Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2021 | 10 | 63-72

Article title

The contemporary multi-layered cybersecurity landscape and emerging nano-threats. An overview

Content

Title variants

PL
Współczesny wielowarstwowy krajobraz cyberbezpieczeństwa i pojawiające się nano-zagrożenia. Przegląd

Languages of publication

Abstracts

EN
Presented article attempts to identify the key node located in the three-tier model of cyberspace, the node which is characterized by the greatest potential impact on the other elements essential for the functioning of the whole network, especially in the security context. Based on the network analysis, it was proposed to place the ‘persona’ in the center of interest, in other words the human factor. In this way – regardless of the future direction of the further development of artificial intelligence – an individual adversary is able to dispose the historically unprecedented ability to put an impact on the critical and – potentially – military infrastructure of the state. Thus, individual digitally-skilled person is capable of destabilizing the post-industrial society not only in the context of network/computer security, but also physical security (through the cyber-physical systems).

Keywords

Year

Issue

10

Pages

63-72

Physical description

Dates

published
2021

Contributors

References

  • Bousquette, Antoine J. 2009. The scientific way of warfare: Order and chaos on the battlefields of modernity. New York: Columbia University Press.
  • Congressional Research Service. 2021. Defense primer: Cyberspace operations. “FAS Project on Government Secrecy”. December 1. Accessed: June 20, 2022, https://sgp. fas.org/crs/natsec/IF10537.pdf.
  • Digital around the world. 2022. “Datereportal”, [no date]. Accessed: June 20, 2022, https://datareportal.com/global-digital-overview.
  • Harris Shane. 2014. @War: The rise of the military-internet complex. Boston, MA: Houghton Mifflin Harcourt.
  • Kaldor, Mary. 2012. New and old wars: Organized violence in a global era. Cambridge: Polity Press.
  • Mazanec, Brian M. 2015. The evolution of cyber war: International norms for emergingtechnology weapons. Lincoln: Nebraska Press.
  • Mueller, Milton L. 2010. Networks and states: The global politics of Internet governance. Cambridge, MA: MIT Press.
  • Olszewski, Bogusław. 2019. Legal and international aspects of the militarization of cyberspace, Wroclaw: UWr, PhD dissertation. “ResearchGate”. Accessed: June 20 2022. https://www.researchgate.net/publication/340448510_Prawnomiedzynarodowe_aspekty_militaryzacji_cyberprzestrzeni_Legal_and_International_Aspects_of_the_Militarization_of_Cyberspace.
  • Shakarian, Paulo, Shakarian Jana and Andrew Ruef. 2013. Introduction to cyberwarfare: A multidisciplinary approach. Amsterdam: Syngress.
  • Surmaczyński, Marian 2010. Podstawowe problemy metodologioczne nauk społecznopolitycznych. Wrocław: Wydawnictwo Uniwersytetu Wrocławskiego.
  • The United States Army. 2010. Cyberspace operations concept capability plan 2016–2028. “TRADOC Pamphlet 525-7-8”. February 22. Accessed: January 16, 2022, https://irp.fas.org/doddir/army/pam525-7-8.pdf
  • Ujwary-Gil, Anna. 2017. Audyt zasobów niematerialnych z wykorzystaniem analizy sieci organizacyjnej. Warszawa: Wydawnictwo Naukowe PWN.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
16539466

YADDA identifier

bwmeta1.element.ojs-doi-10_25167_sk_4941
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.