical analysis
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1592353.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
cyber warfare
cyber threats
cyber security policy
cyberwojna
cyberzagrożenia
polityka cyberbezpieczeństwa
Opis:
Po raz pierwszy w historii postęp w obszarze technologii cyfrowych stał się na tyle masowym zjawiskiem, że jest potencjalnie dostępny dla znacznej części populacji na świecie. Pozwala to niemal każdej osobie na rozpowszechnianie przekaz w, co oznacza, że wielu ludzi ma możliwości omijania oficjalnych kanałów w komunikacji, dyskredytowania i krytykowania sposobu sprawowania władzy w państwie. Kluczowym problemem jest to, że technologia cyfrowa zdominowała funkcjonowanie gospodarki, a także społeczeństwa, a jej powszechne zastosowanie jest również jednym z podstawowych fundamentów ze współczesnych działań militarnych. Zagrożenia w obszarze cyberprzestrzeni państwa, stają się coraz bardziej złożone, co wynika z tego, że przeciwnikiem mogącym wyrządzić wiele szkód może być zarówno obce i wrogo nastawione państwo jak i organizacje bądź pojedyncze osoby, które są profesjonalne i zdecydowane w swych działaniach.
For the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channels of communication, to discredit and criticize the way government is run. A key problem is that digital technology dominates the functioning of the economy as well as society, and its widespread use is also one of the basic foundations of modern military operations. Threats in the area of the state’s cyberspace are becoming more and more complex, because the adversary that can cause a lot of damage can be a foreign and hostile state as well as organizations or individuals who are professional and determined in their actions.
Źródło:
Acta Politica Polonica; 2021, 51, 1; 5-21
2451-0432
2719-4388
Pojawia się w:
Acta Politica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Costs of Cyber-Security in a Business Entity
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1194144.pdf
Data publikacji:
2020
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
costs
costs of cyber-security
cyber threats
direct costs of cyber-security
indirect costs
of cyber-security
Opis:
Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.
Źródło:
Edukacja Ekonomistów i Menedżerów; 2020, 55, 1; 82-94
1734-087X
Pojawia się w:
Edukacja Ekonomistów i Menedżerów
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CERP: a maritime cyber risk decision making tool
Autorzy:
Erstad, E.
Hopcraft, R.
Palbar, J. D.
Tam, K.
Powiązania:
https://bibliotekanauki.pl/articles/24201418.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber resilience
maritime cyber security
cyber risk management
safety and security
emergency response procedures
cyber incident response
risk mitigation
maritime cyber threats
Opis:
An increase in the complexity of systems onboard ships in the last decade has seen a rise in the number of reported maritime cyber-attacks. To tackle this rising risk the International Maritime Organization published high-level requirements for cyber risk management in 2017. These requirements obligate organisations to establish procedures, like incident response plans, to manage cyber-incidents. However, there is currently no standardised framework for this implementation. This paper proposes a Cyber Emergency Response Procedure (CERP), that provides a framework for organisations to better facilitate their crew’s response to a cyber-incident that is considerate of their operational environment. Based on an operations flowchart, the CERP provides a step-by-step procedure that guides a crew’s decision-making process in the face of a cyber-incident. This high-level framework provides a blueprint for organisations to develop their own cyber-incident response procedures that are considerate of operational constraints, existing incident procedures and the complexity of modern maritime systems.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 2; 269--279
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ensuring cyber resilience of ship information systems
Autorzy:
Onishchenko, O.
Shumilova, K.
Volyanskyy, S.
Volyanskaya, Y.
Volianskyi, Y.
Powiązania:
https://bibliotekanauki.pl/articles/2086300.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
ship Information systems
cyber resilience
ship information systems
cyber security
cyber attack
COVID-19
cyber threats
autonomous navigation
Opis:
The Covid-19 pandemic brought a problem related to the inability to timely update security systems on ships during a voyage and the need to encrypt data stored in ship information systems (SISs) and shipping company information systems. The analysis of new types of worldwide cyberattacks showed that they were set off by an increase in the use of remote-controlled autonomous technologies and a spread of telework. It was proved that on ships: a) there are no cybersecurity specialists; b) there is no means of identification of cyber threats and no response plans; c) there is a lack of cybersecurity training for crews; d) encryption of confidential ship data is barely used; e) crew is a vulnerability factor in ship's security. The analysis of cyber incidents allowed us to develop a basic response plan to protect ship control systems. It was demonstrated that the basic plan can be continuously updated and improved in accordance with: a) the real state of ship systems; b) the results of performance analysis of crew actions; c) the emergence of new types of cyberattacks. To improve the security of confidential data in ship information networks theoretical framework for the development of encrypted data search engines with the identification of “dangerous” keywords for the ship information systems (SISs) was proposed. A data exchange protocol, basic requirements for SISs, and an algorithm for detecting “dangerous” keywords in messages were developed. A test search engine on encrypted data was presented, and the main components of the system were highlighted. The functionality of the system was experimentally proved, and the accuracy and speed of search on encrypted data were determined.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 1; 43--50
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Political digitalization for Ukrainian society – challenges for cyber security
Autorzy:
Evsyukova, Oksana
Powiązania:
https://bibliotekanauki.pl/articles/2046786.pdf
Data publikacji:
2021-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber-security
cyber-threats
cyber-terrorism
service state
digital transformations
political digitalization
society
Opis:
The article describes the stage of political digitalization of Ukrainian society, defined as a gradual multi-vector process of society’s transition to digital technologies, affecting all spheres of public life, including public policy and public administration. The peculiarities of digital transformation in Ukraine are determined in the context of service state formation. The issue of cyber-security is studied. The public policy against cyber-terrorism in Ukraine is analysed. The main components of cyber-terrorism in Ukraine, related to the development of political digitalization of society, are identified and characterized, including: informational-psychological terrorism, informational-technical terrorism, cognitive terrorism, network terrorism, social-communication terrorism.
Źródło:
Cybersecurity and Law; 2021, 5, 1; 139-144
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ethical considerations in maritime cybersecurity research
Autorzy:
Oruc, A.
Powiązania:
https://bibliotekanauki.pl/articles/2172503.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
cyber security
maritime cyber security research
cyber risk
ethical considerations
ethical dilemmas
ethical principles
ethical conflicts
Opis:
Maritime transportation, an essential component of world trade, is performed by contemporary vessels. Despite the improvements that rapid advances in technology have brought to vessels’ operational efficiency and capability for safe navigation, the cyber risks associated with modern systems have increased apace. Widespread publicity regarding cyber incidents onboard ships has sparked extensive research on the part of universities, industry, and governmental organisations seeking to understand cyber risks. Consequently, researchers have discovered and disclosed an increasing number of threats and vulnerabilities in this context, providing information that in itself may pose a threat when accessed by the wrong parties. Thus, this paper aims to raise researchers’ awareness of ethical concerns and provide guidance for sound decision-making in areas where the research process must be handled carefully to avoid harm. To this end, this paper presents a literature review that explores the ethical issues involved in maritime cybersecurity research and provides specific examples to promote further understanding. Six ethical principles and four categories of ethical dilemmas are discussed. Finally, the paper offers recommendations that can guide researchers in dealing with any ethical conflicts that may arise while studying maritime cybersecurity.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 309--318
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 319--334
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo w Federacji Rosyjskiej. Zarys problemu
Cybersecurity in the Russian Federation. Outline of the problem
Autorzy:
Giebień, Helena
Powiązania:
https://bibliotekanauki.pl/articles/521558.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Wrocławski. Wydział Nauk Społecznych. Instytut Studiów Międzynarodowych
Tematy:
cybersecurity
cyber terrorism
cyber attack
cyberwar
Russian Federation
Opis:
The article undertakes the issues of cybersecurity in Russia. It shows the scale of cybercrime, their impact on the functioning of the states and attempts to solve the problem. The main thesis of the article states that the Russia Federation seeks to enhance its cyberspace security systems both on the legislative and executive level, trying to protect state’s institutions and critical infrastructure as well as cooperating with other states and international organizations. The articles analyses primary and secondary sources such as legal acts, reports, scientific literature, and Russian press, to present the research problem and draw conclusions. The research shows that the Russian authorities are aware of the multiple challenges they have to face to ensure the eÐ cient security of the cyberspace. Among the key elements are the raise of the level of competence of Russian specialists fighting cybercrimes, creation of the efficient infrastructure and protection against cyber attacks as well as improving the international system of information exchange on threats in the network. Russia faces also the challenge to strengthen multilateral cooperation with other states, based on mutual trust, especially in the face of a negative image of Russia resulting from the activities of hackers, connected to the state, who can paralyze the critical infrastructure of the other states.
Źródło:
Wschodnioznawstwo; 2018, 12; 187-204
2082-7695
Pojawia się w:
Wschodnioznawstwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
European Parliament Position on EU Cyber Security and Defense Policy
Autorzy:
Staszczyk, Artur
Powiązania:
https://bibliotekanauki.pl/articles/1963344.pdf
Data publikacji:
2019-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber security
cyber defense
European Parliament
European Union
Opis:
Ensuring cyber security in scope of cyber defense is currently among the top priorities of the EU Common Security and Defense Policy (CSDP). Matters included in scope of cyber defense are a competence of the Member States and cooperation at EU level in this area is governed by decisions of the EU Council based on unanimity. This means that the European Parliament (EP) in the field of cyber defens acts only as an opinion-forming body expressing its position through the adoption of non-legislative resolutions. The aim of the article is to analyze the content of these resolutions and present the EP’s opinion on the challenges facing the EU in the field of cyber defense. It should be stressed that the EP is the EU body that strongly emphasizes the need for a common EU approach to these issues. Given that the area of cyber defence is subject to intergovernmental cooperation mechanisms, the EP considers that the EU needs to develop not only cooperation and coordination mechanisms at the level of its institutions, but also to take action to enhance the EU’s capability to counter cyber threats. These significant cyber defense capabilities should be essential elements of the CSDP and of the development of the European Defense Union, as it is becoming increasingly difficult to counter cyber attacks for the Member State level alone. The role of the CSDP should be to ensure that the EU, in cooperation with NATO, has an autonomous strategic capability to act in the field of cyber defense.
Źródło:
Reality of Politics; 2019, 10; 122-133
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Could Pegasus Gate have been prevented? The evolution of the export control regime for cyber-surveillance tools in Israel
Autorzy:
Mielko, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/13948150.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber-surveillance
export control
Wassenaar Arrangement
cyber defence
Opis:
The subject of this article is a discussion of the legal provisions governing the Israeli and international legal systems governing the control of trade in cyber-surveillance tools. A detailed analysis of the current regulations is carried out with a view to classification and pointing out imperfections in the content of the current regulations. The author identifies the transformations in the content of the Wassenaar Arrangement, which resulted in an attempt to regulate this matter more comprehensively in Israeli law in 2016. Using the impact of the international NSO software scandal as an example, the role that an effective export control regime, including international regulation, plays in preventing cyber-surveillance tools from being used in ways that are dangerous to internationally recognized values is demonstrated.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 155-166
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A retrospective analysis of maritime cyber security incidents
Autorzy:
Meland, P. H.
Bernsmed, K.
Wille, E.
Rødseth, Ø. J.
Nesheim, D. A.
Powiązania:
https://bibliotekanauki.pl/articles/2063970.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
retrospective analysis
digital attack
cyber security incidents
maritime cyber threats
maritime incidents
Opis:
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. This study analyses and gives an overview of 46 maritime cyber security incidents from the last decade (2010-2020). We have collected information from open publications and reports, as well as anonymized data from insurance claims. Each incident is linked to a taxonomy of attack points related to onboard or off-ship systems, and the characteristics have been used to create a Top-10 list of maritime cyber threats. The results show that the maritime sector typically has incidents with low frequency and high impact, which makes them hard to predict and prepare for. We also infer that different types of attackers use a variety of attack points and techniques, hence there is no single solution to this problem.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 3; 519--530
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phishing wall - jak zbudować ludzką zaporę przeciwko cyberatakom?
Autorzy:
Masztalerz, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/2080433.pdf
Data publikacji:
2021
Wydawca:
Nowa Energia
Tematy:
cyberbezpieczeństwo
cyberatak
cyberzagrożenie
phishing
cybersecurity
cyber attack
cyber threat
Opis:
O cyberzagrożeniach łatwo mówić, gdy doszło już do incydentu bezpieczeństwa. Wówczas dowiadujemy się, że firma musiała zapłacić okup za uzyskanie klucza do zaszyfrowanych przez złośliwe oprogramowanie danych. Biznes na chwilę obniża poziom ciśnienia krwi, a cyberprzestępca liczy wpływy. Jak wynika z rynku zachodniego i badań zajmującej się cyberbezbieczeństwem firmy Infrascale: już 78% małych i średnich przedsiębiorców działających w modelu B2B zapłaciło pierwsze okupy w wyniku cyber ataku.
Źródło:
Nowa Energia; 2021, 5/6; 70--71
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wargaming the cyber resilience of structurally and technologically different networks
Autorzy:
Lantto, Heikki
Åkesson, Bernt
Suojanen, Marko
Tuukkanen, Topi
Huopio, Simo
Nikkarila, Juha-Pekka
Ristolainen, Mari
Powiązania:
https://bibliotekanauki.pl/articles/576443.pdf
Data publikacji:
2019-01-28
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber defence
Cyber resilience
Wargaming
Closed national network
Russia
Opis:
Based on a review of different analytical frameworks, it is suggested to run a table top cyber wargame when trying to analyse the effects of closed national networks being imposed in the near future. Th e scope of the wargame is to extract results to show how the resilience of an open national network differs from a closed national network. It is self-evident that the formation process of resilience is different between the diverse systems. The proposed wargame is a two-sided cyber table top wargame. The wargame is based on at least two blue teams, at least one red team and a control team (namely a white team). One blue team is located in the closed national networks and its system relies on closed national network infrastructure. The other blue team operates its system within open network society. By designing, constructing and executing the proposed cyber wargame we argue it is possible to find these differences and similarities as well. Current research improves cyber situation awareness and proposes a direction to be followed when trying to understand the changing circumstances of the cyber space. It also suggests how the research resources could be directed when trying to improve the situation awareness of the closing process.
Źródło:
Security and Defence Quarterly; 2019, 24, 2; 51-64
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Militarization of cyber space and multidimensionality of security
Autorzy:
Olszewski, B.
Powiązania:
https://bibliotekanauki.pl/articles/347224.pdf
Data publikacji:
2016
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
cyber space
cyber war
security
militarization
information society
informatization
Opis:
The development of theoretical foundations for computer networks and their practical implementation has given rise to the progressive computerization of armed activities. The idea of a communication medium resistant to a nuclear attack, which was developed in the late sixties of the twentieth century in the form of the ARPANET, affects strategic, operational and tactical dimensions of the modern battlefield. It is also an important element shaping the processes related to ensuring the security of the state, both in the internal dimension as well as in dealings with other actors of international relations. Multi-layeredness and the growing complexity of cyber space cause that cyber security policy has been placed not only in the context of critical infrastructure, but also all the aspects of ethical and legal issues are taken into account. The armed forces have become an integral part of the information society, and as such, have been increasingly influenced by the civil sphere. The militarization of cyber space results directly from increasing saturation of the state structure with ICT technologies and the growing importance of these components in the process of ensuring security. The wide access to ICT generates a new threat to the defense system, including the armed forces. The ability of the digital impact on the military sphere, evidenced by many non-state actors, is today the main reason for implementing regulations restricting the activity of citizens in the global network.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2016, 2; 104-120
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The cyber-insurance market in Poland and determinants of its development from the insurance broker’s perspective
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/943172.pdf
Data publikacji:
2017-06-30
Wydawca:
Uniwersytet Ekonomiczny w Poznaniu
Tematy:
cyber-risk
cyber-insurance
Polska
data breach
risk management
Opis:
The aim of the paper is to analyze the state of the cyber-insurance market in Poland, and additionally the identification of key determinants of its development, including such issues as cyber-risk perception and the insurability of cyber-risk. Due to the lack of comprehensive, cross-industry insurance data on cyber-insurance, I decided to collect raw data through my own, computer-aided survey amongst insurance brokers operating in Poland. By conducting the survey amongst insurance brokers it was possible not only to collect data describing the state of Polish cyber-insurance market but also to use their expert opinion on various issues relating to cyber-risk. The research presented here is a pioneer in terms of analysis of a cyber-insurance market in a post-communist country such as Poland which is the most important emerging market in the CEE region as well. My paper makes the research perspective broader as most cyber-insurance industry reports have focused ing on the US, the UK or the developed countries of Western Europe.
Źródło:
Economics and Business Review; 2017, 3(17), 2; 33-50
2392-1641
Pojawia się w:
Economics and Business Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges arising from cyber security in the dimension of modern global security (on the example of the Russia-Ukraine war)
Wyzwania wynikające z cyberbezpieczeństwa w wymiarze współczesnego bezpieczeństwa globalnego (na przykładzie wojny rosyjsko-ukraińskiej)
Autorzy:
Guchua, Alika
Zedelashvili, Thornike
Powiązania:
https://bibliotekanauki.pl/articles/28766376.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
cyberbezpieczeństwo
cybertechnologie
NATO
Unia Europejska
Rosja
Ukraina
cyberatak
cyberwojna
Cyber security
Cyber technologies
European Union
Georgia
Russia
Ukraine
Cyber attack
Cyber war
Opis:
The challenges and threats from cyber security are increasing every day in the world. All this has a significant impact on international relations. When we are dealing with such a revolutionary development of technology as in the 21st century, it is already necessary for all states to have high-standard cyber security systems. This is not an easy issue to solve, because cyber security requires quite a lot of finances, human resources, and also specially trained professionals. Threats emanating from cyberspace need a proper response, in this case we have no choice, the whole world is facing danger. Cybercrime and the damage caused by it are increasing year by year. Also, all this affects a person psychologically and leaves a feeling of insecurity. The biggest problem is that aggressive states, terrorist organizations, non-state groups, large corporations, etc. are mostly involved in this virtual war (as in the real one). As an example, we can cite such an aggressor state as Russia, which carries out major cyber attacks against Ukraine, Georgia and other states whose cyber security systems are less protected. The transition of political, military, social or criminal processes into cyberspace has made cyber security one of the main segments of state security. Countries with developed cyber-offensive potential, primarily Russia, successfully use cyberspace both during war and conflict, as well as in peacetime, to gain geopolitical advantage. This article discusses the challenges and threats associated with the development of modern cyber and information technologies, analyzes the threats associated with the new information security capabilities of modern states, including cybersecurity. The aim of the paper is to present the role of cyber security in the Russia-Ukraine war and the threats arising from it. The following methods are used in the paper: methods of historical-descriptive, policy research and comparative analysis. The paper uses the theories of balance of power and securitization.
Wyzwania i zagrożenia związane z cyberbezpieczeństwem rosną każdego dnia na świecie. Wszystko to ma istotny wpływ na stosunki międzynarodowe. Kiedy mamy do czynienia z tak rewolucyjnym rozwojem technologii, jak w XXI w., konieczne jest już posiadanie przez wszystkie państwa systemów cyberbezpieczeństwa na wysokim poziomie. Nie jest to łatwa kwestia do rozwiązania, ponieważ cyberbezpieczeństwo wymaga sporych nakładów finansowych, zasobów ludzkich, a także specjalnie przeszkolonych specjalistów. Zagrożenia płynące z cyberprzestrzeni wymagają odpowiedniej reakcji, w tym przypadku nie mamy wyboru, cały świat stoi w obliczu niebezpieczeństwa. Cyberprzestępczość i powodowane przez nią szkody rosną z roku na rok. Ponadto wszystko to wpływa na psychikę ludzi i pozostawia poczucie niepewności. Największym problemem jest to, że w tej wirtualnej wojnie (podobnie jak w prawdziwej) biorą udział głównie agresywne państwa, organizacje terrorystyczne, grupy niepaństwowe, wielkie korporacje itp. Jako przykład możemy przytoczyć państwo agresora, jakim jest Rosja, która przeprowadza poważne ataki cybernetyczne na Ukrainę, Gruzję i inne państwa, których systemy cyberbezpieczeństwa są mniej chronione. Przejście procesów politycznych, wojskowych, społecznych czy przestępczych do cyberprzestrzeni sprawiło, że cyberbezpieczeństwo stało się jednym z głównych segmentów bezpieczeństwa państwa. Państwa o rozwiniętym potencjale cyberofensywnym, przede wszystkim Rosja, z powodzeniem wykorzystują cyberprzestrzeń zarówno w czasie wojny i konfliktu, jak i w czasie pokoju do uzyskania przewagi geopolitycznej. W artykule omówiono wyzwania i zagrożenia związane z rozwojem nowoczesnych technologii cybernetycznych i informacyjnych, dokonano analizy zagrożeń związanych z nowymi możliwościami bezpieczeństwa informacyjnego współczesnych państw, w tym cyberbezpieczeństwa. Celem artykułu jest przedstawienie roli cyberbezpieczeństwa w wojnie rosyjsko-ukraińskiej i wynikających z niej zagrożeń. W artykule zastosowano następujące metody: metody historyczno-opisowe, badania polityki oraz analizę porównawczą, a także wykorzystano teorie równowagi sił i sekurytyzacji.
Źródło:
Eastern Review; 2022, 11, 2; 79-88
1427-9657
2451-2567
Pojawia się w:
Eastern Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo systemów teleinformatycznych w dobie powszechnej cyfryzacji
Cybersecurity of ict systems in the era of widespread digitization
Autorzy:
Antczak, Joanna
Kos, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/23051074.pdf
Data publikacji:
2022-09-26
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
cyberbezpieczeństwo
systemy teleinformatyczne
cyberatak
cyber security
ICT systems
cyber attack
Opis:
Okres XXI wieku jest bezprecedensowy, jeżeli chodzi o rozwój w obszarze technologii. Użytkownicy cyberprzestrzeni muszą proaktywnie korzystać z praktyk związanych zachowaniem bezpieczeństwa, aby były one realnie skuteczne i odczuwalne. Celem artykułu było zbadanie wpływu dynamicznie postępującej cyfryzacji na cyberbezpieczeństwo systemów teleinformatycznych oraz świadomości ich użytkowników w tym zakresie. Przeprowadzone badania jednoznacznie wskazują, iż istnieje kilka obszarów cyberbezpieczeństwa, w których należałoby poczynić kroki mające na celu zwiększenie świadomości społeczeństwa. Główny obszar stanowi uświadomienie, że każdy użytkownik Internetu może być potencjalnym celem ataku cybernetycznego. Kolejnym istotnym obszarem, który został uwidoczniony podczas analizy odpowiedzi na pytania ankietowe, jest rażąca polityka zarządzania hasłami praktykowana przez użytkowników Internetu. W artykule wykorzystano następujące metody i techniki badawcze: metody ankietowe, metody indukcji jako formy przechodzenia od szczegółu do ogółu, metodę dedukcji jako formę uogólniającą i wnioskową, analizę literatury oraz danych statystycznych. Poruszana tematyka w opracowaniu wskazuje na konieczność prowadzenia oraz rozwoju badań nad sposobem, w jaki społeczeństwo reaguje na zmiany zachodzące w cyberprzestrzeni.
The period of the 21st century is unprecedented in terms of developments in technology. Users of cyberspace must proactively use security preservation practices to be realistically effective and noticeable. The purpose of the article was to study the impact of rapidly advancing digitization on the cyber security of ICT systems and the awareness of their users in this regard. From the research, it was clear that there are several areas of cyber security in which steps should be taken to increase public awareness. The main area is awareness that any Internet user can be a potential target of a cyber attack. Another important area that was highlighted during the analysis of survey responses is the blatant password management policies practiced by Internet users. The following research methods and techniques were used in the article: survey method, induction method as a form of going from the particular to the general, deduction method as a form of generalization and inference, analysis of literature and statistical data. The topics discussed in the article indicate the need to conduct and develop research on how society responds to changes in cyberspace.
Źródło:
Nowoczesne Systemy Zarządzania; 2022, 17, 3; 81-98
1896-9380
2719-860X
Pojawia się w:
Nowoczesne Systemy Zarządzania
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Commercial Maritime and Cyber Risk Management
Autorzy:
RANA, Akash
Powiązania:
https://bibliotekanauki.pl/articles/466223.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
commercial maritime
cyber threat
cyber risk management
maritime security
security
Opis:
The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.
Źródło:
Safety & Defense; 2019, 5, 1; 46-48
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity from the perspective of a new technology user
Autorzy:
Dymicka, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/2143064.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
cyber hygiene
new technology
information technology
digital technologies
Opis:
New technologies are, in the world of advancing processes of globalization, scientific and technical revolution, one of the most important indicators for designing many areas of social life. The useage of information technology has initiated many social phenomena generating many previously unknown concepts, threats, and in response, new areas of expert and research interest. One of them is cyber security, which focuses on building national, European or international policies to secure the functioning of information systems. The aim of this paper is to analyze and evaluate cyber security from the perspective of a user of new technologies. The applied research method will be a synthetic and analytical analysis of domestic and foreign literature in the field of new technologies and cyber security.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 27-36
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
System Approach to Coherent Cybersecurity Strategy
Autorzy:
MICHALSKI, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/466152.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cybersecurity
cyber defense,
system approach,
cyber defense strategies
cybersecurity strategies
Opis:
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.
Źródło:
Safety & Defense; 2019, 5, 1; 31-36
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How Are Czech Individuals Willing to Protect Themselves: A Comparison of Cyber and Physical Realms
Autorzy:
Kleiner, Jan
Drmola, Jakub
Mares, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/27294854.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
cyber-physical comparison
cybersecurity
survey
porównanie cyber-fizyczne
cyberbezpieczeństwo
ankieta
Opis:
Endpoint users are usually viewed as the highest-risk element in the field of cybersecurity. At the same time, they need to be protected not just from the individual-level prism but also, from the state’s perspective, to counter threats like botnets that harvest weakly secured endpoints and forge an army of so-called zombies that are often used to attack critical infrastructure or other systems vital to the state. Measures aimed at citizens like the Israeli hotline for cybersecurity incidents or Estonian educational efforts have already started to be implemented. However, little effort is made to understand the recipients of such measures. Our study uses the survey method to partly fill this gap and investigate how endpoint users (citizens) are willing to protect themselves against cyber threats. To make results more valid, a unique comparison was made between cyber threats and physical threats according to the impact which they had. The results show statistically significant differences between comparable cyber-physical pairs indicating that a large portion of the sample was not able to assess the threat environment appropriately and that state intervention with fitting countermeasures is required. The resultant matrix containing frequencies of answers denotes what portion of respondents are willing to invest a certain amount of time and money into countering given threats, this enables the possible identification of weak points where state investment is needed most.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-14
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybernetyczny wymiar współczesnych zagrożeń
A cybernetic dimension of the contemporary threats
Autorzy:
Sadowski, Józef
Powiązania:
https://bibliotekanauki.pl/articles/507199.pdf
Data publikacji:
2017-05-21
Wydawca:
Akademia Pomorska w Słupsku
Tematy:
cyberataki
cyberzagrożenia
cyberterroryzm
cyberwojna
cyberkonflikt
wojna informacyjna
cyber-attacks
cyber threats
cyber-terrorism
cyberwar
cyberconflict
information warfare
Opis:
Rośnie podatność państw na zagrożenia cybernetyczne, w tym typu terrorystycznego. Prezentowane w artykule przykłady z ostatnich lat w Polsce i innych krajach świata wskazują, że tendencja ta będzie się systematycznie zwiększać, bowiem funkcjonowanie nowoczesnych społeczeństw nieodłącznie wiąże się z zapewnieniem stałego i prawidłowego funkcjonowania systemów informatycznych, służących zaspokajaniu podstawowych potrzeb (gromadzeniu i transmisji danych, monitorowaniu, sterowaniu, wspomaganiu zarządzania itp.). Do działań o charakterze agresji czy wręcz terroru cybernetycznego mogą się uciekać władze i służby wrogich państw, koncerny międzynarodowe, przestępcze organizacje o charakterze pozarządowym, nieformalne grupy użytkowników Internetu, a nawet pojedynczy użytkownicy. Celem ataków stają się elementy infrastruktury krytycznej, systemy bankowe, uzbrojenia i kierowania państwem, a nawet końcowi użytkownicy systemów. Ataki te przynoszą straty ekonomiczne liczone już w setkach milionów dolarów rocznie. Przewiduje się, że w niedalekiej przyszłości cyber-ataki staną się narzędziem szantażu w rękach przestępczości zorganizowanej i mogą stać się zarzewiem cyberkonfliktu a nawet cyberwojny.
Countries’ vulnerability to cybernetic dangers, including cyberterrorism, increases. Recent years examples from Poland and world countires presented in the article below suggest that such tendency will continue to rise, since modern community functioning is inseparably connect with the provision of constant and well-functioning automatic systems, to match the supply of basic needs services such as (data storage and transmission, monitoring and control processes, management support, etc.). An act of violence or cybernetic terror activity may be employed by the enemy countries government and agencies, international concerns, non-government organized crime groups, network associated groups or even individuals. The objectives of such terrorism may be critical infrastructure elements, banking systems, weapon systems, homeland security systems or even individual Internet users. Cyber-attacks can deal massive economical loss reaching hundreds of millions of dollars annually. Predicting the future, cyber-attacks may be commonly practiced by organized crime groups as extortion or become embers of cyberconflict or even cyberwar.
Źródło:
Studia nad Bezpieczeństwem; 2017, 2; 57-76
2543-7321
Pojawia się w:
Studia nad Bezpieczeństwem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Raising awareness on cyber security of ECDIS
Autorzy:
Svilicic, B.
Brčić, D.
Žuškin, S.
Kalebić, D.
Powiązania:
https://bibliotekanauki.pl/articles/117444.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
risk analysis
ECDIS
ECDIS software
ECDIS cyber security
critical operational technology
ECDIS backup
ECDIS cyber threats
Opis:
In the maritime transport, the Electronic Chart Display and Information System (ECDIS) has been developed into a complex computer-based ship critical operational technology system, playing central roles in the safe ship navigation and transport. While ECDIS software maintenance is regulated by the International Maritime Organization (IMO) ECDIS performance standards and related circulars, underlying software and hardware arrangements are implemented by ship-owners and supported by ECDIS equipment manufacturers. In this paper, we estimate ECDIS cyber security in order to study the origin of ECDIS cyber security risks. A set of ECDIS systems is examined using an industry-leading vulnerability scanning software tool, and cyber threats regarding the ECDIS backup arrangement, underlying operating system and third party applications are studied.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 231-236
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia dla cyberbezpieczeństwa w transporcie miejskim
Threats to cyber security in urban transportation
Autorzy:
Wcisło, Karina
Aleksandrowicz, Jan
Powiązania:
https://bibliotekanauki.pl/articles/28407378.pdf
Data publikacji:
2023
Wydawca:
Stowarzyszenie Inżynierów i Techników Komunikacji Rzeczpospolitej Polskiej
Tematy:
cyberbezpieczeństwo
transport miejski
zagrożenia cybernetyczne
cyber security
urban transportation
cyber threats
Opis:
Artykuł poświęcono problemowi cyberbezpieczeństwa w transporcie miejskim. Omówione zostały zagrożenia, jakie związane są z udostępnianiem i przesyłaniem informacji w sieci internetowej na temat elementów systemu transportowego. W artykule przedstawiono elementy miejskiego systemu transportowego najbardziej narażone na ataki cybernetyczne oraz podjęto się próby przedstawienia sposobów przeciwdziałania im. Analizę zagrożeń cybernetycznych w artykule przeprowadzono dla: systemów informacji pasażerskiej, planerów podróży, systemów nawigacji drogowej, systemów sterowania ruchem drogowym, automatycznych systemów zliczania pasażerów oraz systemów opłat parkingowych i sprzedaży biletów. W artykule opisane zostały skutki udanych ataków oraz przykłady tego typu działań, które miały już miejsce na terenie Polski. Artykuł zakończono podsumowaniem i wnioskami będącymi wstępem do dalszych prac nad opracowaniem standardów mających na celu przeciwdziałanie zagrożeniom cybernetycznym w transporcie miejskim.
The article is focused on the problem of cyber security in urban transportation. The paper discusses the threats that are associated with the sharing and transmission of information on the Internet about elements of the transportation system. The paper presents the components of the urban transport system most exposed to cyber-attacks and attempts to present measures to prevent them. The analysis of cyber threats in the article was carried out for: passenger information systems, trip planners, road navigation systems, traffic control systems, automatic passenger counting systems and parking fee and ticketing systems. The article describes the consequences of successful attacks and examples of such activities that have already taken place in Poland. The article concludes with a summary and conclusions that are an introduction to further work on developing standards to counter cyber threats in urban transportation.
Źródło:
Transport Miejski i Regionalny; 2023, 5; 16--20
1732-5153
Pojawia się w:
Transport Miejski i Regionalny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation framework for practical cyber security training in the public service
Autorzy:
Deák, Veronika
Powiązania:
https://bibliotekanauki.pl/articles/1311502.pdf
Data publikacji:
2021
Wydawca:
Akademia Sztuki Wojennej
Tematy:
simulation framework
cyber security
cyber security education
public service
practical training
Opis:
The public service sector is a key target of cyberattacks. In order to prevent and effectively tackle such attacks, organisations should continuously develop their defence capabilities. As part of developing such capabilities, public service cybersecurity training is required to teach students about cyberattacks. The present study uses quantitative research techniques including (i) how to identify key requirements for the practical aspects of public service cybersecurity training and (ii) sampling to utilise international best practices from cybersecurity education and conceptual architectures from existing public service organisations. A schematic structure with a two-level practical training course is proposed. On the first level, the students learn about the defence mechanisms of their own info-communication devices and try to prevent attacks in a simulated environment. On the second level, the students apply protection strategies against cyberattacks in organisational infrastructure. Finally, a technical framework is defined to simulate cyberattacks against (a) personal devices and (b) a fictional organisational infrastructure. The specification of a public service cybersecurity training programme should not only focus on theoretical education but also provide practical knowledge to students. By simulating specific attacks, theoretical and practical knowledge can be combined. As a result, students will be able to recognise threats and potential risks from cyberspace.
Źródło:
Security and Defence Quarterly; 2021, 33, 1; 87-104
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prostytucja i cyberprostytucja jako zagrożenie dla młodych ludzi – raport z badań
Prostitution and Cyberprostitution as a Threat to Young People – a Study Report
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/916026.pdf
Data publikacji:
2020-01-19
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
cyberprofit
cyber security
security policy
education for cyber security
information society
Opis:
The subject of cyberprostitution reflectsthe growing number of socio-political problems stemming from the dynamic development of cybertechonology and its expansion into every area of human life. In the age of cyberrevolution, there is an increase in the number of pornographic social networking sites. The sex industry quickly adopted all new information technologies to increase young people’s access to pornography. As a result of the link between the internet and the sex industry, the border be-tween the current phenomenon of prostitution and its form in cyberspace has blurred. This article, based on the study, discusses the main motivational factors that contribute to the growth of prostitution. The differences between prostitution in the real and virtual worlds are also indicated. The purpose of the study is moreover to show some disturbing phenomena that may have a negative impact – not only on the emotional development of man – but also on shaping future civil society.
Źródło:
Studia Edukacyjne; 2017, 46; 307-323
1233-6688
Pojawia się w:
Studia Edukacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rozwój zdolności NATO wobec zagrożeń cybernetycznych
The Development of NATO’s Capabilities of Tackling Cyber Threats
Autorzy:
Kulczycki, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2139670.pdf
Data publikacji:
2020-11-30
Wydawca:
Wydawnictwo Naukowe Dolnośląskiej Szkoły Wyższej
Tematy:
NATO
cyberbezpieczeństwo
cyberprzestrzeń
cyberzagrożenia
cyberobrona
cybersecurity
cyberspace
cyber threats
cyber defence
Opis:
Zagrożenia, które związane są z cyberprzestrzenią, obejmują wszystkie podmioty współczesnego środowiska bezpieczeństwa, w tym również Organizację Traktatu Północnoatlantyckiego. Z uwagi na to, że stają się one coraz częstsze, bardziej złożone i dotyczą coraz więcej sektorów bezpieczeństwa, NATO zmuszone było podjąć określone kroki w dziedzinie cyberbezpieczeństwa. Przedmiotem badania w przedstawionym artykule są działania, które zostały podjęte przez Sojusz w odpowiedzi na dotychczasowe cyberzagrożenia. Zasadniczym celem badań było zidentyfikowanie tych działań, które przyczyniły się do rozwoju zdolności NATO do walki z zagrożeniami cybernetycznymi. W artykule wykorzystano metodę analizy krytycznej (literatury przedmiotu, artykułów naukowych, dokumentów, raportów, materiałów prasowych) oraz metodę historyczną. Głównym pytaniem badawczym jest: jakie dotychczasowe działania przyjęte przez Sojusz Północnoatlantycki przyczyniły się do budowy jego zdolności do zwalczania cyberzagrożeń? Główna teza artykułu zakłada, że dotychczasowe działania Sojuszu Północnoatlantyckiego będące odpowiedzią na zagrożenia cybernetyczne, miały wpływ na rozwój i wzmocnienie jego zdolności do obrony w tym obszarze. Rezultaty badań przedstawione w artykule wskazują na aktywność Sojuszu Północnoatlantyckiego w sferze cyberobrony, w szczególności tę, podjętą w okresie ostatnich pięciu lat. Należy się spodziewać, że działania te będą podstawą do dalszej aktywności Sojuszu, która obejmować będzie nie tylko działania defensywne, ale i również inne proaktywne służące poprawie bezpieczeństwa cybernetycznego wszystkich jego członków. 
Manifold dangers related to cyberspace concern all modern security environment entities, including the North Atlantic Treaty Organization. Due to the fact that they become ever more frequent and complex, NATO is in need of taking specific steps in this field. This paper presents the measures undertaken by the Alliance in response to current cyber threats. The main goal of the research was to identify those activities that have contributed to the development of NATO’s capabilities concerning cyber threats. The article uses the method of critical analysis (literature on the subject, scientific articles, documents, reports, press materials) and the historical method. The main research question is: what actions taken so far by the North Atlantic Alliance have contributed to extending its cyber threats capabilities? The thesis advanced in the article says that the North Atlantic Alliance’s activities in this matter have impacted the development and the strengthening of its ability to defend this area. It should be expected that they will be the basis for the Alliance’s further activity which will include not only defense policies, but also other proactive activities in terms of contributing to the improvement of cyber security of all its members.
Źródło:
Rocznik Bezpieczeństwa Międzynarodowego; 2020, 14, 2; 146-163
1896-8848
2450-3436
Pojawia się w:
Rocznik Bezpieczeństwa Międzynarodowego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber security in industrial control systems (ICS):a survey of rowhammer vulnerability
Autorzy:
Aydin, Hakan
Sertbaş, Ahmet
Powiązania:
https://bibliotekanauki.pl/articles/2097442.pdf
Data publikacji:
2022
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
RowHammer
Cyber Security
DRAM
Opis:
Increasing dependence on Information and Communication Technologies (ICT) and especially on the Internet in Industrial Control Systems (ICS) has made these systems the primary target of cyber-attacks. As ICS are extensively used in Critical Infrastructures (CI), this makes CI more vulnerable to cyber-attacks and their protection becomes an important issue. On the other hand, cyberattacks can exploit not only software but also physics; that is, they can target the fundamental physical aspects of computation. The newly discovered RowHammer (RH) fault injection attack is a serious vulnerability targeting hardware on reliability and security of DRAM (Dynamic Random Access Memory). Studies on this vulnerability issue raise serious security concerns. The purpose of this study was to overview the RH phenomenon in DRAMs and its possible security risks on ICSs and to discuss a few possible realistic RH attack scenarios for ICSs. The results of the study revealed that RH is a serious security threat to any computer-based system having DRAMs, and this also applies to ICS.
Źródło:
Applied Computer Science; 2022, 18, 2; 86--100
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Birth of cyber-supermothers
Autorzy:
Ortynecka, Alicja
Powiązania:
https://bibliotekanauki.pl/articles/438045.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
Internet
maternity
cyber-reality
Opis:
The study aims to reveal and to describe a new type of mother - cyber-supermother, which combines household duties with professional responsibilities by taking professional activity in the Internet. The study analyzes new model of maternity combining elements of traditional (motherhood as an instinct, conviction regarding personal care of a child, etc.) and modern model (postulate of self-fulfillment, blurring the boundaries between the private and the public sphere, gender equality, etc.).
Źródło:
Journal of Gender and Power; 2014, 2; 83-98
2391-8187
Pojawia się w:
Journal of Gender and Power
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The threat of cyber attacks in urban conurbations
Autorzy:
Bachor, Marta
Powiązania:
https://bibliotekanauki.pl/articles/576319.pdf
Data publikacji:
2018-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber attack
city
security
Opis:
This paper investigates the threat of cyber attacks in urban conurbations. The first section attempts to define cyberspace and to identify potential objects of attack in the city. The second section analyses the history of past cyber attacks, and the final section gives an overview of activities performed by states and organisations with a view to countering and eliminating cyber threats.
Źródło:
Security and Defence Quarterly; 2018, 20, 3; 72-84
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sensor based cyber attack detections in critical infrastructures using deep learning algorithms
Autorzy:
Yilmaz, Murat
Catak, Ferhat Ozgur
Gul, Ensar
Powiązania:
https://bibliotekanauki.pl/articles/952946.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
cyber security
engineering
critical infrastructures
industrial systems
information security
cyber attack detections
Opis:
The technology that has evolved with innovations in the digital world has also caused an increase in many security problems. Day by day the methods and forms of the cyberattacks began to become complicated, and therefore their detection became more difficult. In this work we have used the datasets which have been prepared in collaboration with Raymond Borges and Oak Ridge National Laboratories. These datasets include measurements of the Industrial Control Systems related to chewing attack behavior. These measurements include synchronized measurements and data records from Snort and relays with the simulated control panel. In this study, we developed two models using this datasets. The first is the model we call the DNN Model which was build using the latest Deep Learning algorithms. The second model was created by adding the AutoEncoder structure to the DNN Model. All of the variables used when developing our models were set parametrically. A number of variables such as activation method, number of hidden layers in the model, the number of nodes in the layers, number of iterations were analyzed to create the optimum model design. When we run our model with optimum settings, we obtained better results than related studies. The learning speed of the model has 100\% accuracy rate which is also entirely satisfactory. While the training period of the dataset containing about 4 thousand different operations lasts about 90 seconds, the developed model completes the learning process at the level of milliseconds to detect new attacks. This increases the applicability of the model in real world environment.
Źródło:
Computer Science; 2019, 20 (2); 213-243
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zmierzyć się z cyberzagrożeniem
Autorzy:
Szulc, Tadeusz
Powiązania:
https://bibliotekanauki.pl/articles/89447.pdf
Data publikacji:
2018
Wydawca:
Nowa Energia
Tematy:
cyberzagrożenia
cyberbezpieczeństwo
ochrona danych osobowych
cyber threats
cyber security
personal data protection
Opis:
Niedawno postawiono mi pytania: Jak bardzo nasza cywilizacja zmieni się pod wpływem nieustannego i dynamicznego rozkwitu cyfrowych zagrożeń? Jak zagrożenia te wpłyną na jakość otoczenia, w którym żyjemy? Jak będzie wyglądał przebieg kolejnych wydarzeń społecznych, politycznych i kulturalnych w obliczu zagrożenia cyberatakami?
Źródło:
Nowa Energia; 2018, 1; 57-59
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia w cyberprzestrzeni a bezpieczeństwo jednostki
The cyberspace hazard and the safety unit
Autorzy:
Żuk, Jadwiga
Żuk, Monika
Powiązania:
https://bibliotekanauki.pl/articles/565291.pdf
Data publikacji:
2016
Wydawca:
Akademia Bialska Nauk Stosowanych im. Jana Pawła II w Białej Podlaskiej
Tematy:
cyberprzestrzeń
bezpieczeństwo jednostki
cyberspace
cyber security
a cyber crime
a safety unit
Opis:
Dynamiczny rozwój technologii teleinformatycznych przyczynił się do powstania nowego pola aktywności, jakim jest cyberprzestrzeń. Jest to jedna z najważniejszych zmian w środowisku bezpieczeństwa, niosąca zupełnie nowe zagrożenia, a przez to wymagająca nowych uregulowań, zabezpieczeń i informacji celem zapewnienia bezpieczeństwa państwa, instytucji i osób korzystających z cyberprzestrzeni. W dobie globalizacji cyberprzestrzeń, która nie zna granic może być polem konfliktu wrogich państw, zorganizowanych grup przestępczych, ekstremistycznych, terrorystycznych, hakerów, oszustów, a nawet pedofilów. Jak widać stawka może być bardzo wysoka, od bezpieczeństwa infrastruktury krytycznej, poprzez wyniki finansowe przedsiębiorstw, szeroko rozumiane bezpieczeństwo obywateli, a nawet dzieci.
The dynamic development of Information and Communications Technology (ICT) contributed to the emergence of a new field of activity; that is cyberspace. It is one of the most important changes in the safety environment that carries a completely new security threat and, therefore, requires new regulations, protection and information to assure security of the institutions and people who use cyberspace. In the era of globalisation, cyberspace does not have any barriers, which can lead to many conflicts between hostile states, gangs, terrorists, extremist groups, hackers, the frauds or even paedophiles. Thus, as one can see, the stakes are high when it comes to securing critical infrastructure or financial companies’ results as well as citizens’ safety, including children.
Źródło:
Rozprawy Społeczne; 2016, 10, 3; 71-77
2081-6081
Pojawia się w:
Rozprawy Społeczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BRAT: A BRidge Attack Tool for cyber security assessments of maritime systems
Autorzy:
Hemminghaus, C.
Bauer, J.
Padilla, E.
Powiązania:
https://bibliotekanauki.pl/articles/1841570.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
Bridge Attack Tool (BRAT)
cyber attack
cyder defense
maritime systems
security assessment
Integrated Bridge System (IBS)
Maritime Cyber Security
Opis:
Today’s shipping industry is largely digitalized and networked, but by no means immune to cyber attacks. As recent incidents show, attacks, particularly those targeting on the misleading of navigation, not only pose a serious risk from an economic perspective when disrupting maritime value chains, but can also cause collisions and endanger the environment and humans. However, cyber defense has not yet been an integral part of maritime systems engineering, nor are there any automated tools to systematically assess their security level as well-established in other domains. In this paper, we therefore present a holistic BRidge Attack Tool (BRAT) that interactively offers various attack implementations targeting the communication of nautical data in maritime systems. This provides system engineers with a tool for security assessments of integrated bridge systems, enabling the identification of potential cyber vulnerabilities during the design phase. Moreover, it facilitates the development and validation of an effective cyber defense.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 35-44
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kybernetická obrana: strategická úloha severoatlantickej aliancie a jej národné implikácie
Cyber defence: strategic role of nato and its national implications
Autorzy:
NEČAS, Pavel
GREGA, Matúš
Powiązania:
https://bibliotekanauki.pl/articles/550801.pdf
Data publikacji:
2016
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
Informačná technika
kybernetický priestor
NATO
bezpečnostné výzvy
iregulárne hrozby
národné záujmy
information technology
cyber space
cyber defence
cyber security
irregular threats
Opis:
Informačná technika sa rozvíja mimoriadne významným spôsobom. Stala sa na jednej strane strategickým prostriedkom priemyslu, administratívy, bankového sektoru, ale napríklad aj ozbrojených síl. V posledných rokoch sa ukazuje, že hoci digitálny svet prináša obrovské výhody, je aj zraniteľný. Incidenty v rámci kybernetickej bezpečnosti , či už úmyselné, alebo náhodné, narastajú alarmujúcim tempom a mohli by narušiť poskytovanie základných služieb, ktoré považujeme za samozrejmé, ako je zásobovanie vodou, zdravotná starostlivosť, dodávka elektrickej energie alebo mobilné služby. Hrozby môžu mať rôzny pôvod – vrátane zločineckých, politicky motivovaných, teroristických alebo štátom podporovaných útokov, ako aj prírodných katastrof a neúmyselných chýb. Rozvoj informačných a komunikačných technológií má teda aj svoju tienistú stránku. Kybernetický priestor, tak ako svet fyzický, ponúkol možnosť realizácie sa negatívnej stránke človeka, ktorá má za následok vznik nových bezpečnostných hrozieb.
Information technology is developing extremely significant. It has become the one of the strategic means of industry, administration, banking sector, but also the armed forces. In recent years, it appears that although the digital world brings enormous benefits, is also vulnerable. Incidents within the cyber security, whether intentional or accidental, are increasing at an alarming rate and could disrupt the delivery of basic services that we take for granted, such as water supply, health care, power supply and mobile services. The threats may have different sources - including criminal and politically motivated terrorist or state-supported attacks as well as natural disasters and unintentional errors. The development of ICT has therefore without its drawbacks. Cyberspace as a physical world, offered the possibility of carrying out the negative side of man, which has resulted in the emergence of new security threats.
Źródło:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne; 2016, 7(1)/2016; 306-322
2300-1739
Pojawia się w:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legal implications of critical infrastructure protection; the experience of the Cyprus Cybercrime Center
Autorzy:
Tsadiras, A.
Bachtsetzis, Ch. S.
Georgiou, M.
Boustras, G.
Mylona, V.
Powiązania:
https://bibliotekanauki.pl/articles/2069222.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
cybercrime law
legal framework
Cyprus cybercrime
legal implications
cyber security
cyber sexual abuse
Opis:
Cyber related crime is an important aspect of Critical Infrastructure. The recent accession of Cyprus to the EU, its small size and its remoteness are important factors that have influenced its ability to characterize its CI’s as well as create (rather harmonize) its legal background. The paper discusses Directive 2011/-93/EU on combating the sexual abuse and sexual exploitation of children and child pornography and its transposition into the Cyprus legal order. The Directive was incorporated in the Cypriot law with the Prevention and Combating of Sexual Abuse, Sexual Exploitation of Children and Child Pornography Law 91(I)/2014, as amended by Law 105(I)/2014 on Legal Aid, aiming at preventing, suppressing and combating crimes of sexual abuse and sexual exploitation of children, child pornography and solicitation of children for sexual purposes.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 217--224
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo informatyczne inteligentnych systemów pomiarowych w świetle ustawy o krajowym systemie cyberbezpieczeństwa
IT security of smart measurement systems in the light of the act about the national cybersecurity system
Autorzy:
Babś, Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/266637.pdf
Data publikacji:
2019
Wydawca:
Politechnika Gdańska. Wydział Elektrotechniki i Automatyki
Tematy:
inteligentne systemy pomiarowe
cyberbezpieczeństwo
advanced metering systems
cyber security
AMI
cyber security directive
Opis:
28 sierpnia 2018 weszła w życie Ustawa o Krajowym Systemie Cyberbezpieczeństwa, implementująca wymagania europejskiej dyrektywy NIS. Wszyscy operatorzy usług kluczowych będą zobowiązani do wdrożenia określonych w ustawie procedur dotyczących m.in. szacowania ryzyka w zakresie funkcjonowania świadczonych usług kluczowych, zarządzania incydentami a przede wszystkim zastosowania adekwatnych do oszacowanego ryzyka środków technicznych i organizacyjnych. Istotnym elementem szacowania tego ryzyka jest znajomość potencjalnych wektorów ataku możliwych do wykorzystania do naruszenia stabilności systemu realizującego określoną usługę kluczową. Systemy inteligentnego opomiarowania, m.in. ze względu na fakt, iż wykorzystują liczniki energii elektrycznej pozostające fizycznie poza kontrolą operatora sieci, mogą być celem cyberataku o dużym zasięgu i istotnym, negatywnym wpływie na działanie sieci elektroenergetycznej i ciągłość dostaw energii elektrycznej. Referat przedstawia wybrane scenariusze ataku na infrastrukturę inteligentnego opomiarowania oraz środki zapobiegawcze których zastosowanie może podnieść odporność na dotychczas zidentyfikowane metody cyberataku. W referacie przedstawiono sposób zapewnienia bezpieczeństwa informatycznego inteligentnych systemów pomiarowych. Określono procedury związane z badaniami poziomu bezpieczeństwa systemów inteligentnego opomiarowania w odniesieniu do poszczególnych warstw tych systemów.
On August 28, 2018, the Act on the National Cyber Security System, implementing the requirements of the European NIS Directive, came into force. All identified operators of key services are be required to implement the procedures laid down in the directive, including risk assessment in the scope of functioning of provided key services, incident management and most importantly the application of technical and organizational measures adequate to the estimated risk. An important element of estimating this risk is the knowledge of potential attack vectors that can be used to breach the stability of the system performing a specific key service. Intelligent metering systems due to the fact that they use electricity meters that remain physically beyond the control of the network operator, may become a target of a cyberattack on a massive scale and therefore have a significant negative impact on the operation of the electric grid and continuity of energy supply. The paper presents selected methods of the attack on smart metering infrastructure as well as preventive measures that may increase resistance to currently identified cyber-attack methods. Moreover the paper presents the methods of executing a security audit of AMI systems on their architectural levels.
Źródło:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej; 2019, 62; 59-62
1425-5766
2353-1290
Pojawia się w:
Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies