Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyber war
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
100%
EN
Dynamic development of the Internet since the end of the 20th century, despite its indisputable advantages, opened new challenges to the security of states. The first major cyber-incidents took place in the 1980s and 1990s. Later on they evolved into organized, harmful activities both of states and non-state actors. A breakthrough in this respect took place in 2007, when Estonia became the first country to be massively attacked by politically motivated hackers. It proved that the North Atlantic Treaty Organization was not prepared to fight these unconventional threats. Over the next six years, NATO elaborated a new cyber security policy based on the awareness that ICT technologies are increasingly important for the international environment. This process was accompanied by the development of new structures and institutions, which were tasked to fight cyber attacks. On the one hand, in this context, it is important to underscore that NATO has employed the proper way of countering theses challenges. On the other hand, however, it did not address multiple, still valid dilemmas concerning, among others, the interpretation of article 5 of the Washington Treaty. Finding a way to solve these problems will determine the security of the Euro-Atlantic community in the future.
EN
In recent years, armed conflicts have changed in nature (civil war, ‘terrorism’) and the means used are increasingly technological (robotisation, cyberwar). Faced with these developments, some would claim International Humanitarian Law (IHL) is outdated. While these technological innovations present new challenges in the application of IHL, it still constitutes a relevant legal framework for armed conflicts and the conduct of hostilities. Indeed, the flexibility of IHL allows it to adapt to contemporary conflicts. Therefore, this shows that the statements about its obsolescence are primarily political in nature.
EN
Industrial networks are used to control processes and manufacturing operations of varying scope. Their mission is to provide automatic transfer of information within the structure of distributed control systems. To achieve this industrial networks and systems have to possess ability to withstand wide range of internal and external threats. The consequences of cyber-attacks can potentially be varied from benign traffic disruption, through interventions in the operation (the production process), to deliberate sabotage to cause maximum damage. For this reason, it is important to constantly review environment in which they operate as well as their security.
XX
Sieci przemysłowe są używane do kontrolowania procesów i operacji produkcyjnych różnego zakresu. Ich celem jest dostarczanie automatycznego przepływu informacji w obrębie systemów sterowania. Aby to osiągnąć sieci i systemy przemysłowe muszą mieć możliwość przeciwstawienia się dużej ilości zagrożeń zewnętrznych i wewnętrznych. Konsekwencje cyber-ataków mogą zaczynać się od łagodnego zakłócenia ruchu, poprzez interwencje w pracy (w procesie produkcji), aż do sabotażu powodującego największe szkody. Z tego powodu ważne jest, aby stale kontrolować warunki, w których działają jak również ich bezpieczeństwo.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.