Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cyber defence
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
Cybersecurity and Law
|
2023
|
vol. 9
|
issue 1
155-166
EN
The subject of this article is a discussion of the legal provisions governing the Israeli and international legal systems governing the control of trade in cyber-surveillance tools. A detailed analysis of the current regulations is carried out with a view to classification and pointing out imperfections in the content of the current regulations. The author identifies the transformations in the content of the Wassenaar Arrangement, which resulted in an attempt to regulate this matter more comprehensively in Israeli law in 2016. Using the impact of the international NSO software scandal as an example, the role that an effective export control regime, including international regulation, plays in preventing cyber-surveillance tools from being used in ways that are dangerous to internationally recognized values is demonstrated.
EN
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
EN
Based on a review of diff erent analytical frameworks, it is suggested to run a table top cyber wargame when trying to analyse the eff ects of closed national networks being imposed in the near future. Th e scope of the wargame is to extract results to show how the resilience of an open national network diff ers from a closed national network. It is self-evident that the formation process of resilience is diff erent between the diverse systems. Th e proposed wargame is a two-sided cyber table top wargame. Th e wargame is based on at least two blue teams, at least one red team and a control team (namely a white team). One blue team is located in the closed national networks and its system relies on closed national network infrastructure. Th e other blue team operates its system within open network society. By designing, constructing and executing the proposed cyber wargame we argue it is possible to fi nd these diff erences and similarities as well. Current research improves cyber situation awareness and proposes a direction to be followed when trying to understand the changing circumstances of the cyber space. It also suggests how the research resources could be directed when trying to improve the situation awareness of the closing process.
SK
Informačná technika sa rozvíja mimoriadne významným spôsobom. Stala sa na jednej strane strategickým prostriedkom priemyslu, administratívy, bankového sektoru, ale napríklad aj ozbrojených síl. V posledných rokoch sa ukazuje, že hoci digitálny svet prináša obrovské výhody, je aj zraniteľný. Incidenty v rámci kybernetickej bezpečnosti , či už úmyselné, alebo náhodné, narastajú alarmujúcim tempom a mohli by narušiť poskytovanie základných služieb, ktoré považujeme za samozrejmé, ako je zásobovanie vodou, zdravotná starostlivosť, dodávka elektrickej energie alebo mobilné služby. Hrozby môžu mať rôzny pôvod – vrátane zločineckých, politicky motivovaných, teroristických alebo štátom podporovaných útokov, ako aj prírodných katastrof a neúmyselných chýb. Rozvoj informačných a komunikačných technológií má teda aj svoju tienistú stránku. Kybernetický priestor, tak ako svet fyzický, ponúkol možnosť realizácie sa negatívnej stránke človeka, ktorá má za následok vznik nových bezpečnostných hrozieb.
EN
Information technology is developing extremely significant. It has become the one of the strategic means of industry, administration, banking sector, but also the armed forces. In recent years, it appears that although the digital world brings enormous benefits, is also vulnerable. Incidents within the cyber security, whether intentional or accidental, are increasing at an alarming rate and could disrupt the delivery of basic services that we take for granted, such as water supply, health care, power supply and mobile services. The threats may have different sources - including criminal and politically motivated terrorist or state-supported attacks as well as natural disasters and unintentional errors. The development of ICT has therefore without its drawbacks. Cyberspace as a physical world, offered the possibility of carrying out the negative side of man, which has resulted in the emergence of new security threats.
EN
In this article, the authors focus on evaluating the amendment to the Military Intelligence Act, which legislatively anchors the regulation of cyber defence and entrusts it to Military Intelligence. First of all, they define the terms cyber security and cyber defence in accordance with the Czech understanding and follow the legislative journey of the amendment (especially the fate of the unsuccessful first bill). Subsequently, they focus on the suitability of the Military Intelligence as the entity responsible for cyber defence while comparing it with other potential entities, namely the National Cyber and Information Security Agency, the Czech Army and other intelligence services. In the next section, the authors then focus on analysing the legal regulation of selected aspects of cyber defence in terms of the proportionality of individual interventions and the risks of power accumulation. As a first of those, they focus on the detection of cyber-attacks and threats, which was one of the most problematic aspects of the first draft. They then discuss the position of the Cyber Defense Inspector as one of the guarantees of proportionality of the new Military Intelligence powers and conclude the analysis with a brief discussion on the power of active intervention.
CS
V rámci tohoto článku se autoři soustředí na zhodnocení novely zákona o Vojenském zpravodajství, která legislativně ukotvuje právní úpravu kybernetické obrany a svěřuje ji do působnosti Vojenského zpravodajství. V první řadě se věnují vymezení pojmů kybernetická bezpečnost a kybernetická obrana v českém pojetí a sledují legislativní pouť zmíněné novely včetně neúspěšného prvního návrhu. Následně se zaměřují na vhodnost Vojenského zpravodajství jakožto subjektu odpovědného za materii kybernetické obrany, přičemž provádí porovnání i s dalšími potenciálními subjekty, konkrétně Národním úřadem pro kybernetickou a informační bezpečnost, Armádou ČR a dalšími zpravodajskými službami. V další části se pak zaměřují na analýzu právní úpravy vybraných aspektů zajišťování kybernetické obrany z pohledu proporcionality jednotlivých zásahů a rizik kumulace moci. V první řadě se věnují detekci kybernetických útoků a hrozeb, což představovalo v případě prvního návrhu jeden z nejproblematičtějších aspektů. Poté se věnují institutu inspektora pro kybernetickou obranu jakožto jedné ze záruk proporcionality v rámci nových pravomocí Vojenského zpravodajství. Analýzu zakončují stručným pojednáním o aktivním zásahu.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.