Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 6

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Cybersecurity
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

Was stuxnet an act of war?

100%
EN
Modern societies live in the complex and fragile information environment, in which data processing and exchange grow exponentially. Different digital computerized systems support most of key infrastructures like financial systems, power and water supplies, air traffic management, public and military communications. To increase accessibility to those systems in the information domain, it requires interoperability and interconnectivity which makes them complex to maintain and vulnerable to cyber-attacks/intrusions. The Internet is an ownerless, ubiquitous and open to all information exchange domains which can shape the international relations through the cyber domain and there is no internationalentity that can control and affect the data flow. Each country has its own legislation to react and influence local users through Internet service providers and only close cooperation among the states can help to identify and prevent illegal activities against other states as well as support foreign countries during investigations. The paper will uncover how cyber weapon was used to influence state struggling, becoming a nuclear power for the first time. It is divided into two parts to explain the essence of the act of war and cyberspace to understand the environment where Stuxnet was applied. Next it will focus on impact and reaction of Stuxnet in order to analyse its utilization within cyberspace.
Cybersecurity and Law
|
2022
|
vol. 7
|
issue 1
110-129
EN
In this paper I thoroughly discuss the possibility of committing crimes which would fall under the Rome Statute, with regards to the very notion of cybersecurity. I conclude that we need extensively empirical research and solution to many aspects pointed out in my paper. First, we need to find an acceptable definition of cybersecurity to work with this process, and in order to understand the world and possibilities it creates for us. Furthermore, the 1998 Rome Statute needs an update, because the world of the internet creates opportunities never seen before, and the international case law is unable to cope with such distinct acts. Therefore, I believe that we need to find the next „Nuremberg Trials”, the next generational solution to a world and crimes never seen before. We need the theoretical and legal revolution which did come after the World World II, and after the ICTY, ICTR and Sierra Leone ad hoc Courts. I truly hope that this short and hence mashup summarizing paper is just an indicator of papers and conferences to come, with solutions and more and more ideas on how we solve these two phased problems, namely having to find 1. An ultimate definition for cybersecurity 2. Having a solution of how to interpret it to the classical notion of International Criminal Law. if we conclude that we are unable to handle this issue, I suggest to create a panel on international or V4 level on either the reorganization of customary international criminal law under the Rome Statute or on the ever-changing definition of cybersecurity.
EN
The article purpose is to study digitalization of certain phases of Ukraine electoral processes, taking into account the European Union experience. The research design consists in a comparative analysis of electoral processes digitalization and its legislative provision. The article describes the legal field of EU electoral processes. The recommendations of the Council of Europe on e-voting standards are considered. The role of the administrator of the Ukraine State Voter Register is considered. The phases of electoral processes that require gradual digitalization are given. Scientific novelty of the study is to use a comparative approach in studying the electoral law of the EU and Ukraine. The research field is limited to the electoral law of the EU and Ukraine. The practical effects of the study make it possible to identify the advantages and disadvantages of digitalizing the phase of the electoral process. The scientific novelty of the study conducted in this article is to study the digital transformation restrictions at individual stages of electoral processes. The fundamental provisions in Ukrainian legislation on digitalization of electoral processes are determined. The article summarizes that the widespread means of electoral processes digitalization is the formation and updating of the voters registers and conducting their statistics. The author revealed that electoral processes digitalization has a fragmentary character in the EU countries, since the legal field in providing cyber security requires continuous improvement.
4
Content available remote

Cybersecurity and the Internet of Things

63%
EN
PURPOSE/THESIS: The purpose of this paper is to use a recent cyber-attack to highlight the current state of readiness of Internet of Things (IoT) technologies with regard to security vulnerabilities as well as fundamental – in the author’s opinion – changes that will need to take place within these industries and technologies to mitigate the overall cybersecurity risk. APPROACH/METHODS: The analysis of the findings from numerous existing published security studies. RESULTS AND CONCLUSIONS: The following conclusions were reached: (1) in the world becoming more and more interconnected through the web enabled devices (IoT devices), new forms of security threats have been developed; (2) at present IoT devices introduce a high level of vulnerability; (3) many of these risks may be mitigated with already existing technologies; (4) however, due to the fragmented and heterogeneous nature of the IoT devices, the implementation of even basic levels of security is more challenging than in the case of traditional Internet connected devices (e.g. personal computers); (5) the industry needs to face and address three key issues that will in turn help to mitigate the unique security threats posed by IoT devices, namely: the drive towards open standards, the industry cooperation and consolidation, and the improvement of consumer awareness. ORIGINALITY/VALUE: The value of the research is to highlight the security issues related to the Internet of Things and propose solutions that must be implemented to increase the level of security awareness within the IoT environment.
PL
CEL/TEZA: Celem artykułu jest wykorzystanie przykładów niedawnych cyberataków do przedstawienia obecnego stanu przygotowania technologii Internetu Rzeczy (IoT) wobec zagrożeń bezpieczeństwa oraz podkreślenia fundamentalnych, zdaniem autora, zmian, które muszą nastąpić w przemyśle i technologiach IoT, aby zminimalizować ogólne ryzyko związane z cyberbezpieczeństwem. KONCEPCJA/METODY BADAŃ: Problem przedstawiono w artykule na podstawie analizy i interpretacji wyników badań dotyczących cyberbezpieczeństwa, opublikowanych w licznych studiach i sprawozdaniach. WYNIKI I WNIOSKI: Wnioskami z tej analizy są następujące kluczowe kwestie: (1) w świecie, w którym urządzenia są coraz silniej z sobą powiązane poprzez łącza internetowe (urządzenia IoT, Internetu Rzeczy) powstały nowe formy zagrożenia bezpieczeństwa; (2) obecnie urządzenia te są w dużym stopniu podatne na ataki; (3) istnieją dziś technologie, które można zastosować, aby złagodzić wiele spośród tych zagrożeń; (4) jednakże, ze względu na rozdrobniony i heterogeniczny charakter urządzeń IoT, zapewnienie nawet podstawowego poziomu bezpieczeństwa jest znacznie większym wyzwaniem niż w przypadku tradycyjnych urządzeń podłączonych do Internetu (np. komputerów osobistych); (5) przemysł musi skierować uwagę na trzy podstawowe zagadnienia, które pomogą zmniejszyć te szczególne zagrożenia bezpieczeństwa stwarzane przez urządzenia IoT, tj.: wykorzystanie otwartych standardów, współpraca i konsolidacja przemysłu, poprawa świadomości konsumentów. ORYGINALNOŚĆ/WARTOŚĆ POZNAWCZA: Artykuł służy naświetleniu problemów bezpieczeństwa związanych z Internetem Rzeczy oraz zaproponowaniu pewnych rozwiązań, które należy wprowadzić, aby zwiększyć poziom świadomości bezpieczeństwa w środowisku IoT.
EN
Global cybercrime is exploding geometrically. The traditional methods of securing cyber systems via complex passwords frequently fail, exposing the computer systems to many types of cybercrimes. Cybercrime of all kinds is a growing concern for individuals, government and business organizations, and society. Zero Identity is a new technology that "bubbles, cloaks, and hides" computers and their contents from cybercriminals. Zero Identity is a mature and proven military-based technology with over a 20-year history. Cylentium, a cybersecurity startup, is adapting Zero Identity technology to consumers and civilian organizations. Market and technological acceptance of Zero Identity may lead to a cybersecurity paradigm shift in the next decade. This paper explores the history of Zero Identity, what it does, how it works, and its future prognosis. One of the original developers (Rob Langhorne) of the Zero Identity concept was interviewed, as was the concurrent entrepreneur (Wayne Ronhaar). Both Langhorne and Ronhaar became coauthors of this article to contribute their first-hand historical perspectives, challenges, and insights to transform technology into a commercial product in a series of articles.
PL
Według raportu Cisco zagadnienia takie jak cyfryzacja, bezpieczeństwo IT oraz Internet rzeczy to zjawiska, które wyznaczały kierunek rozwoju poszczególnych branż gospodarki w 2016 r. i będą szczególnie istotne w przyszłości. Wśród nich znajduje się Internet rzeczy, wobec którego oczekuje się, że znajdzie wiele zastosowań w różnych dziedzinach, m.in. w energetyce, transporcie, przemyśle, opiece zdrowotnej. Jego zastosowania usprawniają nasze życie, ale stwarzają też nowe zagrożenia i stanowią wyzwanie dla architektów systemów bezpieczeństwa. Eksperci są zdania, że problemy z bezpieczeństwem IT sprzed lat powracają obecnie w nowych urządzeniach i dają hakerom wiele możliwości do cyberataków. Celem artykułu jest przegląd wybranych przypadków użycia Internetu rzeczy, opis zagrożeń dla cyberbezpieczeństwa wynikających z poszerzania dostępu do sieci nowych urządzeń, a także przegląd istniejących zabezpieczeń.
EN
According to the Cisco report, issues such as digitization, IT security and the Internet of Things are phenomenon, which determined the direction of development of the economy sectors in 2016 and will be particularly important in the coming years. Among them is the IoT which is expected to find many applications in various areas, like energy, transport, industry, construction, health care. Its applications enhance our lives, but also pose new threats and is a challenge for IT security architects. Experts think that the IT security problems from the past return now with new devices and provide many opportunities for hackers to cyberattacks. The aim of the article is a review of selected cases of the usage of the IoT, description of threats to cybersecurity resulting from widening access of new devices to the Internet, and an overview of the existing safeguards.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.