Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyber crime
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The fourth industrial revolution is transforming crime and fight against it, causing fundamental consequences for research in the field of criminal law. Under the conditions of the second decade of the 21st century, the terms ‘Internet’, ‘information and telecommunications network’, ‘electronic network’, ‘communications facility’, ‘mobile communications’ are no longer an IT specialist dictionary, in the meantime they affect the doctrine of criminal repression and integrate into a scientific turnover of specialists in the field of criminal law and criminology. Transformation of crime has caused serious gaps, both in the theory of criminal law and in criminal procedural and criminal executive law inextricably bound with it. The emergence and exponential development of the Internet, electronic communications, control and tracking systems and many other technical achievements create for researchers three types of problems that need to be discussed and resolved. First, the problem of national sovereignty in criminal matters (the operation of criminal law in space) and jurisdiction, which are in contradiction in the boundless cyberspace. Secondly, the prognostic problem, which urges not only to forecast the influence of modern technologies on substantive criminal law, criminal procedure, execution of criminal punishment, but also to anticipate the general impact of technology on Russian society and the way of life of its members. Thirdly, the problem of expenses resulting from the introduction of high-tech crime prevention measures, the cost of which is constantly growing. The interdependence of these problems should form the basis of criminal law research in the era of augmented reality under the conditions of exponential growth of cyber threats directed at citizens, businesses and governments
EN
In this article, the authors discuss the potential meaning and normative grasp of the term cyber weapon, which has been used in the public space in the context of the cyber-attack against the Rudolf and Stefanie Hospital in Benesov. In this respect, authors analyze details of the cyber incident to identify constitutive elements of a cyber weapon and a possibility of subsequent subsumption and application of the term cyber weapon in the Czech legal environment. As a part of the legal analysis, the authors try to deal with the situation that the Czech legal system not only does not know the concept but also does not envisage it and, in a large number of areas, does not allow for its application even through extensive legal interpretation, and therefore they focus on the criminal law as the most relevant branch for the given issue. The authors assess whether the criminal law consideration of advanced malware is desirable and offer several directions in which the subsumption and application can be considered, focusing primarily on the issue of the qualifying extension and regulatory completion of the qualified offence of unauthorized access to a computer system and the possibilities offered by the aggravating circumstances legislation. They conclude the article by an evaluation and recommendations for a future development.
CS
V daném článku se autoři věnují potenciálnímu významu a normativnímu uchopení pojmu kybernetická zbraň, který byl použit ve veřejném prostoru v kontextu kybernetického útoku na Nemocnici Rudolfa a Stefanie v Benešově. V tomto ohledu analyzují detaily daného kybernetického incidentu za účelem identifikace konstitučních prvků kybernetické zbraně a možnosti následné subsumpce a aplikace daného pojmu v českém právním prostředí. V rámci právní analýzy, ve které se pokoušejí vyrovnat se situací, kdy český právní systém daný pojem nejen nezná, ale ani s ním nepočítá a ve velké části případů neumožňuje aplikaci ani prostřednictvím extenzivního výkladu, se nakonec zaměřují na problematiku trestního práva jakožto nejrelevantnějšího odvětví pro danou problematiku. V tomto prostředí pak hodnotí, zda je trestněprávní zohlednění pokročilých malwarů žádoucí, a nabízejí několik směrů, ve kterých je možné o dané subsumpci a aplikaci uvažovat, přičemž se především zaměřují na problematiku kvalifikačního rozšíření a regulatorního dotvoření kvalifikované skutkové podstaty neoprávněného přístupu k počítačovému systému a na možnosti, které nabízí právní úprava přitěžujících okolností. Celé pojednání uzavírají vyhodnocením a doporučením pro další vývoj.
EN
The digital era, accelerating the exchange of information and changing the form of document circulation, have created new entrances to any organisations. No longer the glazed front door, but internet links lead someone deep into the organization. Guards and security services have been replaced by computer systems, anti-virus programs and firewalls. Using fiber optics some black-hat can reach much further, penetrate the structure of the organization incomparably deeper, causing damage many times greater than that occurred in the past.There are so many threats that it is impossible to list them, every day new forms of attack and previously unknown ways of phishing information and form of stealing money are invented. Initially, sets of rules were created to familiarize employees with dangers. They focused on the protection of confidential copies and files, on ways of creating access passwords and forms of handling information. In a relatively short time, however, it turned out that the digitized economy requires systematic treatment. The concept of security management in the digital era has emerged; it is systematized and focused on clearly identified areas. The security management in digitalized world includes such areas as: data management, process and work-flow automation, advanced decision-making automation, infrastructure management, intelligent interfaces, management of the external IT ecosystem and management of employee skills and organizational culture. Continuous improvement in the management of these areas will certainly not eliminate threats, but will significantly improve security, which is contemporary „to be or not to be” for any organization.
PL
Era cyfrowa, przez przyspieszenie wymiany informacji i zmianę formy obiegu dokumentów, stworzyła nowe wejścia do przedsiębiorstw i urzędów. Już nie oszklone frontowe drzwi, lecz internetowe łącza prowadzą w głąb organizacji. Pracowników ochrony zastąpiły komputerowe systemy zabezpieczenia informacji, programy antywirusowe i firewalle. Światłowodami można dotrzeć znacznie dalej, przeniknąć w struktury organizacji nieporównanie głębiej i wyrządzić szkody wielokrotnie większe od tych, które mogli poczynić „klasyczni” złoczyńcy. Zagrożeń jest tak wiele, że nie sposób ich wszystkich wymienić, a codziennie powstają nowe formy ataku i nieznane wcześniej sposoby wyłudzeń informacji i pieniędzy. Początkowo tworzono zbiory zasad, z którymi zaznajamiano pracowników. Dotyczyły one ochrony kopii i plików poufnych, sposobów tworzenia haseł dostępu, postępowania z informacjami. W stosunkowo krótkim czasie okazało się jednak, że ochrona przed cyberprzestępczością domaga się systemowego potraktowania. Pojawiło się pojęcie zarządzania bezpieczeństwem w erze cyfrowej – zagadnienie to jest usystematyzowane i skoncentrowane na jasno wyodrębnionych obszarach. Obejmuje: zarządzanie danymi, zarządzanie procesem przepływu informacji, zautomatyzowane procesy decyzyjne, zarządzanie infrastrukturą, inteligentne interfejsy, zarządzanie zewnętrznym „ekosystemem” informatycznym i zarządzanie umiejętnościami pracowników oraz kulturą organizacyjną. Koncentracja na tych obszarach na pewno nie wyeliminuje zagrożeń, lecz znacząco poprawi bezpieczeństwo, od którego często zależy dalsze trwanie organizacji.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.