Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This article describes and presents the issue of energy policy pursued by the Russian Federation, with particular emphasis on the role of the Nord Stream II gas pipeline in this policy. The article focuses on both theoretical and practical and assumptions of energy policy - especially in the context of its implementation by the Russian Federation and taking into account the Russian potential of energy resources. The concept of Nord Stream II gas pipeline was presented and analyzed simultaneously from the point of view of potential threats and risks associated with its construction, as well as from the point of view of consequences for its beneficiaries.
EN
This article is an overview of some of the most common cyberattacks. During the ongoing technological development, more and more users of cyberspace are exposed to social engineering attacks. Their easy preparation and effectiveness of the attack can cause serious consequences for the victims. The psychological part of the article will focus on the mechanisms that social engineers use. The psychological basis behind phishing, vishing and smishing will be described. The article will explain how the weaknesses of the human mind are exploited.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.