Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 8

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Cybersecurity
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

Was stuxnet an act of war?

100%
EN
Modern societies live in the complex and fragile information environment, in which data processing and exchange grow exponentially. Different digital computerized systems support most of key infrastructures like financial systems, power and water supplies, air traffic management, public and military communications. To increase accessibility to those systems in the information domain, it requires interoperability and interconnectivity which makes them complex to maintain and vulnerable to cyber-attacks/intrusions. The Internet is an ownerless, ubiquitous and open to all information exchange domains which can shape the international relations through the cyber domain and there is no internationalentity that can control and affect the data flow. Each country has its own legislation to react and influence local users through Internet service providers and only close cooperation among the states can help to identify and prevent illegal activities against other states as well as support foreign countries during investigations. The paper will uncover how cyber weapon was used to influence state struggling, becoming a nuclear power for the first time. It is divided into two parts to explain the essence of the act of war and cyberspace to understand the environment where Stuxnet was applied. Next it will focus on impact and reaction of Stuxnet in order to analyse its utilization within cyberspace.
Cybersecurity and Law
|
2024
|
vol. 11
|
issue 1
92-97
EN
In October 2023, Poland hosted the next edition of the Cyber Commanders Forum, the world’s largest conference of military cyber commanders. For the first time, the Forum was hosted by the Polish Cyberspace Defense Forces Component Command. This is a recognition of the international community for Polish achievements, resources and capabilities. The article is a transcript of a speech delivered during the Forum, describing the Polish path to building cyber capabilities, framed in five key success factors.
EN
The article purpose is to study digitalization of certain phases of Ukraine electoral processes, taking into account the European Union experience. The research design consists in a comparative analysis of electoral processes digitalization and its legislative provision. The article describes the legal field of EU electoral processes. The recommendations of the Council of Europe on e-voting standards are considered. The role of the administrator of the Ukraine State Voter Register is considered. The phases of electoral processes that require gradual digitalization are given. Scientific novelty of the study is to use a comparative approach in studying the electoral law of the EU and Ukraine. The research field is limited to the electoral law of the EU and Ukraine. The practical effects of the study make it possible to identify the advantages and disadvantages of digitalizing the phase of the electoral process. The scientific novelty of the study conducted in this article is to study the digital transformation restrictions at individual stages of electoral processes. The fundamental provisions in Ukrainian legislation on digitalization of electoral processes are determined. The article summarizes that the widespread means of electoral processes digitalization is the formation and updating of the voters registers and conducting their statistics. The author revealed that electoral processes digitalization has a fragmentary character in the EU countries, since the legal field in providing cyber security requires continuous improvement.
Cybersecurity and Law
|
2022
|
vol. 7
|
issue 1
110-129
EN
In this paper I thoroughly discuss the possibility of committing crimes which would fall under the Rome Statute, with regards to the very notion of cybersecurity. I conclude that we need extensively empirical research and solution to many aspects pointed out in my paper. First, we need to find an acceptable definition of cybersecurity to work with this process, and in order to understand the world and possibilities it creates for us. Furthermore, the 1998 Rome Statute needs an update, because the world of the internet creates opportunities never seen before, and the international case law is unable to cope with such distinct acts. Therefore, I believe that we need to find the next „Nuremberg Trials”, the next generational solution to a world and crimes never seen before. We need the theoretical and legal revolution which did come after the World World II, and after the ICTY, ICTR and Sierra Leone ad hoc Courts. I truly hope that this short and hence mashup summarizing paper is just an indicator of papers and conferences to come, with solutions and more and more ideas on how we solve these two phased problems, namely having to find 1. An ultimate definition for cybersecurity 2. Having a solution of how to interpret it to the classical notion of International Criminal Law. if we conclude that we are unable to handle this issue, I suggest to create a panel on international or V4 level on either the reorganization of customary international criminal law under the Rome Statute or on the ever-changing definition of cybersecurity.
5
Content available remote

Cybersecurity and the Internet of Things

63%
EN
PURPOSE/THESIS: The purpose of this paper is to use a recent cyber-attack to highlight the current state of readiness of Internet of Things (IoT) technologies with regard to security vulnerabilities as well as fundamental – in the author’s opinion – changes that will need to take place within these industries and technologies to mitigate the overall cybersecurity risk. APPROACH/METHODS: The analysis of the findings from numerous existing published security studies. RESULTS AND CONCLUSIONS: The following conclusions were reached: (1) in the world becoming more and more interconnected through the web enabled devices (IoT devices), new forms of security threats have been developed; (2) at present IoT devices introduce a high level of vulnerability; (3) many of these risks may be mitigated with already existing technologies; (4) however, due to the fragmented and heterogeneous nature of the IoT devices, the implementation of even basic levels of security is more challenging than in the case of traditional Internet connected devices (e.g. personal computers); (5) the industry needs to face and address three key issues that will in turn help to mitigate the unique security threats posed by IoT devices, namely: the drive towards open standards, the industry cooperation and consolidation, and the improvement of consumer awareness. ORIGINALITY/VALUE: The value of the research is to highlight the security issues related to the Internet of Things and propose solutions that must be implemented to increase the level of security awareness within the IoT environment.
PL
CEL/TEZA: Celem artykułu jest wykorzystanie przykładów niedawnych cyberataków do przedstawienia obecnego stanu przygotowania technologii Internetu Rzeczy (IoT) wobec zagrożeń bezpieczeństwa oraz podkreślenia fundamentalnych, zdaniem autora, zmian, które muszą nastąpić w przemyśle i technologiach IoT, aby zminimalizować ogólne ryzyko związane z cyberbezpieczeństwem. KONCEPCJA/METODY BADAŃ: Problem przedstawiono w artykule na podstawie analizy i interpretacji wyników badań dotyczących cyberbezpieczeństwa, opublikowanych w licznych studiach i sprawozdaniach. WYNIKI I WNIOSKI: Wnioskami z tej analizy są następujące kluczowe kwestie: (1) w świecie, w którym urządzenia są coraz silniej z sobą powiązane poprzez łącza internetowe (urządzenia IoT, Internetu Rzeczy) powstały nowe formy zagrożenia bezpieczeństwa; (2) obecnie urządzenia te są w dużym stopniu podatne na ataki; (3) istnieją dziś technologie, które można zastosować, aby złagodzić wiele spośród tych zagrożeń; (4) jednakże, ze względu na rozdrobniony i heterogeniczny charakter urządzeń IoT, zapewnienie nawet podstawowego poziomu bezpieczeństwa jest znacznie większym wyzwaniem niż w przypadku tradycyjnych urządzeń podłączonych do Internetu (np. komputerów osobistych); (5) przemysł musi skierować uwagę na trzy podstawowe zagadnienia, które pomogą zmniejszyć te szczególne zagrożenia bezpieczeństwa stwarzane przez urządzenia IoT, tj.: wykorzystanie otwartych standardów, współpraca i konsolidacja przemysłu, poprawa świadomości konsumentów. ORYGINALNOŚĆ/WARTOŚĆ POZNAWCZA: Artykuł służy naświetleniu problemów bezpieczeństwa związanych z Internetem Rzeczy oraz zaproponowaniu pewnych rozwiązań, które należy wprowadzić, aby zwiększyć poziom świadomości bezpieczeństwa w środowisku IoT.
PL
Według raportu Cisco zagadnienia takie jak cyfryzacja, bezpieczeństwo IT oraz Internet rzeczy to zjawiska, które wyznaczały kierunek rozwoju poszczególnych branż gospodarki w 2016 r. i będą szczególnie istotne w przyszłości. Wśród nich znajduje się Internet rzeczy, wobec którego oczekuje się, że znajdzie wiele zastosowań w różnych dziedzinach, m.in. w energetyce, transporcie, przemyśle, opiece zdrowotnej. Jego zastosowania usprawniają nasze życie, ale stwarzają też nowe zagrożenia i stanowią wyzwanie dla architektów systemów bezpieczeństwa. Eksperci są zdania, że problemy z bezpieczeństwem IT sprzed lat powracają obecnie w nowych urządzeniach i dają hakerom wiele możliwości do cyberataków. Celem artykułu jest przegląd wybranych przypadków użycia Internetu rzeczy, opis zagrożeń dla cyberbezpieczeństwa wynikających z poszerzania dostępu do sieci nowych urządzeń, a także przegląd istniejących zabezpieczeń.
EN
According to the Cisco report, issues such as digitization, IT security and the Internet of Things are phenomenon, which determined the direction of development of the economy sectors in 2016 and will be particularly important in the coming years. Among them is the IoT which is expected to find many applications in various areas, like energy, transport, industry, construction, health care. Its applications enhance our lives, but also pose new threats and is a challenge for IT security architects. Experts think that the IT security problems from the past return now with new devices and provide many opportunities for hackers to cyberattacks. The aim of the article is a review of selected cases of the usage of the IoT, description of threats to cybersecurity resulting from widening access of new devices to the Internet, and an overview of the existing safeguards.
PL
W niniejszym opracowaniu omówiono powstawanie i rozwój studiów nad cyberbezpieczeństwem od momentu powstania Internetu. Chociaż początki studiów nad cyberbezpieczeństwem sięgają lat 70tych dwudziestego wieku, hakerstwo, złośliwe oprogramowanie, włamania do komputerów i ataki szpiegowskie, które miały miejsce w latach 80tych, doprowadziły do ukształtowania się cyberbezpieczeństwa w obszarze informatyki. W latach 90tych internet zaczął być powszechnie wykorzystywany i wzrosła ilość ataków w cyberprzestrzeni. Okres ten był głównym powodem wzrostu zainteresowania bezpieczeństwem oprogramowania i sieci. Bezpieczeństwo sieci stało się kluczowym priorytetem dla rządów i wielu branż. Wraz z rosnącą złożonością cyberzagrożeń w 21 wieku studia nad cyberbezpieczeństwem stały się priorytetowym obszarem w studiach nad bezpieczeństwem. Państwa i niektóre organizacje ponadnarodowe zaczęły tworzyć strategie bezpieczeństwa cybernetycznego. Bezpieczeństwo infrastruktury krytycznej i sieci komputerowych zaczęło wyłaniać się jako obszar o wysokim priorytecie. Zaobserwowano, że rozpoczęło się przejście od klasycznych do nowoczesnych polityk bezpieczeństwa, które powinny być tworzone w erze informacji. Studia nad bezpieczeństwem cybernetycznym były traktowane poważniej po atakach estońskich z 2007 roku, zwłaszcza w drugiej dekadzie 21 wieku. Obecnie intensywność ataków na infrastrukturę krytyczną oraz wystąpienie niektórych ataków fizycznych powodują, że problem cyberbezpieczeństwa pogłębia się i staje się problemem w skali międzynarodowej. Studia nad cyberbezpieczeństwem nadal są kształtowane przez wpływ nie jednej, lecz wielu różnych dyscyplin, także dzięki ważnym dyskusjom i incydentom cybernetycznym, które miały miejsce w ostatnich latach. Dlatego też badania prowadzono z perspektywy multidyscyplinarnej.
EN
This study discusses the formation and development of cybersecurity studies since the creation of the Internet. Although the origin of cybersecurity studies dates back to the 1970s, hacking, malicious software, computer intrusions, and espionage attacks that took place in the 1980s led cybersecurity studies to form in the area of computer science. By the 1990s, the Internet began to be used widely, and an increase in the level of attacks in cyberspace began to occur. This period was a major reason for the growth in writing on software and network security. Network security has become a key priority for governments and many industries. Cybersecurity studies have become a priority area in security studies with the increasing complexity of cyber threats towards 2000s. States and some supranational organizations have started to create cybersecurity strategies. The security of critical infrastructure and computer networks has begun to emerge as a high-priority area. It has been observed that the transition from classical security policies to modern security policies, which should be established in the information age, has begun. Cybersecurity studies were taken more seriously after the 2007 Estonian attacks, especially in the 2010s. In this period, the intensity of attacks on critical infrastructures and the occurrence of some physical attacks caused cybersecurity to deepen and become an issue on an international scale. Cybersecurity studies continue to be shaped by being influenced by many different disciplines, regardless of any discipline, with the important discussions and cyber incidents that have taken place in recent years. Therefore, the studies were handled from a multidisciplinary perspective.
|
2021
|
vol. 42
|
issue 4
97-109
EN
Global cybercrime is exploding geometrically. The traditional methods of securing cyber systems via complex passwords frequently fail, exposing the computer systems to many types of cybercrimes. Cybercrime of all kinds is a growing concern for individuals, government and business organizations, and society. Zero Identity is a new technology that "bubbles, cloaks, and hides" computers and their contents from cybercriminals. Zero Identity is a mature and proven military-based technology with over a 20-year history. Cylentium, a cybersecurity startup, is adapting Zero Identity technology to consumers and civilian organizations. Market and technological acceptance of Zero Identity may lead to a cybersecurity paradigm shift in the next decade. This paper explores the history of Zero Identity, what it does, how it works, and its future prognosis. One of the original developers (Rob Langhorne) of the Zero Identity concept was interviewed, as was the concurrent entrepreneur (Wayne Ronhaar). Both Langhorne and Ronhaar became coauthors of this article to contribute their first-hand historical perspectives, challenges, and insights to transform technology into a commercial product in a series of articles.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.