Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 36

first rewind previous Page / 2 next fast forward last

Search results

Search:
in the keywords:  cyber security
help Sort By:

help Limit search:
first rewind previous Page / 2 next fast forward last
EN
Together with the development of new information technologies it is necessary to take actions the aim of which is to provide protection of ICT (information and communications technology) systems. Cyber security is mainly ensured by suitable systems with the installed software for counteracting cyber attacks, as well as by cyberspace-related legal regulations.In order to check the condition of cyber security, an analysis of ICT protection has been made in selected countries. The assessment of cyber security has been based on the analysis of work principles of military services, which, because of the type of the information possessed, are very rarely eager to show their potential in the area of information protection. The safety of stored and processed military data is currently an essential element because of the constant growth of reported cases of attacks on these data. Activities aiming at cyber space protection are undertaken also in Poland, and this is reflected in plans and programmes being created, as well as in the policy of protection of ICT critical infrastructure resources. In Poland the Ministry of National Defence is also engaged in the process of protection against computer incidents. It means that computer systems able to respond to computer incidents and protect the ICT critical infrastructure are built. Providing cyber security also requires analysing the legal aspects which regulate the issues of taking retaliatory actions against the ICT network of the opponent. The description of the legal aspect has been made on the basis of the analysis of the act in states of emergency, as well as a state of natural disaster, which regulate the concept of an external threat and of cyberspace. The analysis of cyber security will make it possible to indicate factors which are necessary to fight the opponent by means of the Internet. Moreover, the results of the present condition of cyberspace security will be compared to the expected one, which will allow formulation of conclusions to be applied for the effective detection and elimination of computer incidents.
XX
We can certainly say that identity theft on the Internet is a growing criminal phenomenon. The perpetrators’ actions are most often motivated by financial gain. The article discusses selected issues concerning so-called Internet fraudsters. In particular, it draws attention to the actions taken in cyberspace and the risks that accompany such decisions. I point out that the most vulnerable to identity theft are elderly people who do not even know basic security procedures. The article not only draws attention to the dangers themselves but also describes the way criminals act. It also states that in order to minimize the risks faced by network users, attention should be paid to training needs related to with security in cyberspace. An important aspect of this is to draw attention to the risks associated with personal data improperly stored on electronic media integrated into the Internet.
EN
Ensuring cyber security in scope of cyber defense is currently among the top priorities of the EU Common Security and Defense Policy (CSDP). Matters included in scope of cyber defense are a competence of the Member States and cooperation at EU level in this area is governed by decisions of the EU Council based on unanimity. This means that the European Parliament (EP) in the field of cyber defens acts only as an opinion-forming body expressing its position through the adoption of non-legislative resolutions. The aim of the article is to analyze the content of these resolutions and present the EP’s opinion on the challenges facing the EU in the field of cyber defense. It should be stressed that the EP is the EU body that strongly emphasizes the need for a common EU approach to these issues. Given that the area of cyber defence is subject to intergovernmental cooperation mechanisms, the EP considers that the EU needs to develop not only cooperation and coordination mechanisms at the level of its institutions, but also to take action to enhance the EU’s capability to counter cyber threats. These significant cyber defense capabilities should be essential elements of the CSDP and of the development of the European Defense Union, as it is becoming increasingly difficult to counter cyber attacks for the Member State level alone. The role of the CSDP should be to ensure that the EU, in cooperation with NATO, has an autonomous strategic capability to act in the field of cyber defense.
Cybersecurity and Law
|
2023
|
vol. 10
|
issue 2
133-155
EN
This article aims to present the different approaches of countries around the world regarding the legal regulations of cyberspace. The creation of a unified legal system for cyberspace will be a difficult process due to major conflicts of interest. International organizations such as the EU and NATO, which bring together countries that have a similar vision of the world and how it should function, contribute to the unification of legal norms governing cyberspace in specific countries. On the other hand, vague initiatives of the world’s largest organization – the UN as well as the lack of implementation of newly adopted regulations by all member countries, unfortunately slow down the fight against cyberterrorism and cybercrimes that are transnational in nature. All countries around the world are increasing financial investment in improving information networks, creating new institutions to combat threats in the digital space and adapting laws to a dynamically changing world.
PL
W pierwszej części artykułu przybliżony został problem odpowiedniego zabezpieczenia dzieci i młodzieży od zagrożeń występujących w cyberprzestrzeni. W dalszej kolejności autor pracy przybliżył regulacje „Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022” i zarazem dokonał ich analizy pod kątem zabezpieczenia w cyberprzestrzeni interesu najmłodszych. Intencją autora było m. in. zweryfikowanie czy zapewnienie bezpieczeństwa dzieci i młodzieży w cyberświecie jest dla rządu polskiego priorytetem, czy może jednak problem ten jest zupełnie ignorowany? Analiza poprzedzona jest przedstawieniem status quo polskich regulacji prawnych stojących na straży bezpieczeństwa dzieci i młodzieży w cyberprzestrzeni. W podsumowaniu zawarte są wnioski, jakie autor wyciągnął z przedmiotowej analizy.
EN
The first part of the article depicts the problem of adequate protection of children and young people against the dangers occurring in cyberspace. Subsequently, the author of the paper described the 'National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022’ ańd at the same time ańalysed it iń terms of securing in cyberspace the interests of the youngest. The intention of the author was, among other things, to verify whether ensuring the safety of children and young people in cyberspace is a priority for the Polish Government or whether this problem is completely ignored. The analysis is preceded by the presentation of the status quo of Polish legal regulations that protect the safety of children and young people in cyberspace. The final part contains the conclusions the author drew from the analysis of the issue.
EN
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
EN
In the article the conceptual framework of professional training of the future specialists of cyber security in higher education, namely: conceptual idea, the concept of research that includes theoretical, methodological and technological concept are investigated. The analysis of experience of modeling, designing and evaluating of education systems, their implementation in current scientific research on pedagogy of higher education is conducted. The leading idea is based on the concept of integrated application and interaction of methodological approaches, determining the content of component structure of professional competence of the future specialists in cybersecurity. The theoretical concept covers scientific research used to justify the theoretical foundations of the system of professional training of the future experts on cyber security taking into account native and foreign experience. Scientific research is based on the principles of continuity, professional predictive focus, diagnostically technology and education. The organization of training of the future experts on cyber security in higher education is defined as a system of grounded pedagogical actions, targeted measures, structured according to the general laws of pedagogical and didactic principles for theoretically grounded and experimentally proven methodological approaches. The methodological concept includes integrated interaction and correlation of general and specific scientific methodological approaches to formation of content and organization of training of the future experts on cyber security in higher education: humanistic, learner-oriented, systematic, integrated, active, competence, analytical and information. Technology concept includes provisions to develop and implement innovative educational and information technology for the formation at a higher education institution of professional competence of cyber security, providing legal, organizational and technological components. It is claimed that structure forming in organization of the system of professional training of the future professionals on cyber security in higher education is motivational, epistemological, praxeological, information-technological, monitoring, evaluative and reflective components. The content of professional training and professional activities of the future professionals on cyber security according to the modern needs of society are highlighted.
EN
The development of civilisation has created a new, previously unknown environment called cyberspace. The creationof this new environment determines activities for its protection. One of the most important changes in the contemporary securityenvironment is the emergence of cyberspace as a new field of activity of the state and citizens. This change means the state mustbe prepared for threats which it has not had to deal with before. In a globalised world, such actions must be taken togetherwith the international and European community. The article presents the contemporary descriptions of cyberspace, cyber security,cybercrime and the initiatives taken by the state — the Republic of Poland — in order to meet the challenges posed by the newthreats associated with them. It presents measures to identify these, prevent them and eliminate their consequences. It revealsthe actions taken by the highest authorities, central administrative bodies, state audit organisations, security formations, as wellas within the scientific and research environment. In particular, it focuses on the activities undertaken by the Internal SecurityAgency and the Police. A developed model of cooperation between authorities responsible for the security of cyberspace is presented.Also presented are the initiatives taken by the Polish police to counter ever growing and evolving cybercrime. These includecooperation with Interpol and Europol, not only in combating the phenomena, but also in the area of training. As a consequence,the article shows interdependencies arising in the area of cyber security, including activities of state institutions at the nationaland international levels.
EN
The public service sector is a key target of cyberattacks. In order to prevent and effectively tackle such attacks, organisations should continuously develop their defence capabilities. As part of developing such capabilities, public service cybersecurity training is required to teach students about cyberattacks. The present study uses quantitative research techniques including (i) how to identify key requirements for the practical aspects of public service cybersecurity training and (ii) sampling to utilise international best practices from cybersecurity education and conceptual architectures from existing public service organisations. A schematic structure with a two-level practical training course is proposed. On the first level, the students learn about the defence mechanisms of their own info-communication devices and try to prevent attacks in a simulated environment. On the second level, the students apply protection strategies against cyberattacks in organisational infrastructure. Finally, a technical framework is defined to simulate cyberattacks against (a) personal devices and (b) a fictional organisational infrastructure. The specification of a public service cybersecurity training programme should not only focus on theoretical education but also provide practical knowledge to students. By simulating specific attacks, theoretical and practical knowledge can be combined. As a result, students will be able to recognise threats and potential risks from cyberspace.
EN
When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks, terrorism, identity theft, ransomwares and so on. Even “old types” of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security’s prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.
Cybersecurity and Law
|
2022
|
vol. 7
|
issue 1
27-36
EN
New technologies are, in the world of advancing processes of globalization, scientific and technical revolution, one of the most important indicators for designing many areas of social life. The useage of information technology has initiated many social phenomena generating many previously unknown concepts, threats, and in response, new areas of expert and research interest. One of them is cyber security, which focuses on building national, European or international policies to secure the functioning of information systems. The aim of this paper is to analyze and evaluate cyber security from the perspective of a user of new technologies. The applied research method will be a synthetic and analytical analysis of domestic and foreign literature in the field of new technologies and cyber security.
13
70%
EN
Dynamic development of the Internet since the end of the 20th century, despite its indisputable advantages, opened new challenges to the security of states. The first major cyber-incidents took place in the 1980s and 1990s. Later on they evolved into organized, harmful activities both of states and non-state actors. A breakthrough in this respect took place in 2007, when Estonia became the first country to be massively attacked by politically motivated hackers. It proved that the North Atlantic Treaty Organization was not prepared to fight these unconventional threats. Over the next six years, NATO elaborated a new cyber security policy based on the awareness that ICT technologies are increasingly important for the international environment. This process was accompanied by the development of new structures and institutions, which were tasked to fight cyber attacks. On the one hand, in this context, it is important to underscore that NATO has employed the proper way of countering theses challenges. On the other hand, however, it did not address multiple, still valid dilemmas concerning, among others, the interpretation of article 5 of the Washington Treaty. Finding a way to solve these problems will determine the security of the Euro-Atlantic community in the future.
EN
The subject of cyberprostitution reflectsthe growing number of socio-political problems stemming from the dynamic development of cybertechonology and its expansion into every area of human life. In the age of cyberrevolution, there is an increase in the number of pornographic social networking sites. The sex industry quickly adopted all new information technologies to increase young people’s access to pornography. As a result of the link between the internet and the sex industry, the border be-tween the current phenomenon of prostitution and its form in cyberspace has blurred. This article, based on the study, discusses the main motivational factors that contribute to the growth of prostitution. The differences between prostitution in the real and virtual worlds are also indicated. The purpose of the study is moreover to show some disturbing phenomena that may have a negative impact – not only on the emotional development of man – but also on shaping future civil society.
Rozprawy Społeczne
|
2016
|
vol. 10
|
issue 3
71-77
PL
Dynamiczny rozwój technologii teleinformatycznych przyczynił się do powstania nowego pola aktywności, jakim jest cyberprzestrzeń. Jest to jedna z najważniejszych zmian w środowisku bezpieczeństwa, niosąca zupełnie nowe zagrożenia, a przez to wymagająca nowych uregulowań, zabezpieczeń i informacji celem zapewnienia bezpieczeństwa państwa, instytucji i osób korzystających z cyberprzestrzeni. W dobie globalizacji cyberprzestrzeń, która nie zna granic może być polem konfliktu wrogich państw, zorganizowanych grup przestępczych, ekstremistycznych, terrorystycznych, hakerów, oszustów, a nawet pedofilów. Jak widać stawka może być bardzo wysoka, od bezpieczeństwa infrastruktury krytycznej, poprzez wyniki finansowe przedsiębiorstw, szeroko rozumiane bezpieczeństwo obywateli, a nawet dzieci.
EN
The dynamic development of Information and Communications Technology (ICT) contributed to the emergence of a new field of activity; that is cyberspace. It is one of the most important changes in the safety environment that carries a completely new security threat and, therefore, requires new regulations, protection and information to assure security of the institutions and people who use cyberspace. In the era of globalisation, cyberspace does not have any barriers, which can lead to many conflicts between hostile states, gangs, terrorists, extremist groups, hackers, the frauds or even paedophiles. Thus, as one can see, the stakes are high when it comes to securing critical infrastructure or financial companies’ results as well as citizens’ safety, including children.
EN
In this paper we present selected European research projects focusing on future ideas, needs and trends for cybersecurity technologies and protection of personal data. FP7 CAMINO (Comprehensive Approach to cyber roadMap coordINationand develOpment) project is focused on the future actions that should be carried out in order to further enhance the protectionof the cyberspace. In the CAMINO project, we follow the comprehensive approach looking at broad range of possibletechnologies and problems. We termed our approach as THOR, since we considered the following dimensions: Technical, Human,Organisational and Regulatory. In this paper we also present DG HOME CIPHER (Integrated cyber-security framework forprivately held information systems and the European roadmap) project and its practical framework to enhance cyber securityand privacy. The major outputs of the project and contribution to the paper is the framework and its description, comparisonto other standards as well as practical aspects of its implementation. The framework is developed for ICT systems and forPrivacy Held Information Systems in particular- this term will be used in the paper to describe ICT systems containing personalinformation and data.
18
Publication available in full text mode
Content available

OPSEC Model and Applications

61%
EN
OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army’s operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles, steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.
EN
The paper presents knowledge in the field of professional and legal implementation of building a strong cyber security of the European Union at the national level of a Member State, in the context of the implementation of a new legal norm on cyber security of the state. Part of the expert knowledge is the implementation of the law and the response to the praxeological problems of cyber security in the critical infrastructure sectors, including the TRANSPORT sector, resp. Air transport, as part of flight education.
EN
The period of the 21st century is unprecedented in terms of developments in technology. Users of cyberspace must proactively use security preservation practices to be realistically effective and noticeable. The purpose of the article was to study the impact of rapidly advancing digitization on the cyber security of ICT systems and the awareness of their users in this regard. From the research, it was clear that there are several areas of cyber security in which steps should be taken to increase public awareness. The main area is awareness that any Internet user can be a potential target of a cyber attack. Another important area that was highlighted during the analysis of survey responses is the blatant password management policies practiced by Internet users. The following research methods and techniques were used in the article: survey method, induction method as a form of going from the particular to the general, deduction method as a form of generalization and inference, analysis of literature and statistical data. The topics discussed in the article indicate the need to conduct and develop research on how society responds to changes in cyberspace.
PL
Okres XXI wieku jest bezprecedensowy, jeżeli chodzi o rozwój w obszarze technologii. Użytkownicy cyberprzestrzeni muszą proaktywnie korzystać z praktyk związanych zachowaniem bezpieczeństwa, aby były one realnie skuteczne i odczuwalne. Celem artykułu było zbadanie wpływu dynamicznie postępującej cyfryzacji na cyberbezpieczeństwo systemów teleinformatycznych oraz świadomości ich użytkowników w tym zakresie. Przeprowadzone badania jednoznacznie wskazują, iż istnieje kilka obszarów cyberbezpieczeństwa, w których należałoby poczynić kroki mające na celu zwiększenie świadomości społeczeństwa. Główny obszar stanowi uświadomienie, że każdy użytkownik Internetu może być potencjalnym celem ataku cybernetycznego. Kolejnym istotnym obszarem, który został uwidoczniony podczas analizy odpowiedzi na pytania ankietowe, jest rażąca polityka zarządzania hasłami praktykowana przez użytkowników Internetu. W artykule wykorzystano następujące metody i techniki badawcze: metody ankietowe, metody indukcji jako formy przechodzenia od szczegółu do ogółu, metodę dedukcji jako formę uogólniającą i wnioskową, analizę literatury oraz danych statystycznych. Poruszana tematyka w opracowaniu wskazuje na konieczność prowadzenia oraz rozwoju badań nad sposobem, w jaki społeczeństwo reaguje na zmiany zachodzące w cyberprzestrzeni.
first rewind previous Page / 2 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.