Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyber-attack
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
One effect of rapid technological progress in the field of processing and storage of information is crime committed withthe use of modern information and communication technologies. Some time ago a completely new area known as cyberspaceappeared within the rapidly evolving sphere of computing. Mankind with its knowledge or ignorance, together with motivation,is the primary source of threats in the era of the information society. Nowadays, in order to commit an offence one does notneed to leave one’s place of residence, it is enough to have a computer, a particular idea and access to the Internet. Knowledgeof masking and hiding on the Web greatly increases the chances of success and confounds the instruments of law enforcementand justice. Law and order, when disrupted by various types of crime, generate in society a sense of fear, injustice and lack of statecontrol. The article discusses the real threat of cyber‑terrorismand ways to use modern tools against state security, and in particularin relation to the safety of railway infrastructure. The authors are of the opinion that the primary element of staying safein cyberspace is the education of institutions responsible for the operation of the Web and ICT systems. Equally important maybe the adoption of permanent rules of law enforcement cooperation with private sector entities, such as internet service providers(ISPs) and administrators of sites, domains and websites relevant to the management of accounts, resources, and permissions.The article also notes that police actions may not be sufficient to effectively combat computer crime related to the threat to criticalinfrastructure systems if the entire society is not also involved in this fight.
EN
The purpose of the article is to present the results of studies due to the training process of specialists in cybersecurity in the United States. The article substantiates the conceptual bases for the training of specialists incybersecurity and characterizes the legal principles relating to disciplines and specialties for which the United States have lead preparation and upgraded the skills of cybersecurity experts.Key terms have been described, identified and their interpretation with the objective of a concrete definition and specification of their essential values are presented. The conducted research of American experience of professional training in the field of cybersecurity bachelor’s degree will enable to determine the possibilities of its progressive ideas implementation into higher education of Ukraine. In particular: improvement of industry standards for cybersecurity bachelor’s degree; providing the information support of Internet resources; development and improvement of the content of curriculum and educational programs for training bachelors of cybersecurity; improvement of the educational and methodological implementation; advanced study of foreign experience. The successful implementation of reasonable opportunities will promote professional training of national experts in the field of cybersecurity, accelerate the process of reforming of the national higher education system, convergence of the international educational standards, and ensure its competitiveness in today’s job market. The successful implementation of reasonable opportunities will promote professional training of the national experts in the field of cybersecurity, accelerate the process of reform of the national higher education system, convergence of the international educational standards, and ensure its competitiveness in today’s job market. The practical significance of the research is to form an idea of the conceptual bases and terminology of the curriculum for training specialists in cybersecurity, which are the subject of our further research.
EN
Industrial networks are used to control processes and manufacturing operations of varying scope. Their mission is to provide automatic transfer of information within the structure of distributed control systems. To achieve this industrial networks and systems have to possess ability to withstand wide range of internal and external threats. The consequences of cyber-attacks can potentially be varied from benign traffic disruption, through interventions in the operation (the production process), to deliberate sabotage to cause maximum damage. For this reason, it is important to constantly review environment in which they operate as well as their security.
XX
Sieci przemysłowe są używane do kontrolowania procesów i operacji produkcyjnych różnego zakresu. Ich celem jest dostarczanie automatycznego przepływu informacji w obrębie systemów sterowania. Aby to osiągnąć sieci i systemy przemysłowe muszą mieć możliwość przeciwstawienia się dużej ilości zagrożeń zewnętrznych i wewnętrznych. Konsekwencje cyber-ataków mogą zaczynać się od łagodnego zakłócenia ruchu, poprzez interwencje w pracy (w procesie produkcji), aż do sabotażu powodującego największe szkody. Z tego powodu ważne jest, aby stale kontrolować warunki, w których działają jak również ich bezpieczeństwo.
PL
Zagrożenia wynikające z dokonywania cyberataków stanowią wyzwanie dla bezpieczeństwa narodowego. Takie ataki mogą być wymierzone w każde państwo, aby zakłócić jego codzienne funkcjonowanie. W obliczu złożonych i różnorodnych kryzysów Unia Europejska w ostatnich dekadach zwiększyła swoje możliwości reagowania, wprowadzając do art. 42 ust. 7 Traktatu o Unii Europejskiej (TUE) tzw. klauzulę pomocy i wsparcia, mającą zastosowanie w przypadku zbrojnej agresji przeciwko państwu członkowskiemu UE na jego terytorium. Głównym celem niniejszej publikacji jest analiza potencjalnych warunków zastosowania art. 42 ust. 7 TUE w odpowiedzi na operacje cybernetyczne. Autor argumentuje, że w określonych sytuacjach klauzula pomocy i wsparcia z art. 42 ust. 7 TUE może być stosowana w odpowiedzi na niektóre operacje cybernetyczne przeciwko państwu członkowskiemu UE na jego terytorium.
EN
The threat posed by the occurrence of cyber-attacks constitutes a challenge to national security. Such attacks may target and disturb the daily functioning of any state. Faced with complex and diverse crises, the European Union (EU) has improved its response capacities over the last decades, introducing a so-called ‘aid and assistance clause’ into Article 42(7) of the Treaty on European Union (TEU) applicable in the case of armed aggression against an EU member state on its territory. The main objective of this publication is to examine potential conditions for the application of Article 42(7) TEU in response to cyber operations. The author argues that under certain conditions, the aid and assistance clause in Article 42(7) TEU may be invoked in response to certain cyber operations against an EU member state on its territory.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.