Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber defense" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
System Approach to Coherent Cybersecurity Strategy
Autorzy:
MICHALSKI, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/466152.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cybersecurity
cyber defense,
system approach,
cyber defense strategies
cybersecurity strategies
Opis:
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity strategy?”. The first part of the article addresses the paradigmatic issue of cybersecurity. The author shows the differences and relations between cybersecurity and cyber defense. At this point, the author presents a systems approach to the nation security and related it to the cybersecurity. The second part of the article has been dedicated to visualize the need of coherent cybersecurity strategy by analyzing data related to cybersecurity. In the end, the author proposes actions to achieve cybersecurity. This has been done based on existing analyzes of cybersecurity strategies and systems approach to the issue of the cybersecurity.
Źródło:
Safety & Defense; 2019, 5, 1; 31-36
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Same threat, different answers? Comparing and assessing national cyber defence strategies in Central-Eastern Europe
Autorzy:
Niedermeier, Alexander
Powiązania:
https://bibliotekanauki.pl/articles/576155.pdf
Data publikacji:
2017-09-24
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
Cyber Defense
Cyber Doctrine
Cyber Strategy
Cyber
cooperation
Central-Eastern Europe
European Union
Opis:
In the article, National Cyber Security Strategies (NCSS) of the Central and Eastern European states are compared and assessed. After it had become evident that a variety of crucial new threats to national security had emerged over recent years, virtually all states reacted with national strategies. These strategies are aimed at securing national cyberspace from cyber threats through legal, operational, technical and policy-related measures. They exist in addition to general national security strategies and are meant to support these. Even if most countries have National Cyber Security Strategies, the author demonstrates that these strategies show, at least in part, remarkable differences. The role national particularities play is explained, whether they are really this specific and whether they might be generalised and transferred to other national contexts and what approaches turned out best under what circumstances. Based on these results, existing strengths, weaknesses and best practices are explained to open avenues for improving existing strategies and generate a higher degree of strategy interoperability in an environment that maybe like no other requires international cooperation. It is evident that precise definitions of terms and concepts are essential. However, not all strategies provide those definitions, which might lead to misunderstandings and complicate cooperation both on domestic and international level. While some strategies offer clear cut responsibilities for the actors involved, others remain unclear. Even if laws are there to specify concrete procedures, the NCSS should not be too superficial. The NCSS itself should already make clear statements, particularly when it comes to the crucial aspect of coordinating the various cyber actors and stake holders. The author demonstrates that National Cyber Security Strategies ought to be detailed enough to clearly determine actors and responsibilities, but open and flexible enough for adaptability to fast developments.
Źródło:
Security and Defence Quarterly; 2017, 16, 3; 52-74
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nation-State Cyber Operations Legal Considerations: An Estonian Case Study
Autorzy:
Małecka, Agata
Powiązania:
https://bibliotekanauki.pl/articles/2067545.pdf
Data publikacji:
2021
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyber attack
cyber defense
Estonia
nation state cyber operations
prohibition of the use of force
cyberatak
cyberobrona
cyberoperacje państw
zakaz użycia siły
Opis:
States use cyberspace as one of the platforms for pursuing national interests, also in the context of armed conflict. Due to their inherent purpose, certain principles of international law also apply to the activities of entities (state and non-state) in cyberspace. The main research problem was defined as the following question: under what conditions could the terms in international law be used to describe the events in Estonia in 2007 that imply the possibility of eventual responses or demands by victim parties consistent with international standards? In the article, the events in Estonia in 2007 were compared to existing methods of cyber warfare. The main research methods that were used to achieve the essential objective were: analysis of legal documents and critical analysis of the literature on the subject. The analysis is interdisciplinary in nature and will be particularly useful to researchers of international political and/or military relations and those interested in aspects of international security.
Źródło:
Safety & Defense; 2021, 3; 99--108
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Law of 11 march 2022 on homeland defense implications for the cybersecurity of Poland
Autorzy:
Kobielski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2201549.pdf
Data publikacji:
2022
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
cyberspace
cybersecurity
Cyber Defense Forces
data
law
Polska
Law on Homeland Defense
cyberprzestrzeń
bezpieczeństwo cybernetyczne
dane
prawo
Polska
Ustawa o Obronie Ojczyzny
Opis:
On March 11, 2022, Polish parliament, the Sejm passed the Law on Homeland Defense. The Law replaces 14 other legal acts in the field of military law. The main goal of the Law was to prepare the Polish Armed Forces for the processes of rapid increase in the manpower and technical modernization, also due to the current geopolitical context related to the war in Ukraine. The Law is extensive. Although the improvement of Poland’s cybersecurity was not its primary goal, the Law introduces a number of solutions that undoubtedly pursue such a goal. This paper discusses selected issues in the field of cybersecurity included in the Law, and regarding the method of defining the cyberspace, organization and tasks of the Cyberspace Defense Forces, including the socalled proactive protection and active defense, as well as the competence of military authorities to access and manage data.
Źródło:
Wiedza Obronna; 2022, 3; 25--38
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
European Parliament Position on EU Cyber Security and Defense Policy
Autorzy:
Staszczyk, Artur
Powiązania:
https://bibliotekanauki.pl/articles/1963344.pdf
Data publikacji:
2019-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber security
cyber defense
European Parliament
European Union
Opis:
Ensuring cyber security in scope of cyber defense is currently among the top priorities of the EU Common Security and Defense Policy (CSDP). Matters included in scope of cyber defense are a competence of the Member States and cooperation at EU level in this area is governed by decisions of the EU Council based on unanimity. This means that the European Parliament (EP) in the field of cyber defens acts only as an opinion-forming body expressing its position through the adoption of non-legislative resolutions. The aim of the article is to analyze the content of these resolutions and present the EP’s opinion on the challenges facing the EU in the field of cyber defense. It should be stressed that the EP is the EU body that strongly emphasizes the need for a common EU approach to these issues. Given that the area of cyber defence is subject to intergovernmental cooperation mechanisms, the EP considers that the EU needs to develop not only cooperation and coordination mechanisms at the level of its institutions, but also to take action to enhance the EU’s capability to counter cyber threats. These significant cyber defense capabilities should be essential elements of the CSDP and of the development of the European Defense Union, as it is becoming increasingly difficult to counter cyber attacks for the Member State level alone. The role of the CSDP should be to ensure that the EU, in cooperation with NATO, has an autonomous strategic capability to act in the field of cyber defense.
Źródło:
Reality of Politics; 2019, 10; 122-133
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BRAT: A BRidge Attack Tool for cyber security assessments of maritime systems
Autorzy:
Hemminghaus, C.
Bauer, J.
Padilla, E.
Powiązania:
https://bibliotekanauki.pl/articles/1841570.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
Bridge Attack Tool (BRAT)
cyber attack
cyder defense
maritime systems
security assessment
Integrated Bridge System (IBS)
Maritime Cyber Security
Opis:
Today’s shipping industry is largely digitalized and networked, but by no means immune to cyber attacks. As recent incidents show, attacks, particularly those targeting on the misleading of navigation, not only pose a serious risk from an economic perspective when disrupting maritime value chains, but can also cause collisions and endanger the environment and humans. However, cyber defense has not yet been an integral part of maritime systems engineering, nor are there any automated tools to systematically assess their security level as well-established in other domains. In this paper, we therefore present a holistic BRidge Attack Tool (BRAT) that interactively offers various attack implementations targeting the communication of nautical data in maritime systems. This provides system engineers with a tool for security assessments of integrated bridge systems, enabling the identification of potential cyber vulnerabilities during the design phase. Moreover, it facilitates the development and validation of an effective cyber defense.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 35-44
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies