Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl


2013 | 4(349) | 143-160

Article title

Polityka cyberbezpieczeństwa Sojuszu Północnoatlantyckiego


Title variants

The North Atlantic Treaty Policy on ICT Security

Languages of publication



Dynamic development of the Internet since the end of the 20th century, despite its indisputable advantages, opened new challenges to the security of states. The first major cyber-incidents took place in the 1980s and 1990s. Later on they evolved into organized, harmful activities both of states and non-state actors. A breakthrough in this respect took place in 2007, when Estonia became the first country to be massively attacked by politically motivated hackers. It proved that the North Atlantic Treaty Organization was not prepared to fight these unconventional threats. Over the next six years, NATO elaborated a new cyber security policy based on the awareness that ICT technologies are increasingly important for the international environment. This process was accompanied by the development of new structures and institutions, which were tasked to fight cyber attacks. On the one hand, in this context, it is important to underscore that NATO has employed the proper way of countering theses challenges. On the other hand, however, it did not address multiple, still valid dilemmas concerning, among others, the interpretation of article 5 of the Washington Treaty. Finding a way to solve these problems will determine the security of the Euro-Atlantic community in the future.




Document Type

Publication order reference


YADDA identifier

JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.