Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber-safety" wg kryterium: Temat


Wyświetlanie 1-14 z 14
Tytuł:
Nowe technologie w szkole polskiej: rzeczywistość i perspektywy rozwoju
New Technologies in Polish School:Reality and Prospects for Development
Autorzy:
Grabowska, Barbara
Kwadrans, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/448375.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
Polska
nowe technologie
Internet
bezpieczeństwo w sieci
e-podręczniki
eTwinning
Polska
school
new technologies
cyber-safety
e-textbooks
Opis:
The text presents a short overview of activities of the Polish Ministry of National Education over the last dozen years or so, with a particular focus on the activities that are the results of planned or already implemented reforms in Polish school in terms of both improving its competitiveness and taking practical steps aimed at teaching practical skills, and not just providing the theoretical knowledge on such topics as new technologies, usage of ICT tools as didactic aids, Internet accessibility, cyber-safety, e-textbooks, or international cooperation projects (for instance eTwinning). The article can function as the base for comparison with the actions of other countries’ governments from our region in this field. The numbers given in this text are to give only the general idea of how many more challenges there are for the governing authorities, education financing system, and the Ministry of National Education. The school does not have to encourage students to use the Internet or multimedia, but it should teach how to use them in a safe and conscious way in order to develop one’s self, qualifications, and competences.
Tekst prezentuje krótki przegląd działalności polskiego Ministerstwa Edukacji Narodowej w ciągu ostatnich dwunastu lat. Szczególna uwaga poświęcona zostaje działaniom, które są rezulta-tem planowanych i już wprowadzonych reform w polskich szkołach w celu poprawy ich zdolności do współzawodnictwa z innymi szkołami, a także wykonania praktycznych kroków w kierunku nauczania umiejętności praktycznych, a nie prostego przekazywania wiedzy teoretycznej z zakresu nowych technologii, wykorzystania narzędzi ICT jako pomocy dydaktycznych, dostępu do Internetu, bezpieczeństwa w sieci elektronicznych podręczników oraz projektów współpracy międzynarodowej, takich jak eTweening. Artykuł może stać się punktem odniesienia dla porównania z działaniami podejmowanymi w tym zakresie przez rządy innych krajów. Liczby przytoczone w artykule dajątylko ogólne pojęcie o tym, jak wiele wyzwań staje przed rządzącymi, systemem finansowania edukacji oraz Ministerstwem Edukacji Narodowej. Szkoła nie ma obowiązku zachęcać uczniów do wykorzystywania Internetu i multimediów, ale powinna nauczać, jak ich świadomie i bezpiecznie używać, aby uczniowie rozwinęli się jako osoby oraz zwiększyli swoje kwalifikacje i kompetencje.
Źródło:
International Journal of Research in E-learning IJREL; 2018, 4, 1; 44-56
2451-2583
2543-6155
Pojawia się w:
International Journal of Research in E-learning IJREL
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia w cyberprzestrzeni a bezpieczeństwo jednostki
The cyberspace hazard and the safety unit
Autorzy:
Żuk, Jadwiga
Żuk, Monika
Powiązania:
https://bibliotekanauki.pl/articles/565291.pdf
Data publikacji:
2016
Wydawca:
Akademia Bialska Nauk Stosowanych im. Jana Pawła II w Białej Podlaskiej
Tematy:
cyberprzestrzeń
bezpieczeństwo jednostki
cyberspace
cyber security
a cyber crime
a safety unit
Opis:
Dynamiczny rozwój technologii teleinformatycznych przyczynił się do powstania nowego pola aktywności, jakim jest cyberprzestrzeń. Jest to jedna z najważniejszych zmian w środowisku bezpieczeństwa, niosąca zupełnie nowe zagrożenia, a przez to wymagająca nowych uregulowań, zabezpieczeń i informacji celem zapewnienia bezpieczeństwa państwa, instytucji i osób korzystających z cyberprzestrzeni. W dobie globalizacji cyberprzestrzeń, która nie zna granic może być polem konfliktu wrogich państw, zorganizowanych grup przestępczych, ekstremistycznych, terrorystycznych, hakerów, oszustów, a nawet pedofilów. Jak widać stawka może być bardzo wysoka, od bezpieczeństwa infrastruktury krytycznej, poprzez wyniki finansowe przedsiębiorstw, szeroko rozumiane bezpieczeństwo obywateli, a nawet dzieci.
The dynamic development of Information and Communications Technology (ICT) contributed to the emergence of a new field of activity; that is cyberspace. It is one of the most important changes in the safety environment that carries a completely new security threat and, therefore, requires new regulations, protection and information to assure security of the institutions and people who use cyberspace. In the era of globalisation, cyberspace does not have any barriers, which can lead to many conflicts between hostile states, gangs, terrorists, extremist groups, hackers, the frauds or even paedophiles. Thus, as one can see, the stakes are high when it comes to securing critical infrastructure or financial companies’ results as well as citizens’ safety, including children.
Źródło:
Rozprawy Społeczne; 2016, 10, 3; 71-77
2081-6081
Pojawia się w:
Rozprawy Społeczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CERP: a maritime cyber risk decision making tool
Autorzy:
Erstad, E.
Hopcraft, R.
Palbar, J. D.
Tam, K.
Powiązania:
https://bibliotekanauki.pl/articles/24201418.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber resilience
maritime cyber security
cyber risk management
safety and security
emergency response procedures
cyber incident response
risk mitigation
maritime cyber threats
Opis:
An increase in the complexity of systems onboard ships in the last decade has seen a rise in the number of reported maritime cyber-attacks. To tackle this rising risk the International Maritime Organization published high-level requirements for cyber risk management in 2017. These requirements obligate organisations to establish procedures, like incident response plans, to manage cyber-incidents. However, there is currently no standardised framework for this implementation. This paper proposes a Cyber Emergency Response Procedure (CERP), that provides a framework for organisations to better facilitate their crew’s response to a cyber-incident that is considerate of their operational environment. Based on an operations flowchart, the CERP provides a step-by-step procedure that guides a crew’s decision-making process in the face of a cyber-incident. This high-level framework provides a blueprint for organisations to develop their own cyber-incident response procedures that are considerate of operational constraints, existing incident procedures and the complexity of modern maritime systems.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2023, 17, 2; 269--279
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety
Autorzy:
Dudek, Wojciech
Szynkiewicz, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/308055.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cyber-security
mobile robot safety
robot
robot threats
Opis:
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 29-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Review of ship information security risks and safety of maritime transportation issues
Autorzy:
Melnyk, O.
Onyshchenko, S.
Onishchenko, O.
Shumylo, O.
Voloshyn, A.
Koskina, Y.
Volianska, Y.
Powiązania:
https://bibliotekanauki.pl/articles/24201429.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime transportation
security risks
safety of sea transportation
safety of maritime transportation
cyber security
ship information security
cyber attack
information in transport
Opis:
In recent years, various types of commerce including transport have suffered significant damage and costs due to cyber-attacks. The geographic scope of freight transportation has no boundaries, attacks can be launched almost anywhere there is an Internet connection. Therefore, there is no immunity from the failure of computer systems and information of delivery processes in the networks of organizations and companies engaged in maritime transportation. In addition, while the consequences of cyber-attacks on major shipping lines and ports, as well as the digital systems of logistics companies, can be comprehensively analyzed, the vulnerability of ships remains insufficiently studied. This paper offers an analysis of the risks in the field of maritime freight transport and the main factors of influence such as digitization on the safety of the transport process. The basic threats to the information system of the ship are defined and the techniques of risk analysis for the ship information security is proposed.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 4; 717--722
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
Autorzy:
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2068879.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
security
cyber HAZOP
industrial control systems
oil port installations
Opis:
The approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk evaluation results the safety integrity level (SIL) and security assurance level (SAL) will be determined for consecutive safety functions. The proposed approach will be composed of the following items: process and procedure based safety and security management, example of procedure based safety management including insurance, integrated safety and security assessment of industrial control system (ICS) of the oil port pipelines, tanks and critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2017, 8, 1; 129--138
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2069111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
hazardous plants
critical infrastructure
safety and security
protection systems
cyber security
Opis:
This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology known as the security vulnerability analysis (SVA) developed for hazardous plants of chemical industry. It is based on rings of protection concept to secure widely understood assets. This concept seems to be compatible with layer of protection analysis (LOPA), which is consistent with functional safety concept of the control and protection systems including cyber security aspects. It is outlined how to use these approaches in an integrated way for safety and security analysis of hazardous industrial plants and systems of critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 2; 31--46
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Threats for public safety in the 21ST Century
Autorzy:
Biszko, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1179336.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cyber threats
disasters
natural disasters
primary threats
safety
secondary threats
terrorism
Opis:
The aim of the following paper is to present the threats that have a direct impact on social development. The article adopts the distinction of threats into primary and secondary ones. The former entails natural phenomena such as the movement of tectonic plates, various forms of precipitation, or ambient temperature, both high and low. They result in floods, fires, earthquakes and massive water movements, e.g. tsunami, responsible for the damage of industrial and public infrastructure as well as private properties. Secondary threats are results of human activity. Industrial growth and technological advance lead to unsustainable exploitation of natural resources and change the demand for workforce in terms of both quality and quantity. Such threats to safety can be identified, resolved and prevented as opposed to those targeted directly at a given country, e.g. terrorism or cyber attacks. Often unexpected, they become increasingly common. It is essential for public administrations to detect and recognise both kinds of threats in order to react in time and minimise their negative effects.
Źródło:
World Scientific News; 2017, 78; 81-92
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
Autorzy:
Śliwiwński, Marcin
Piesik, Emilian
Powiązania:
https://bibliotekanauki.pl/articles/2068695.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
maritime infrastructure
functional safety
cyber security
SIL
SAL
EAL
industrial control systems
Opis:
The work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL) (ISO/IEC 15408), the security assurance levels (SAL) (IEC 62443), and the number of protection rings described in the Secure Safety (SeSa-SINTEF) methodology. The proposed approach will be composed of the following items: process and procedure based safety and cyber security management, integrated safety and security assessment of industrial control system (ICS) of the maritime critical infrastructure. Proposed methodology is illustrated on case study that based on the part of installation critical maritime infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 137--148
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IT Protection of Safety-Related Machine Control Systems in Industry 4.0
Ochrona informatyczna związanych z bezpieczeństwem systemów sterowania maszynami w Przemyśle 4.0
Autorzy:
Dźwiarek, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2180203.pdf
Data publikacji:
2022
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
Industry 4.0
cyber security
safety of machinery
Przemysł 4.0
cyberbezpieczeństwo
bezpieczeństwo maszyn
Opis:
The overall objective of the research was to develop the consideration of threats of unauthorized interference in information systems in the risk assessment process carried out by designers of machine control systems. For this purpose, an analysis of typical structures related to the security of control systems was carried out in terms of the possibility and consequences of the loss of security functions as a result of unwanted interference. Recommendations for proceeding "step by step" in the subsequent stages of the risk analysis were determined.
Celem badań było opracowanie uwzględniania zagrożeń nieuprawniona interwencją w systemy informatyczne w procesie oceny ryzyka prowadzonego przez projektantów systemów sterowania maszynami. W tym celu przeprowadzono analizę typowych struktur związanych z bezpieczeństwem systemów sterowania w aspekcie możliwości i skutków utraty funkcji bezpieczeństwa w wyniku niepożądanych ingerencji. Określono zalecenia postępowania „krok po kroku" w kolejnych etapach analizy ryzyka.
Źródło:
Problemy Mechatroniki : uzbrojenie, lotnictwo, inżynieria bezpieczeństwa; 2022, 13, 4 (50); 137--146
2081-5891
Pojawia się w:
Problemy Mechatroniki : uzbrojenie, lotnictwo, inżynieria bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The safety of a human behind the dangers of the 21st century
Autorzy:
Nurzyńska, Anna
Powiązania:
https://bibliotekanauki.pl/articles/1166917.pdf
Data publikacji:
2018
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
actions preventive
cyber-terrorism
delinquency
disaster
diseases of civilization
migration
natural cataclysm
safety
terrorism
the threat
Opis:
The article presents the new threats that accompany to man in the 21st century, the reasons for the appearance of threats and their impact on the feeling of human security. The article presents the new threats that accompany man in the 21st century, for their appearance and Inference on human security. In today's world, new threats to the organization have emerged and the functioning of the public space of the human world. You can count for all the fears accompanying the action of the social sphere, the threats the development of technical civilization.
Źródło:
World Scientific News; 2018, 105; 99-109
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
Autorzy:
Kosmowski, Kazimierz, T.
Gołębiewski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2068692.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
cyber security
hazardous plants
oil port infrastructure
industrial automation
control systems
hazards
threats
vulnerabilities
risk analysis
key performance indicators
integrated safety
security management
business continuity management
insurance
Opis:
This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer, interested in decreasing risks to be insured, offers the expertise how to limit effectively risks in life cycle from the design conceptual stage of hazardous plant, through its reliable and safe operation, until decommissioning. Therefore, the risk evaluation model for insurance related decision making for the period considered, e.g. one year, should be plant specific with some predictive properties due to changing environment and business conditions, and usually considerable uncertainty involved. The objective is to evaluate and mitigate risks, and control them proactively, through undertaking appropriate activities within a process based management system according to elaborated policy and strategy that includes organisational and technical aspects, including preventive maintenance activities of sensitive equipment and updating in time the training programmes. Careful evaluating and controlling risks is also crucial for the insurance company. Basic activities of the risk engineers and underwriters in the insurance process are outlined in the context of identified hazards/threats and defined factors that significantly influence risks to be considered in evaluating the insurance premium in the context of terms and conditions specified.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 99--126
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safe information exchange on board of the ship
Autorzy:
Ahvenjärvi, S.
Czarnowski, I.
Kåla, J.
Kyster, A.
Meyer, I.
Mogensen, J.
Szyman, P.
Powiązania:
https://bibliotekanauki.pl/articles/116173.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
information exchange
navigation safety
autonomous ship
autonomous ships navigation
information technology (IT)
safe information exchange
maritime education and training (MET)
cyber security
Opis:
The first ever attempt at fully autonomous dock-to-dock operation has been tested and demonstrated successfully at the end of 2018. The revolutionary shift is feared to have a negative impact on the safety of navigation and the getting of real-time situation awareness. Especially, the centralized context onboard could be changed to a distributed context. In navigation safety domain, monitoring, control, assessment of dangerous situations, support of operators of decision-making support system should be implemented in real time. In the context of autonomous ships, decision-making processes will play an important role under such ocean autonomy, therefore the same technologies should consist of adequate system intelligence. At the same time, situation awareness is the key element of the decision-making processes. Although there is substantial research on situation awareness measurement techniques, they are not suitable to directly execute quantitative processing for the situation awareness of autonomous ships navigation. Hence, a novel quantitative model of situation awareness is firstly proposed based on the system safety control structure of remotely controlled vessel. The data source is greatly limited, but the main result still indicates that the probability of operator lose adequate situation awareness of the autonomous ship is significantly higher than the conventional ship. Finally, the paper provides a probabilistic theory and model for high-level abstractions of situation awareness to guide future evaluation of the navigation safety of autonomous ships.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 165-171
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Software solutions for GMDSS network and equipment
Autorzy:
Ilcev, S.D.
Powiązania:
https://bibliotekanauki.pl/articles/2211603.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
communication
communication at sea
global maritime distress and safety system
GMDSS network
GMDSS equipment
software solutions for GMDSS
COSPAS-SARSAT
maritime cyber security
Opis:
This paper introduces software solutions for communication, equipment control, and management of oceangoing ships for enhanced Global Maritime Distress and Safety System (GMDSS) network and equipment. This software controls all maritime transmission systems and integrates communications software at level of server and workstations. Equipment control software is used to control and maintained locally or remotely transceivers, transmitters, receivers and other hardware. Special management software is included to process, analyze and exploit the various types of information generated by GMDSS networks and equipment. This papers are also includes the concept of software solutions on radio and satellite GMDSS ship terminals, on radio and satellite GMDSS coast terminals, and as well as in GMDSS Cospas-Sarsat ground terminals. In addition, the cybersecurity system in GMDSS security management is also described in this paper.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 3; 463--472
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-14 z 14

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies