Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 71

first rewind previous Page / 4 next fast forward last

Search results

Search:
in the keywords:  information security
help Sort By:

help Limit search:
first rewind previous Page / 4 next fast forward last
1
100%
PL
W warunkach gospodarki opartej na wiedzy i w społeczeństwie informacyjnym bezpieczeństwo informacyjne kraju ma coraz większe znaczenie dla bezpieczeństwa w innych dziedzinach życia społecznego, politycznego i gospodarczego. Jednym z istotnych warunków istnienia tego bezpieczeństwa jest zapewnienie dostępności do informacji niezbędnych do efektywnego działania i zachowania się w dynamicznie zmiennym otoczeniu oraz usprawnienie obsługi obywatela i przedsiębiorcy przez administrację publiczną przy wykorzystaniu środków komunikacji elektronicznej . W niniejszym artykule podjęto próbę scharakteryzowania systemów informacyjnych administracji z punktu widzenia ich znaczenia dla bezpieczeństwa informacyjnego państwa.
EN
One of the tasks of the civil state is to ensure that all citizens, subjects of the national economy and state apparatus, information security. In a knowledge-based economy and information society, information security of the country is increasingly im- portant for safety in other areas of social, political and economic. The paper was a preliminary attempt to analyze the impact of IT infrastructure administration in information security.
2
Publication available in full text mode
Content available

Honeypot

80%
Współczesna Gospodarka
|
2011
|
vol. 2
|
issue 1
13-22
EN
In the article, the principles of computer network protection using the honeypot technology were presented. Honeypots are systems of traps, which are a powerful weapon in the hands of IT security specialists. The author described types and concepts of operation of honeypots.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Voivodenship Offices in 2014. Survey questionnaires were sent to all Voivodenship Offices in Poland. The aim of the research was identifying in which of the offices ISMS are implemented, according to which standards ISMS are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems which occurred during the implementation of these systems and documentation concerning information security. The article is a continuation of research on information security management systems in the state and local government agencies.
4
80%
EN
Anonymous could call movement, activists, community or idea. They have no leader, no structure, yet have in the past influenced the decisions of thousands of people around the world. Media is often referred to as hackers, because the greatest attention they raise is their attacks, which are mainly fighting for freedom of the Internet or against various social phenomena. In addition to hackers, the movement itself creates, in addition to hackers, people who either share ideas of movement or use various programs to attack and shut down the servers of organizations, institutions, governments, or websites of various security agencies such as the FBI or the CIA.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. The aim of the research was identifying in which government offices ISMS are implemented, according to which standards are developed and certified and gathering information about documentation concerning information security. The article is an extended version of the paper notified at the VIII Scientific Conference „Information Systems In Management”, taking place on 21-22 November 2013.
EN
The beginning of the 21st century is the period of the intensive development of the Western Civilization changing from industrial epoch based on industry and resources to informative epoch where most important issues are information and knowledge. Because of the change, there are new problems and threats which have not existed before. In the industrial world, we are afraid of physical threats – fires, thefts and sabotage. In the world of information, virtual threats must be added as well. Various occurrences where rules of management are not observed can lead to critical situation or crisis and as a result can ruin a particular subject. What is more, computer-related occurrences must also be mentioned. Different occurrences and information security incidents will be taken into consideration in the article, such as serious threats which can cause crisis in organization if suitable management mechanism was not prepared.
7
80%
EN
The chapter presents the most important element of propaganda used as a tool to create attitudes in society. The environmental determinants of information were identified and the scope of information security responsibilities was presented, taking into account such areas as information security, information warfare, disinformation. The main focus was on identifying the components of propaganda, the scheme by which it is implemented, and its socio- historical and cultural determinants. The most important techniques of manipulation used in propaganda as well as the way of identifying propaganda campaigns are presented.
EN
The paper presents the concept of information security in the Polish public administration. The analysis focuses on the legal aspects of this problem. The author describes the present state of legislation and connections with the main standards of information security, especially ISO 27000 family. The summary of the article contains postulates of changes, like promoting participation, using soft law instruments and best practices in order to maintain information security management systems in public institutions at the appropriate level of quality.
EN
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.
EN
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
EN
A sense of security is one of the basic human needs that can be guaranteed by the state using the available methods and techniques. At present, security categories are distinguished where information security has found its place. Due to the role of information and its impact on states, societies and entities, the literature has highlighted this issue. The wide scope of information security and related topics have led to the creation of concepts that do not reflect current knowledge about information security. The aim of the article is to select, among the definitions presented by the doctrine – the definition of information security most aptly capturing its essence. In this work the author used the descriptive methodology, focusing on the comparative analytical method.
EN
Modern human generation, especially the younger generation, in the digital world spends more and more time. Experts in the area recorded a significant increase of interest of people on social networks. On the present, in a frame of the so-called digital contacting the people themselves is to contact online social networks, perhaps the most popular form. Article mentions the risks of leakage and misuse of personal data on such online social networks.
EN
The beginning of the 21st century is the period of the intensive development of the Western Civilization changing from industrial epoch based on industry and resources to informative epoch where most important issues are information and knowledge. Because of the change, there are new problems and threats which have not existed before. In the industrial world, we are afraid of physical threats – fires, thefts and sabotage. In the world of information, virtual threats must be added as well. Various occurrences where rules of management are not observed can lead to critical situation or crisis and as a result can ruin a particular subject. What is more, computer-related occurrences must also be mentioned. Different occurrences and information security incidents will be taken into consideration in the article, such as serious threats which can cause crisis in organization if suitable management mechanism was not prepared.
PL
Artykuł koncentruje się na prawnej ochronie bezpieczeństwa informacji Ukrainy. Poddaje się analizie teoretyczne i prawne podejście do zrozumienia bezpieczeństwa informacji i jego związku z bezpieczeństwem informacyjnym. Określa okresy regulacji prawnych w zakresie relacji informacyjnych i bezpieczeństwa informacji. Szczególną uwagę poświęca ostatnim okresom i dokumentom przyjętym po 2014 r. Analizie poddano zalety i wady doktryny bezpieczeństwa informacji Ukrainy 2017. Określono status i przyszłe sposoby odpowiednich regulacji prawnych.
EN
The article focuses on the legal protection of information security of Ukraine. Theoretical and legal approaches to the understanding of information security and its relation to cyber security are analyzed. There are determined periods of legal regulation in sphere of information relations and information security. Special attention is devoted to the last period and the documents adopted after 2014. The advantages and disadvantages of the Doctrine of Information Security of Ukraine 2017 are analyzed. The status and future ways of relevant legal regulation are outlined.
EN
A state cannot exist without a defined territory, a population living within it, and a government. It is not insignificant for the maintenance of security in the country to ensure the stability of borders, law and order, and the protection of the people residing in the country. The protection applies to nationals as well as to economic immigrants and refugees. It takes place in real-time and in the virtual information space, which is one of the research areas in the security sciences. This article aims to highlight the most important challenges for the Polish migration policy in cyberspace.
EN
In the past several years, trends in both international security and media environments have led to successful securitization of news media. Amid growing debate about “fake news”, disinformation campaigns and hybrid warfare, news came to be viewed as a weapon of contemporary international conflict. Based on Adam Mickiewicz University’s experience of participation in a global education and research program “News Literacy” (devised at Stony Brook University, New York, USA) the authors would like to propose the concept of news security. It is a relatively new sector of security related to the public’s protection from deliberate disinformation and the manipulation of news. This relatively new and promising area of research is strongly connected to the broader concepts of human security and cybersecurity. Access to reliable and truthful information can be viewed as a human right and a precondition for stable and healthy functioning of democratic societies. At the same time, current threats to news security are highly conditioned by technology revolution in media (driven by digitalization and network effects). The article aims to present the concept of news security and its constituting features as another approach to study and practice of both human security and cybersecurity. It also includes insights and experiences derived from the authors’ participation in the “News Literacy” project, focused on critical media education for a better informed public. Analysis presented in the article focuses on identifying key drivers and characteristics of news’securitization taking place globally. The authors examine the statistical data on digitalization and media consumption patterns, as well as analyze a case study of disinformation. A typology of strategies employed by different states to ensure news security is presented and comments on their effectiveness are made.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. Survey questionnaires were sent to all sixteen Marshal Offices in Poland. The aim of the research was identifying in which government offices information security management systems are implemented, according to which standards are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems encountered in the implementation of this system and documentation concerning information security.
18
80%
EN
This article deals with issue of information security of the state. The author analyzes in this context the attributes and functions of the information stating that the modification of information’s attributes causes that it can not fulfill its functions properly. This requires the state to have defensive capabilities (protecting its own information and information systems) as well as offensive (the ability to carry out its own information and disinformation operations).
EN
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages caused by disclosure, modification, destruction or loss of corporate data. Theoretical considerations on the subject matter have been enriched by the results of conducted empirical research. They answer the following question: What categories of information security threats are associated with the human factor.
PL
Z uwagi na fakt wymiany informacji organizacje zachęcane są do utworzenia skutecznego systemu bezpiecznego przepływu informacji, który powinien być na bieżąco sprawdzany, aby zminimalizować ryzyko pojawienia się zagrożeń. Dzięki nowoczesnym rozwiązaniom technicznych systemów zabezpieczeń jest to dużo bardziej możliwe i dostępne niż jeszcze kilka lat temu. W tym celu niezbędna jest właściwa identyfikacja i klasyfikacja zagrożeń. Stanowi to punkt wyjścia do rozważań dotyczących roli i istoty ryzyka. Artykuł zwraca uwagę na aspekty związane z zapewnieniem bezpieczeństwa informacji jako całości i ochrony danych – najważniejszego dobra jednostek gospodarczych.
EN
Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection – the most important assets of business entities.
first rewind previous Page / 4 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.