Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl


2016 | 2(18) | 14

Article title

Cyberbezpieczeństwo – podejście systemowe


Title variants

Cyber security – a system approach

Languages of publication



The article presents cyber security aspect in terms of information resource protection taking into account the nowadays threats. A model of cyber security, type of threats and IT system security class have been outlined. One of the best way to solve the problem of cyber terrorism is the implementation of Information Security Management System (ISMS). In spite of different methodology, which could be used to implement ISMS, the paper clearly indicates that ISMS based on the international standard ISO/IEC 27001 is the best choice due to the system solution.


  • 1. Górny Piotr, Metodyka oceny zagrożeń dla bezpieczeństwa państwa z przykładami propozycji zastosowań, AON, Warszawa, 2011.
  • 2. ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements, ISO, Geneva, 2013.
  • 3. Krawiec Jerzy, Ożarek Grażyna, System Zarządzania Bezpieczeństwem Informacji w praktyce. Zabezpieczenia, PKN, Warszawa, 2014.
  • 4. Krawiec Jerzy, Zabezpieczanie danych, Część 1. SZBI – systemowa pewność danych, IT Professional, nr 6, Wrocław, 2012.
  • 5. Krawiec Jerzy, Zabezpieczanie danych, część 2. Wybór zabezpieczeń technicznych, IT Professional, nr 6, Wrocław, 2012.
  • 6. McClure Stuart, Joel Scambray, George Kurtz, Hacking exposedTM 7: Network security, secret & solutions, Mc Graw Hill, 2012.
  • 7. Michalczyk Jerzy, Koszty cyberprzestępczości, IT Professional, nr 8, Wrocław, 2014.

Document Type

Publication order reference



YADDA identifier

JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.