Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 133

first rewind previous Page / 7 next fast forward last

Search results

Search:
in the keywords:  cybersecurity
help Sort By:

help Limit search:
first rewind previous Page / 7 next fast forward last
EN
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
EN
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of evidence of unauthorized interference. The results show that to protect the critical infrastructure facilities from cyberattacks, developed and implemented national cybersecurity standards must be developed in Ukraine, in particular for automated control systems of critical infrastructure facilities.
Cybersecurity and Law
|
2020
|
vol. 3
|
issue 1
93-101
EN
The COVID-19 pandemic has significantly influenced the functioning and organisation of financial institutions in Poland and the cybersecurity mechanisms associated with it, due to the change in the model of functioning of these institutions. Changes to the way institutions function have been introduced under the influence of evolving restrictions and regulations, often in a manner which went beyond previously planned scenarios of action. The experience gained in this way should be included in the business continuity plans and procedures of financial institutions. It is also worth considering what changes should be permanently implemented by financial institutions, and what adaptations in the field of cybersecurity will be required. These adjustments should take place in interaction with the Polish Financial Supervision Authority, to maintain an appropriate level of security and quality of services rendered.
4
100%
EN
Because of the asymmetric nature of cyber threats and the dynamics of their evolution, there is a tendency for a growing role of security cooperation activities in cyberspace through joint efforts of states and non-state actors in international relations. New challenges and threats caused by the global pandemic are linked with an increased internet activity. The recent spread of fake news related to COVID-19 illness caused by SARS-CoV-2 coronavirus might be seen as part of sharp power disinformation strategy applied by state actors. International organisations serve as a forum for discussion to disseminate and analyse knowledge about cybersecurity and the effects of cyber threats, they are at the same time creators of common principles of prevention, legal and institutional solutions, and are complementary to the activities of states in this field. By adopting the regional level of analysis as its methodological perspective, the article shows a natural evolution of cybersecurity means from the time of the 1990s and early 2000s when the focus was set on computer and cyberspace as a tool of serious and organised crime, through the stage when computer crime was endangering cyberspace of the EU Member States, to the period when finally the EU objectives were to achieve an open, safe and secure cyberspace keeping in mind the importance of raising awareness and acquiring skills and knowledge how to avoid or face cyber threats. At the early stages of establishing the EU cybersecurity policy, the documents focused on definitions and identifications of threats and trends. Later stages included organising institutional and legal framework, and setting up specialised institutions, centres and teams. Not only did the understanding of cyber-related issues changed but also the response of the EU to cyber threats. The transition is from the soft law instruments (recommendations) such as guidelines, communications, declarations, roadmaps, actions plans, and strategies towards more hard law instruments (obligations) such as directives and other legislative acts. The character of directives has also changed – from directives on cyber-related issues to those characterised as cyber-oriented, each being more ambitious than the previous one. The complete appraisal of the effectiveness of the EU cyber security policy is impeded by a specific nature of cyberspace and its security, as well as problems with gathering appropriate data.
The Lawyer Quarterly
|
2018
|
vol. 8
|
issue 2
165-188
EN
The issues related to cybersecurity are being amplified by the growing role of the Internet of Things devices in current digital economy. The focus of this contribution is to examine the challenges of IoT environment for the corporate cybersecurity from the legal perspective with regards to the specific role of small and medium enterprises. It provides an introduction into the environment of SMEs and the transformation of their operations through new technologies, followed by highlights of the cybersecurity challenges brought by the IoT. Core part of the contribution is an analysis of the applicable legal frameworks and discussion of the broader picture with regard to this specific perspective on the regulation of corporate cybersecurity.
7
100%
Cybersecurity and Law
|
2021
|
vol. 6
|
issue 2
91-101
EN
In my article, I would like to describe the history of cybersecurity related to nuclear safety, to answer the question of what cybersecurity is and how the development of cybersecurity was related to the development of nuclear safety and nuclear systems. Continuing, I will also describe the cyber risks associated with nuclear systems. I would also like to try to make recommendations for cybersecurity related to nuclear safety. I would also like to try to make recommendations for cybersecurity related to nuclear safety
Cybersecurity and Law
|
2022
|
vol. 8
|
issue 2
105-112
EN
Effective support for measures to protect ICT systems against cyberthreats is possible through the use of appropriate incentive schemes to motivate people hired by entities concerned with matters of cybersecurity. One such incentive involves an ICT benefit, paid from the Cybersecurity Fund managed by the minister competent for computerisation.
EN
The purpose of the Computer Security Incident Response Teams is to ensure a coherent and complete system of risk management at the national level and, therefore, they have been obliged to perform tasks to counter cybersecurity threats of cross-sectoral and cross-border nature, as well as to ensure coordination of handling of reported incidents, i.e. events that have or may harm cybersecurity.
EN
In a contemporary state, cybersecurity is becoming an increasingly important issue. In order for a state to adequately respond to changing threats, it must be a learning organization. Learning about cybersecurity should include specialist knowledge, but also knowledge about cybersecurity shaping the behaviours of the general public and policy makers. Legal regulations are an important instrument of shaping cybersecurity in a learning state.
EN
Civil aviation, similar to other economy sectors, is exposed to cyber-attacks. In this case however, the protection against cybersecurity threats is gaining particular significance, as the industry relies heavily on the use of information systems (information and communication systems with electronic data processed in such systems). The systems are exposed to incidents. Incidents in civil aviation are events occurring in cyberspace which affect, or might potentially affect, the security of aircraft. The issue of cybersecurity in civil aviation is discussed in the context of legal regulations that are in force in Poland and Slovakia. Individual solutions aimed at ensuring the cybersecurity of air transport were analysed.
Cybersecurity and Law
|
2022
|
vol. 8
|
issue 2
17-26
EN
The legislator has awarded the status of being the authority competent for ensuring cybersecurity to the minister competent for computerisation in respect of digital service providers. The minister manages computerisation, a government administration department which entails cyberspace security in the civilian dimension. The range of the official’s activities includes monitoring, information activities and reporting. As a competent authority for ensuring cybersecurity, the minister also no.s decisions on recognising a digital infrastructure sector entity as an operator of essential services.
Cybersecurity and Law
|
2021
|
vol. 5
|
issue 1
45-52
EN
The focus of this article is on planning in the field of cybersecurity. Planning activities in this respect play a vital role, not only in systematising tasks relating to cybersecurity, but also of the authorities whose power extends to these matters. Cybersecurity occupies a special place in the public domain, and it is within this domain that planning is intended to ensure the coordination of activities in emergency situations. The plans which cover cybersecurity allow the prevention and monitoring of threats, and act accordingly as they arise, as well as to effectively remedy the effects caused by them.
EN
Nowadays, ensuring cybersecurity is an important objective of public authority. It must take into account the protection of cybersecurity, both in the current and future perspectives. The state security policy must also take into account its dimension in cyberspace, especially today, where many services are provided through communication and information systems. A special place in the cybersecurity system is given to cyberspace security in the military dimension. In this regard, both the military administration and civil law entities, both acting for defence, will be competent. Effective military operations are directly linked to new digital technologies. As a result, for the sake of state security (both internal and external), it becomes necessary not only to respond to cyberattacks, but also to counteract them.
EN
As the threats from cyberspace to IT systems (information technology) and digital OT systems (operational technologies) using ICT technologies (information and communication technologies) grow exponentially, while at the same time the scale of the use of digital data collecting, processing and sharing for the needs of many national economy areas and to support functioning of the state in terms of, for example, defence, health care, education or citizen services, building awareness of the risks and skills to secure networks, systems and digital services against cyber threats becomes crucial. A new type of structures called ISACs (Information Sharing and Analysis Centres) play an important role in this respect. The co-authors, based on the provisions of the law and their own experience in ISAC-Kolej and ISAC-GIG centers, present the ecosystem around ISAC centers, their tasks and challenges.
EN
The cybersecurity issue discussed in the paper is seen from the perspective of political science with the indication that the subject under discussion concerns the multifaceted nature of the state’s actions, which consists of political, economic, social, and cultural factors. At the same time, the work also intends to prove that cybersecurity is not only a domain of technology because it is the mentioned aspects that shape the conditions of stable development of the state and its citizens in a space dominated by cyber technology in a much more decisive way. Given the growing role of cybertechnology in almost all areas of human life, its importance also forces and inspires political science to question the shape and model of modern policy, which is significantly evolving under the influence of new technologies. On the one hand, emerging cyber threats reveal the weakness of the state and the dependence of state institutions on cybertechnologies, but on the other hand, existing cyber incidents may also motivate many governments to take action to increase the level of cybersecurity.
Cybersecurity and Law
|
2023
|
vol. 9
|
issue 1
215-242
EN
The war that Russia has been waging against Ukraine since 2022 is brutal and described as full-scale, i.e. with the use of all forces and means. In the era of dynamically developing media, information has also become a weapon that is consciously used in this conflict. When reviewing the most important information that was the focus of interest of a large part of the media in Poland during the first half of the year after the Russian attack on Ukraine, it can be stated that the media in Poland extensively inform about the war in Ukraine, but they do not limit themselves to reporting the conflict, they also refer to to disinformation and propaganda, and even touch on the sphere of resentment that is still alive between different countries. The summary of information makes it clear how important the media are in the modern world and that care for their development and securing the media infrastructure is a strategic task of the state.
Cybersecurity and Law
|
2023
|
vol. 9
|
issue 1
48-60
EN
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
EN
This work follows on from two previous articles on the cyber security of the youngest children in international and European law. The article discusses the issue of cyber security of children and youth on the basis of Polish law. The authors start their analysis with the presentation of the provisions of the constitution. Next, the provisions of substantive criminal law and criminal procedure are introduced. The authors then present the laws ratifying the international agreements on the issue of the safety of the youngest children in cyberspace. The summary contains conclusions drawn from the analysis of the overall content of the regulations of both inter¬national and European law, as well as national solutions in the scope of the title.
PL
Niniejsza praca stanowi kontynuację dwóch wcześniejszych artykułów dotyczących cyberbezpieczeństwa najmłodszych w prawie międzynarodowym oraz europejskim. W artykule poruszone zostało zagadnienie cyberbezpieczeństwa dzieci i młodzieży na gruncie prawa polskiego. Autorzy rozpoczynają analizę od przedstawienia przepisów ustawy zasadniczej. Następnie przybliżone zostały zapisy prawa karnego materialnego i procedury karnej. Dalej autorzy przedstawiają ustawy ratyfikujące umowy międzynarodowe dotyczące zagadnienia bezpieczeństwa najmłodszych w cyberprzestrzeni. W podsumowaniu zawarte są wnioski płynące z analizy całościowej treści przepisów zarówno prawa międzynarodowego i europejskiego, jak i rozwiązań krajowych w tym zakresie.
EN
The article presents results of two surveys conducted in groups of students, scout leaders and employees of the Regional Administrative Court. The aim of the research was to recognize the knowledge and views of respondents on selected topics related to cybersecurity, to determine whether there are any significant statistical correlations between the statistical features of the survey participants, and their knowledge (measured by the number of correct answers to questions about cybersecurity) and views on cybersecurity. They surveys also examined the respondents’ habits related to security (such as making back-up copies or using antivirus software) and the relationship between knowledge, behaviour and participation in training courses.
PL
Artykuł przedstawia wyniki dwóch badań ankietowych, przeprowadzonych w grupach studentów, instruktorów harcerskich oraz pracowników Wojewódzkiego Sądu Administracyjnego. Celem badań było poznanie wiedzy i poglądów respondentów na wybrane tematy związane z cyberbezpieczeństwem, stwierdzenie czy istnieją statystycznie istotne związki pomiędzy cechami statystycznymi uczestników badania, a ich wiedzą (mierzoną liczbą prawidłowych odpowiedzi na pytania dotyczące cyberbezpieczeństwa) oraz poglądami na temat cyberbezpieczeństwa. Badano także nawyki uczestników związane z bezpieczeństwem (takie, jak wykonywanie kopii bezpieczeństwa czy używanie programu antywirusowego) oraz związek między wiedzą, zachowaniami a uczestnictwem w szkoleniach.
first rewind previous Page / 7 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.