Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cybersecurity" wg kryterium: Temat


Tytuł:
Germany’s Cybersecurity Policy
Autorzy:
Brzostek, Agnieszka
Tematy:
cybersecurity
cybersecurity competent authorities
Germany
cybersecurity strategy
Pokaż więcej
Wydawca:
Stowarzyszenie Absolwentów i Przyjaciół Wydziału Prawa Katolickiego Uniwersytetu Lubelskiego
Powiązania:
https://bibliotekanauki.pl/articles/55932425.pdf  Link otwiera się w nowym oknie
Opis:
The German Federal Republic is one of the states whose state policy in the field of cybersecurity is considered to be coherent and effective. However, even Germany is a country exposed to numerous attacks. Ubiquitous technology in every aspect of our lives, and in addition the COVID-19 pandemic, introducing widespread mobile work and online education, have created even greater threats. By adapting internal legislation, indicating strategic and specific goals, Germany is part of the EU cybersecurity policy in its cybersecurity strategies. Prior to the adoption of the NIS 2 directive, Germany had already created a legal basis that would effectively and efficiently protect German cyberspace. In order to strengthen the effectiveness of their cybersecurity policy, Germany is strengthening cooperation between federal authorities, business, science and strengthening digital sovereignty.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity as the Basis for State and Society Security in the 21st Century
Autorzy:
Bujek, Małgorzata
Tematy:
cyberspace
cybersecurity
threats
cybersecurity system
Pokaż więcej
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Powiązania:
https://bibliotekanauki.pl/articles/466214.pdf  Link otwiera się w nowym oknie
Opis:
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Autorzy:
Wiechetek, Łukasz
Mędrek, Marek
Tematy:
computer security
cybersecurity
cybersecurity awareness
security education
cybersecurity education
business students
Pokaż więcej
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Powiązania:
https://bibliotekanauki.pl/articles/2168351.pdf  Link otwiera się w nowym oknie
Opis:
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and cybersecurity incidents. Members of Generation Z use information technology as a main tool for broadening their knowledge and skills. For such digital natives, proficiency in ICTs appears as an indispensable element of life. This is even more apparent during the COVID-19 pandemic, when they are forced to use IT tools more often, both for the entertainment, education, and work. Such acceleration generates new possibilities, but also new threats.Purpose of the article: The aim of the paper is to check if members of Generation Z are aware of cybersecurity issues and whether they know basic threats and methods/tools that can improve the safety. We analyse students’ behaviour in the event of cyber incident and examine whether the analysed group is willing to improve cyber knowledge, skills, and attitudes.Research methods: We explored data collected from business students (N = 182). The online questionnaire was prepared in LimeSurvey. Finally, data analysis and visualization were performed in Microsoft Excel and Tableau.Main findings: The analysis indicates that business students have rather poor knowledge in cybersecurity. The results demonstrate the need for targeted educational campaigns and trainings that address the specific cyber weaknesses to build secure ecosystem, combining both technical, organizational, and behavioural aspects.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity Politics – Conceptualization of the Idea
Autorzy:
Górka, Marek
Tematy:
cybersecurity policy
cybersecurity
political theory
international relations
Pokaż więcej
Wydawca:
Wydawnictwo Adam Marszałek
Powiązania:
https://bibliotekanauki.pl/articles/2019097.pdf  Link otwiera się w nowym oknie
Opis:
The cybersecurity issue discussed in the paper is seen from the perspective of political science with the indication that the subject under discussion concerns the multifaceted nature of the state’s actions, which consists of political, economic, social, and cultural factors. At the same time, the work also intends to prove that cybersecurity is not only a domain of technology because it is the mentioned aspects that shape the conditions of stable development of the state and its citizens in a space dominated by cyber technology in a much more decisive way. Given the growing role of cybertechnology in almost all areas of human life, its importance also forces and inspires political science to question the shape and model of modern policy, which is significantly evolving under the influence of new technologies. On the one hand, emerging cyber threats reveal the weakness of the state and the dependence of state institutions on cybertechnologies, but on the other hand, existing cyber incidents may also motivate many governments to take action to increase the level of cybersecurity.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena poziomu wydatków publicznych na funkcjonowanie systemu cyberbezpieczeństwa w Polsce na tle Unii Europejskiej
Assessment of the level of public expenditure on the functioning of the cybersecurity system in Poland compared to the European Union
Autorzy:
Kiestrzyn, Marcin
Tematy:
cybersecurity
threats in cyberspace
EU expenditure on cybersecurity
expenditure on cybersecurity in Poland
Pokaż więcej
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Powiązania:
https://bibliotekanauki.pl/articles/2895533.pdf  Link otwiera się w nowym oknie
Opis:
The main purpose of the article is to present and assess the changes in the directions of expenditure on cybersecurity in Poland from the state budget and their impact on the assessment of technological advancement in comparison with the EU. The formal and legal regulations that came into force over the last years in the EU and in Poland in this area are reviewed as well. The first part of the article focuses on the evolution of definitions and regulations regarding cyberspace, cybercrime and cybersecurity. It also highlights the entities involved in the cybersecurity system and their role in preventing threats in cyberspace. Next, the author briefly examines main threats in the digital space of the European Union and Poland. The final section assesses directions of financing cybersecurity in Poland versus the EU. The author argues that as the use of technology increases, it will be necessary to increase public spending on cybersecurity in order to maintain the level of security.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Laboratorium Oceny Cyberbezpieczeństwa Instytutu Łączności – wymagania i wytyczne
IT Security Evaluation Facility at the National Institute of Telecommunications – requirements and guidelines
Autorzy:
Andrukiewicz, E.
Tekampe, N.
Tematy:
cyberbezpieczeństwo
ocena cyberbezpieczeństwa
certyfikacja
cybersecurity
cybersecurity evaluation
certification
Pokaż więcej
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Powiązania:
https://bibliotekanauki.pl/articles/317488.pdf  Link otwiera się w nowym oknie
Opis:
Rozwój technologii telekomunikacyjnych zwiększa zapotrzebowanie na certyfikację bezpieczeństwa produktów i usług. W połączonych gospodarkach, w tym w szczególności w Unii Europejskiej, istotne znaczenie ma wzajemne uznawanie certyfikatów wydawanych na podstawie wiarygodnych i kompletnych ocen bezpieczeństwa. Obecnie jest to możliwe dzięki porozumieniom międzynarodowym, takim jak Common Criteria Recognition Agreement (CCRA) i Senior Officers Group Information Security – Mutual Recognition Agreement (SOG-IS MRA). Proces certyfikacji produktu lub usługi składa się z dwóch etapów: ewaluacji (oceny), którą wykonują laboratoria oraz wydawania certyfikatów, które wykonują jednostki certyfikujące. Laboratoria przeprowadzające ewaluację muszą spełnić szereg kryteriów, określanych przez krajowe jednostki certyfikujące. W opracowaniu przeanalizowano wymagania i praktyki laboratoriów w krajach należących do porozumień międzynarodowych, zapewniających wzajemne uznawanie certyfikatów zgodnych z Common Criteria wraz z wnioskami i wytycznymi dla Laboratorium Oceny Cyberbezpieczeństwa w Instytucie Łączności.
The development of telecommunications technologies increases the need to certify the cybersecurity of products and services. In the connected economies, in particular in the European Union, mutual recognition of certificates issued on the basis of reliable and complete security assessments is essential. This is now possible thanks to international agreements such as the Common Criteria Recognition Agreement (CCRA) and the Senior Officers Group Information Security – Mutual Recognition Agreement (SOG-IS MRA). The certification process is divided into two stages: evaluation, carried out by independent laboratories, and certification, performed by a national certification body. Laboratories performing the evaluation shall meet a series of requirements defined by national certification bodies. In the study an analysis of the requirements and practices of laboratories in the CCRA member states was performed, resulting in the conclusions and guidelines for the cybersecurity assessment laboratory at the National Institute of Telecommunications.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity
Autorzy:
Karpiuk, Mirosław
Makuch, Anna
Soler, Urszula
Tematy:
social security
cyberspace
cybersecurity
public security
cybersecurity strategy
Pokaż więcej
Wydawca:
Wydawnictwo Adam Marszałek
Powiązania:
https://bibliotekanauki.pl/articles/22180772.pdf  Link otwiera się w nowym oknie
Opis:
Cybersecurity belongs to the area of activity of state and supra-state actors, giving direction to national and international systems of law as components of national and supranational systems of political, economic, military cooperation, etc. Still, the state has a monopoly on the causality of lawmaking, which forms the basis of cyberspace use security activities. The state responds to national security needs by actively participating in the formation of the collective security order of the supranational level. The aim of this paper is to demonstrate the significance of the national Cybersecurity Strategy of the Republic of Poland for ensuring the safe use of cyberspace. The Strategy, while referring to the national order, is at the same time an implementation of supranational arrangements within the scopes adopted by the state authorities, which means that the Strategy is subjected to logical evaluation depending on the impact of cyber conditions or binding arrangements of the international environment. The text is based on two research methods: the doctrinal legal research method to analyse the applicable legal regulations governing the issues related to the strategic aspects of cybersecurity and the law theory method aimed at evaluating the strategic solutions in respect of security in cyberspace.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of an Innovative Model of Cooperation Between Schools and the Public for the Cybersecurity of Children and Adolescents
Autorzy:
Górka, Marek
Tematy:
education for cybersecurity
cybersecurity
innovation
collaboration
public sector
Pokaż więcej
Wydawca:
Akademia Ignatianum w Krakowie
Powiązania:
https://bibliotekanauki.pl/articles/44443974.pdf  Link otwiera się w nowym oknie
Opis:
The article deals with the prevention of cyber threats to children and adolescents through the cooperation of public institutions, which can be one of the key factors in increasing safety in the virtual world. The purpose of the article is to evaluate the effectiveness of the model of cooperation of local government institutions. The novelty of the research problem lies in the attempt to practically apply the exchange of knowledge and experience between local institutions, with a particular focus on cybersecurity education. The analysis is based on students’ responses from surveys conducted between 2019 and 2021, making it possible to apply quantitative analysis and to characterize the changes in the incidence of cyberthreats. The second research tool is qualitative analysis, through which we can learn about the impact of educational activities on the level of awareness of cybersecurity. The research period has three stages: the first is before the introduction of remote learning, the second is during the pandemic and remote learning, and the third is the return to in-school learning. The research analysis deals with the problem of digital threats that the modern school, with the support of other public institutions, has to face.
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Szacowanie ryzyka dla usług kluczowych opartych o systemy OT. Wymagania Krajowego Systemu Cyberbezpieczeństwa
Autorzy:
Kister, Łukasz
Tematy:
cyberbezpieczeństwo
cybersecurity
Pokaż więcej
Wydawca:
Nowa Energia
Powiązania:
https://bibliotekanauki.pl/articles/89318.pdf  Link otwiera się w nowym oknie
Opis:
Cyberbezpieczeństwa nie można pozostać na pastwę niepewności czy polskiego „jakoś to będzie”. Zauważył to nawet ustawodawca, który na wszystkich podmiotach Krajowego Systemu Cyberbezpieczeństwa, wymusza systematyczne szacowanie ryzyka dla systemów informacyjnych służących do zarządzania usługą kluczową dla normlanego funkcjonowania państwa i jego mieszkańców. Czy jednak rozumiemy, że świadomość prawdopodobieństwa wystąpienia oraz skutków materializacji konkretnych zagrożeń w sieciach przemysłowych, to nie „wypełnienie” nakazów prawnych, a biznesowa konieczność?
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Türkey’s Cybersecurity Policy Framework
Autorzy:
Liszkowska, Dominika
Tematy:
Türkiye
cybersecurity
Türkiye’s cybersecurity policy
cyberspace
security
Policy
Pokaż więcej
Wydawca:
Akademia Sztuki Wojennej
Powiązania:
https://bibliotekanauki.pl/articles/31341977.pdf  Link otwiera się w nowym oknie
Opis:
The Internet and cyberspace are a gradually developing structure. Every second, new devices, systems and users connect within the network, which causes constant growth and changes in the sphere of threats arising from cyberspace. Türkiye is one of the countries in the world most exposed to cyber threats. However, one of its goals was to bring the field of cybersecurity to an international level. The aim of this article is to present the framework of Türkiye’s cybersecurity policy and answer the following questions: What steps have been taken in Türkiye to protect the state and society against the effects of threats in cyberspace? In which areas has Türkiye achieved significant progress in cyberspace protection, and which are still the biggest challenges?
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies