Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 65

first rewind previous Page / 4 next fast forward last

Search results

Search:
in the keywords:  information security
help Sort By:

help Limit search:
first rewind previous Page / 4 next fast forward last
1
100%
PL
W warunkach gospodarki opartej na wiedzy i w społeczeństwie informacyjnym bezpieczeństwo informacyjne kraju ma coraz większe znaczenie dla bezpieczeństwa w innych dziedzinach życia społecznego, politycznego i gospodarczego. Jednym z istotnych warunków istnienia tego bezpieczeństwa jest zapewnienie dostępności do informacji niezbędnych do efektywnego działania i zachowania się w dynamicznie zmiennym otoczeniu oraz usprawnienie obsługi obywatela i przedsiębiorcy przez administrację publiczną przy wykorzystaniu środków komunikacji elektronicznej . W niniejszym artykule podjęto próbę scharakteryzowania systemów informacyjnych administracji z punktu widzenia ich znaczenia dla bezpieczeństwa informacyjnego państwa.
EN
One of the tasks of the civil state is to ensure that all citizens, subjects of the national economy and state apparatus, information security. In a knowledge-based economy and information society, information security of the country is increasingly im- portant for safety in other areas of social, political and economic. The paper was a preliminary attempt to analyze the impact of IT infrastructure administration in information security.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. Survey questionnaires were sent to all sixteen Marshal Offices in Poland. The aim of the research was identifying in which government offices information security management systems are implemented, according to which standards are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems encountered in the implementation of this system and documentation concerning information security.
3
80%
EN
The chapter presents the most important element of propaganda used as a tool to create attitudes in society. The environmental determinants of information were identified and the scope of information security responsibilities was presented, taking into account such areas as information security, information warfare, disinformation. The main focus was on identifying the components of propaganda, the scheme by which it is implemented, and its socio- historical and cultural determinants. The most important techniques of manipulation used in propaganda as well as the way of identifying propaganda campaigns are presented.
4
80%
EN
This article deals with issue of information security of the state. The author analyzes in this context the attributes and functions of the information stating that the modification of information’s attributes causes that it can not fulfill its functions properly. This requires the state to have defensive capabilities (protecting its own information and information systems) as well as offensive (the ability to carry out its own information and disinformation operations).
EN
The paper presents the concept of information security in the Polish public administration. The analysis focuses on the legal aspects of this problem. The author describes the present state of legislation and connections with the main standards of information security, especially ISO 27000 family. The summary of the article contains postulates of changes, like promoting participation, using soft law instruments and best practices in order to maintain information security management systems in public institutions at the appropriate level of quality.
EN
A state cannot exist without a defined territory, a population living within it, and a government. It is not insignificant for the maintenance of security in the country to ensure the stability of borders, law and order, and the protection of the people residing in the country. The protection applies to nationals as well as to economic immigrants and refugees. It takes place in real-time and in the virtual information space, which is one of the research areas in the security sciences. This article aims to highlight the most important challenges for the Polish migration policy in cyberspace.
EN
In the past several years, trends in both international security and media environments have led to successful securitization of news media. Amid growing debate about “fake news”, disinformation campaigns and hybrid warfare, news came to be viewed as a weapon of contemporary international conflict. Based on Adam Mickiewicz University’s experience of participation in a global education and research program “News Literacy” (devised at Stony Brook University, New York, USA) the authors would like to propose the concept of news security. It is a relatively new sector of security related to the public’s protection from deliberate disinformation and the manipulation of news. This relatively new and promising area of research is strongly connected to the broader concepts of human security and cybersecurity. Access to reliable and truthful information can be viewed as a human right and a precondition for stable and healthy functioning of democratic societies. At the same time, current threats to news security are highly conditioned by technology revolution in media (driven by digitalization and network effects). The article aims to present the concept of news security and its constituting features as another approach to study and practice of both human security and cybersecurity. It also includes insights and experiences derived from the authors’ participation in the “News Literacy” project, focused on critical media education for a better informed public. Analysis presented in the article focuses on identifying key drivers and characteristics of news’securitization taking place globally. The authors examine the statistical data on digitalization and media consumption patterns, as well as analyze a case study of disinformation. A typology of strategies employed by different states to ensure news security is presented and comments on their effectiveness are made.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Voivodenship Offices in 2014. Survey questionnaires were sent to all Voivodenship Offices in Poland. The aim of the research was identifying in which of the offices ISMS are implemented, according to which standards ISMS are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems which occurred during the implementation of these systems and documentation concerning information security. The article is a continuation of research on information security management systems in the state and local government agencies.
EN
The beginning of the 21st century is the period of the intensive development of the Western Civilization changing from industrial epoch based on industry and resources to informative epoch where most important issues are information and knowledge. Because of the change, there are new problems and threats which have not existed before. In the industrial world, we are afraid of physical threats – fires, thefts and sabotage. In the world of information, virtual threats must be added as well. Various occurrences where rules of management are not observed can lead to critical situation or crisis and as a result can ruin a particular subject. What is more, computer-related occurrences must also be mentioned. Different occurrences and information security incidents will be taken into consideration in the article, such as serious threats which can cause crisis in organization if suitable management mechanism was not prepared.
EN
The beginning of the 21st century is the period of the intensive development of the Western Civilization changing from industrial epoch based on industry and resources to informative epoch where most important issues are information and knowledge. Because of the change, there are new problems and threats which have not existed before. In the industrial world, we are afraid of physical threats – fires, thefts and sabotage. In the world of information, virtual threats must be added as well. Various occurrences where rules of management are not observed can lead to critical situation or crisis and as a result can ruin a particular subject. What is more, computer-related occurrences must also be mentioned. Different occurrences and information security incidents will be taken into consideration in the article, such as serious threats which can cause crisis in organization if suitable management mechanism was not prepared.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. The aim of the research was identifying in which government offices ISMS are implemented, according to which standards are developed and certified and gathering information about documentation concerning information security. The article is an extended version of the paper notified at the VIII Scientific Conference „Information Systems In Management”, taking place on 21-22 November 2013.
PL
Artykuł koncentruje się na prawnej ochronie bezpieczeństwa informacji Ukrainy. Poddaje się analizie teoretyczne i prawne podejście do zrozumienia bezpieczeństwa informacji i jego związku z bezpieczeństwem informacyjnym. Określa okresy regulacji prawnych w zakresie relacji informacyjnych i bezpieczeństwa informacji. Szczególną uwagę poświęca ostatnim okresom i dokumentom przyjętym po 2014 r. Analizie poddano zalety i wady doktryny bezpieczeństwa informacji Ukrainy 2017. Określono status i przyszłe sposoby odpowiednich regulacji prawnych.
EN
The article focuses on the legal protection of information security of Ukraine. Theoretical and legal approaches to the understanding of information security and its relation to cyber security are analyzed. There are determined periods of legal regulation in sphere of information relations and information security. Special attention is devoted to the last period and the documents adopted after 2014. The advantages and disadvantages of the Doctrine of Information Security of Ukraine 2017 are analyzed. The status and future ways of relevant legal regulation are outlined.
13
Publication available in full text mode
Content available

Honeypot

80%
|
2011
|
vol. 2
|
issue 1
13-22
EN
In the article, the principles of computer network protection using the honeypot technology were presented. Honeypots are systems of traps, which are a powerful weapon in the hands of IT security specialists. The author described types and concepts of operation of honeypots.
EN
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.
EN
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
EN
A sense of security is one of the basic human needs that can be guaranteed by the state using the available methods and techniques. At present, security categories are distinguished where information security has found its place. Due to the role of information and its impact on states, societies and entities, the literature has highlighted this issue. The wide scope of information security and related topics have led to the creation of concepts that do not reflect current knowledge about information security. The aim of the article is to select, among the definitions presented by the doctrine – the definition of information security most aptly capturing its essence. In this work the author used the descriptive methodology, focusing on the comparative analytical method.
17
80%
EN
Anonymous could call movement, activists, community or idea. They have no leader, no structure, yet have in the past influenced the decisions of thousands of people around the world. Media is often referred to as hackers, because the greatest attention they raise is their attacks, which are mainly fighting for freedom of the Internet or against various social phenomena. In addition to hackers, the movement itself creates, in addition to hackers, people who either share ideas of movement or use various programs to attack and shut down the servers of organizations, institutions, governments, or websites of various security agencies such as the FBI or the CIA.
EN
Modern human generation, especially the younger generation, in the digital world spends more and more time. Experts in the area recorded a significant increase of interest of people on social networks. On the present, in a frame of the so-called digital contacting the people themselves is to contact online social networks, perhaps the most popular form. Article mentions the risks of leakage and misuse of personal data on such online social networks.
EN
Improving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management
EN
The material scope of the analysis presented in this paper refers to special powers held by the Polish special services with respect to the surveillance of foreign nationals in connection with terrorist threats and terrorist offenses. This paper connects the issue of anti-terrorist measures with the assessment of the effectiveness of the Polish special services and with the assessment of potential social costs, which are related to the increase in the powers held by these services in the field of surveillance of Polish citizens and foreign nationals. The analysis of the powers of the special services focuses on the powers of one of the counterintelligence services, i.e. theInternal Security Agency (Polish: ABW).The purpose of this paper is to indicate the consequences of the introduction of legal changes concerning the powers held by the special services in the scope of applying particular types ofsurveillance activities (operational-and-intelligence activities). It poses the following research questions: (1) To what extent can mechanisms in Polish law influence the effectiveness of combating terrorism by the Polish special services? (2) To what extent can mechanisms in Polish law in the field of combating terrorism violate the rights and freedoms of Polish citizens andforeign nationals? In order to answer the research questions, the activities and powers of Polish special services were analyzed from a legal and institutional point of view. On the other hand,to analyze legal regulations related to surveillance, the author applied a dogmatic and doctrinal interpretation and a pro-constitutional interpretation of the provisions of criminal law.
first rewind previous Page / 4 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.