Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber-security" wg kryterium: Temat


Tytuł:
Cyber threats for present and future commercial shipping
Autorzy:
Pawelski, J.
Tematy:
maritime cyber security
maritime cyber resilience
maritime cyber emergency
cyber security vulnerabilities
cyber security in shipping
Pokaż więcej
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Powiązania:
https://bibliotekanauki.pl/articles/24201417.pdf  Link otwiera się w nowym oknie
Opis:
Cyber-attacks are extremely dangerous for all operations relaying upon it-technologies. Today shipping businesses cannot operated without processing large amounts of information. Four biggest shipping companies suffered break-down in their operations after they were struck by malware. International Maritime Organization also was struck by cyber-attack which took its website down. Maritime community noticed rise in cyber-attacks on virtually all computer-based systems on board of vessels. For manned vessels risks to safety of navigation are mitigated by presence of crew on board but remain financial and reputational losses. Introduction of remotely controlled and fully autonomous unmanned vessels will increase seriousness of threats. Cyber-attack may severely hamper ship’s operability or even lead to complete loss of control. International community is developing several countermeasures to protect commercial shipping presently and in future.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Pokaż więcej
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf  Link otwiera się w nowym oknie
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Costs of Cyber-Security in a Business Entity
Autorzy:
Antczak, Joanna
Tematy:
costs
costs of cyber-security
cyber threats
direct costs of cyber-security
indirect costs
of cyber-security
Pokaż więcej
Wydawca:
Szkoła Główna Handlowa w Warszawie
Powiązania:
https://bibliotekanauki.pl/articles/1194144.pdf  Link otwiera się w nowym oknie
Opis:
Operation in the cyberspace of every business unit is unavoidable. Most commercial transactions, marketing activities, e-mail contact with employees or contractors are carried out using virtual space. The purpose of the article is to identify and analyze selected costs for cybersecurity of an enterprise. Costs related to cybersecurity constitute a new category in the management of an enterprise. Considering the costs at the enterprise level, two areas should be discussed: on the one hand, those incurred to prevent cyber threats and on the other one, the costs of offsetting the negative effects of cyber-attacks. For the sake of stable operation and at the same time development in the future, the management should strengthen activities in the field of information security, which is related to costs that will minimize the risk of cyber-attacks.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Perception of Cyber Threats in Polish Cyber Security Policy on the Example of Strategic Documents in the Period 2013–2024
Autorzy:
Górka, Marek
Kamola-Cieślik, Małgorzata
Tematy:
cyber security policy
cyber security strategy
cyber threats
cyberattacks
digitization
digital infrastructure
Pokaż więcej
Wydawca:
Wydawnictwo Adam Marszałek
Powiązania:
https://bibliotekanauki.pl/articles/55787730.pdf  Link otwiera się w nowym oknie
Opis:
The article analyzes the growing role of digitization and the related security challenges in the context of the increasing number of internet-connected devices and increasingly sophisticated cyberattacks. In the context of the dynamic development of technology and the increase in cyber incidents, the article focuses on an interdisciplinary analysis of strategic documents on cyber security policy in Poland, such as Polish Cyberspace Protection Policy and Polish Cyber Security Strategy. The study identifies key threats and assesses the state’s responses to the growing challenges of cyberattacks. The relevant research question around which the analysis in the article is conducted is: What actions are needed to strengthen the cyber security culture in society and organizations? In the face of growing threats, the article also highlights the need to build a culture of cyber security and cooperation between public and private sectors.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The UK Government’s Response to Cyber Threats
Autorzy:
Wołyniec, Jakub
Wydawca:
Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej w Lublinie
Cytata wydawnicza:
Wołyniec, J. (2018). The UK Government’s Response to Cyber Threats. Teka Commission of Political science and International affairs, 2, 143-154. doi: 10.17951/teka.2018.13.2.143-154
Opis:
The paper addresses the cyber security issue of the United Kingdom from the perspective of governmental institutions responsible for combating threats coming from cyberspace. The first part of the article presents a catalogue of cyber threats facing various entities in the United Kingdom. In addition, the features of cyberspace that particularly strengthen its vulnerability to these threats are indicated. The second part of the article focuses on presenting institutions and organizations and their actions that are directly or indirectly responsible for cyber security in the UK. First, it focuses on organizations solely responsible for cyber security: from special services (GCHQ), to the National Cyber Security Centre (NCSC), to specialized units operating within these organizations. The article then focuses on other agencies and units operating within government structures, which are related to the Home Office, the Foreign Office and the Ministry of Defence. These include the National Crime Agency, the police, intelligence and counter-intelligence. The paper also presents initiatives of ministries related to social policy, digitization, culture, media, business and enterprises, the protection of which is one of the priorities highlighted in the UK cyber security strategy.
Dostawca treści:
Repozytorium Centrum Otwartej Nauki
Artykuł
Tytuł:
Prostytucja i cyberprostytucja jako zagrożenie dla młodych ludzi – raport z badań
Prostitution and Cyberprostitution as a Threat to Young People – a Study Report
Autorzy:
Górka, Marek
Tematy:
cyberprofit
cyber security
security policy
education for cyber security
information society
Pokaż więcej
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Powiązania:
https://bibliotekanauki.pl/articles/916026.pdf  Link otwiera się w nowym oknie
Opis:
The subject of cyberprostitution reflectsthe growing number of socio-political problems stemming from the dynamic development of cybertechonology and its expansion into every area of human life. In the age of cyberrevolution, there is an increase in the number of pornographic social networking sites. The sex industry quickly adopted all new information technologies to increase young people’s access to pornography. As a result of the link between the internet and the sex industry, the border be-tween the current phenomenon of prostitution and its form in cyberspace has blurred. This article, based on the study, discusses the main motivational factors that contribute to the growth of prostitution. The differences between prostitution in the real and virtual worlds are also indicated. The purpose of the study is moreover to show some disturbing phenomena that may have a negative impact – not only on the emotional development of man – but also on shaping future civil society.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber risk assessment for SHips (CRASH)
Autorzy:
Oruc, A.
Kavallieratos, G.
Gkioulos, V.
Katsikas, S.
Tematy:
risk assessment
integrated navigation system
information Technology
cyber security
cyber incidents
maritime cyber security incidents
maritime cyber security research
operational technology
Pokaż więcej
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Powiązania:
https://bibliotekanauki.pl/articles/59123303.pdf  Link otwiera się w nowym oknie
Opis:
The maritime industry is undergoing a digital transformation, with an increasing integration of Information Technology (IT) and Operational Technology (OT) systems on modern vessels. Its multiple benefits notwithstanding, this transformation brings with it increased cybersecurity risks, that need to be identified, assessed, and managed. Although several cyber risk assessment methodologies are available in the literature, they may be challenging for experts with a maritime background to use. In this paper we propose a simple and effective cyber risk assessment methodology, named Cyber Risk Assessment for SHips (CRASH), that can be easily implemented by maritime professionals. To showcase its workings, we assessed 24 cyber risks of the Integrated Navigation System (INS) using CRASH and we validated the method by comparing its results to those of another method and by means of interviews with experts in the maritime sector. CRASH can aid shipping companies in effectively assessing cyber risks as a step towards selecting and implementing necessary measures to enhance the cyber security of cyber-physical systems onboard their vessels.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ethical considerations in maritime cybersecurity research
Autorzy:
Oruc, A.
Tematy:
maritime cyber security
cyber security
maritime cyber security research
cyber risk
ethical considerations
ethical dilemmas
ethical principles
ethical conflicts
Pokaż więcej
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Powiązania:
https://bibliotekanauki.pl/articles/2172503.pdf  Link otwiera się w nowym oknie
Opis:
Maritime transportation, an essential component of world trade, is performed by contemporary vessels. Despite the improvements that rapid advances in technology have brought to vessels’ operational efficiency and capability for safe navigation, the cyber risks associated with modern systems have increased apace. Widespread publicity regarding cyber incidents onboard ships has sparked extensive research on the part of universities, industry, and governmental organisations seeking to understand cyber risks. Consequently, researchers have discovered and disclosed an increasing number of threats and vulnerabilities in this context, providing information that in itself may pose a threat when accessed by the wrong parties. Thus, this paper aims to raise researchers’ awareness of ethical concerns and provide guidance for sound decision-making in areas where the research process must be handled carefully to avoid harm. To this end, this paper presents a literature review that explores the ethical issues involved in maritime cybersecurity research and provides specific examples to promote further understanding. Six ethical principles and four categories of ethical dilemmas are discussed. Finally, the paper offers recommendations that can guide researchers in dealing with any ethical conflicts that may arise while studying maritime cybersecurity.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation framework for practical cyber security training in the public service
Autorzy:
Deák, Veronika
Tematy:
simulation framework
cyber security
cyber security education
public service
practical training
Pokaż więcej
Wydawca:
Akademia Sztuki Wojennej
Powiązania:
https://bibliotekanauki.pl/articles/1311502.pdf  Link otwiera się w nowym oknie
Opis:
The public service sector is a key target of cyberattacks. In order to prevent and effectively tackle such attacks, organisations should continuously develop their defence capabilities. As part of developing such capabilities, public service cybersecurity training is required to teach students about cyberattacks. The present study uses quantitative research techniques including (i) how to identify key requirements for the practical aspects of public service cybersecurity training and (ii) sampling to utilise international best practices from cybersecurity education and conceptual architectures from existing public service organisations. A schematic structure with a two-level practical training course is proposed. On the first level, the students learn about the defence mechanisms of their own info-communication devices and try to prevent attacks in a simulated environment. On the second level, the students apply protection strategies against cyberattacks in organisational infrastructure. Finally, a technical framework is defined to simulate cyberattacks against (a) personal devices and (b) a fictional organisational infrastructure. The specification of a public service cybersecurity training programme should not only focus on theoretical education but also provide practical knowledge to students. By simulating specific attacks, theoretical and practical knowledge can be combined. As a result, students will be able to recognise threats and potential risks from cyberspace.
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies