Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyberattack
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of evidence of unauthorized interference. The results show that to protect the critical infrastructure facilities from cyberattacks, developed and implemented national cybersecurity standards must be developed in Ukraine, in particular for automated control systems of critical infrastructure facilities.
EN
Botnets, the remotely controlled networks of computers with malicious aims, have significantly affected the international order from Ukraine to the United States in recent years. Disruptive software, such as malware, ransomware, and disruptive services, provided by those botnets has many specific effects and properties. Therefore, it is paramount to improve the defences against them. To tackle botnets more or less successfully, one should analyse their code, communication, kill chain, and similar technical properties. However, according to the Business Model for Information Security, besides technological attributes, there is also a human and organisational aspect to their capabilities and behaviour. This paper aims to identify the aspects of different attacks and present an analysis framework to identify botnets’ technological and human attributes. After researching the literature and evaluating our previous findings in this research project, we formed a unified framework for the human-organisational classification of botnets. We tested the defined framework on five botnet attacks, presenting them as case studies. The chosen botnets were ElectrumDoSMiner, Emotet, Gamover Zeus, Mirai, and VPNFilter. The focus of the comparison was motivation, the applied business model, willingness to cooperate, capabilities, and the attack source. For defending entities, reaching the target state of defending capabilities is impossible with a one-time development due to cyberspace’s dynamic behaviour and botnets. Therefore, one has to develop cyberdefence and conduct threat intelligence on botnets using such methodology as that presented in this paper. This framework comprises people and technological attributes according to the BMIS model, providing the defender with a standard way of classification.
EN
The article discusses the matter of contemporary cyberattack techniques aimed at the financial security of banks and their clients and presents the relationship of banks with their clients in the light of the applicable provisions of the European Union (Directive of the European Parliament and the EU Council 2015/2366 of November 25, 2015 on payment services in internal market) and the Polish Act of 19 August 2011 on payment services. The authors also analyze the practical side of the relationship between banks and their customers who have fallen victim to computer fraud, pointing out that the common practice of banks refusing to return funds stolen from their customers in the electronic banking system is inconsistent with the applicable standards of Polish and European law.
PL
Dynamiczny rozwój informatyki spowodował że człowiek jest coraz bardziej uza-leżniony od komputerów i pochodnych urządzeń. Jeszcze na początku lat 80. XX wieku kom-puter był jedynie narzędziem, którego głównym przeznaczeniem było wykonywanie skompli-kowanych obliczeń naukowych lub użycie w celach militarnych. Obecnie urządzania teleinfor-matyczne towarzyszą człowiekowi praktycznie w każdym aspekcie jego życia, począwszy od wykonywania zadań służbowych, na relaksie i utrzymywaniu kontaktów ze znajomymi koń-cząc. Technologie informatyczne zdominowały sposób zarządzania państwem wraz z jego klu-czowymi elementami, do których należy m.in. infrastruktura krytyczna. Wraz z rosnącym uza-leżnieniem funkcjonowania społeczeństwa od technologii informatycznych rosną również za-grożenia płynące z ataków w cyberprzestrzeni. Fakt ten wykorzystują organizacje terrorystyczne, co owocuje pojawieniem się nowego, groźnego dla świata zagrożenia – cyber-terroryzmu.
EN
The dynamic development of information technology has caused that man is becom-ing more and more dependent on computers and related devices. At the beginning of the 1980s computer was only a tool which main purpose was to perform complex scientific calculations or use in military purposes. Currently, the telecommunication devices accompany man in almost every aspect of life, starting with performing the work tasks, relaxation and maintaining contacts with friends. Information technology dominated the state management with its key elements, one of which is, among others, critical infrastructure. With the growing addiction of society from in-formation technology, also threats from the attacks in cyberspace grow. This fact is used by ter-rorist organizations, which results in the emergence of a new, dangerous for the world, threat – cyber-terrorism.
EN
Due to its numerous advantages such as easy communication, speed and comfortable shopping, access to public administration or electronic banking – the internet has become an important element of our lives. It is, however, also an area for criminals, whose victims are both institutions and citizens. Taking into account the growing scale of this phenomenon, the Supreme Audit Office examined whether in the years 2019–2021 the State took effective measures that would allow to identify, prevent or reduce the consequences of internet crime. The audit covered the crimes targeted at individual users of the internet, which may bring financial loss risks. Four entities were audited: the Minister of Digitalisation, the Government Proxy for Cybersecurity, the Police Headquarters and the Scientific and Academic Computer Network – the State Research Institute. The findings of the NIK audit show that these entities focused on protection of the systems of key importance for the State. Simultaneously, they ignored citizens who, at the time of increased activities of cybercriminals, were left alone.
PL
Dzięki wielu zaletom – łatwości komunikacji, szybkości i wygodzie zakupów, dostępowi do administracji publicznej czy bankowości elektronicznej – Internet stał się ważnym elementem naszego życia. Jest on jednak również polem działalności przestępców, których ofiarami są nie tylko instytucje, ale i obywatele. Ze względu na rosnącą skalę tego zjawiska Najwyższa Izba Kontroli sprawdziła, czy w latach 2019–2021 państwo prowadziło skuteczne działania pozwalające zidentyfikować, zapobiegać oraz ograniczać skutki przestępstw internetowych1 . Przedmiotem kontroli były te wymierzone w indywidualnych użytkowników Internetu, niosące dla nich ryzyko strat finansowych. Sprawdzono cztery podmioty: Ministra Cyfryzacji (dalej Minister), Pełnomocnika Rządu ds. Cyberbezpieczeństwa (dalej Pełnomocnik Rządu), Komendę Główną Policji (KGP) oraz Naukową i Akademicką Sieć Komputerową – Państwowy Instytut Badawczy (NASK). Ustalenia NIK wskazują, że skoncentrowały się one na ochronie instytucji i systemów kluczowych dla funkcjonowania kraju. Jednocześnie pomijały obywateli, którzy w okresie wzmożonej działalności cyberprzestępców byli zdani tylko na siebie.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.