Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
2
100%
EN
When examining security issues, the issue of war cannot be omitted, which is a source of enormous suffering, but also an incentive for technological innovation or a catalyst for social and political change. Although in the last decades the number of wars and their intensity has decreased, it still seems that they need a huge amount of money. It is also expensive to create weapon systems to ensure victory if a war occurs in the future. Discussions on what a war currently is are accompanied by the belief that it is distinctly different from wars in the past. Every age created its own art of war, which has changed in terms of measures, principles, and methods of fight over the centuries. The aim of the article is to present new tools and ways of conducting military action in the face of new threats in the 21st century. In addition to describing the new conditions of warfare, non-state irregular armed forces as participants of modern armed conflicts has been presented. In the study, the topic of using modern technology, unmanned detection and destruction systems, precision weapons and stealth technology has also been explored.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.