Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Information confidentiality is the one of the cornerstones of IT security, which is defined and described in ISO/IEC 27000 standard. Contemporary practices of disclosing information to unauthorized persons and systems are the reason for difficulties in this concept implementation. At every step we encounter situations where information is extracted or obtained illegally from different sources. The main purpose of this paper is to present the issue of information confidentiality protection in cyberspace, as a complex, full of contradictions problem of techno-social character. The role of information confidentiality in functioning of a society, organization and individual has been described. The most important information confidentiality threats have been characterized and the description of a number of incidents illustrating those threats has been quoted. Contemporary security threats have been presented as well as selected methods of information confidentiality protection transmitted in ICT networks. The characteristics of protection systems of information confidentiality have been analyzed, with special attention paid to their functionality and vulnerability to existing threats. The concept of protecting the confidentiality of information transmitted on the Internet based on the use of cryptography and steganography has been presented.
Słowa kluczowe
Rocznik
Tom
Strony
194--207
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
autor
- Faculty of Security Studies, General Tadeusz Kosciuszko Military Academy of Land Forces
Bibliografia
- 1. Angwin J., The World’s Email Encryption Software Relies on One Guy, Who is Going Broke, [online] [access: 15.11.2016]. Available on the Internet: www.propublica.org.
- 2. Arizona Police Confirm 2nd Hack on Officers' Email, [online] [access: 15.11.2016]. Available on the Internet: http://www.foxnews.com /tech/2011/06/29/.
- 3. Documents Reveal NSA and GCHQ Efforts to Destroy Assange And Track Wikileaks Supporters – TRNN Transcript, [online] [access: 20.11.2016]. Available on the Internet: http://michaelratnerpresente.com.
- 4. Edward Snowden: Leaks that exposed US spy programme, [online] [access: 20.11.2016]. Available on the Internet: http://www.bbc.com/ news/world-us-canada-23123964.
- 5. [online] [access: 25.11.2016]. Available on the Internet: http://www.polskieradio.pl/39/156/Artykul/256306,Cud-nad-Wisla-czyli-Bitwa-Warszawska.
- 6. [online] [access: 15.11.2016]. Available on the Internet: http://www.rp.pl/Dane-osobowe/304089959-Panoptykon-sluzby-czesciej-siegaja-po-dane-internetowe-rza dziej-po-telefoniczne.html.
- 7. [online] [access: 15.11.2016]. Available on the Internet: http://www.wikiwand.com /en/RC4.
- 8. International standard ISO/IEC 27000. Information technology — Security techniques — Information security management systems - Overview and vocabulary, 3rd edition, 2014 p. 2.
- 9. [online] [access: 15.11.2016]. Available on the Internet: www.ohchr.org/Documents/Issues/Opinion/.../MLRC.doc, 2015.
- 10. NSA ‘developing code-cracking quantum computer’, [online] [access: 15.11.2016]. Available on the Internet: http://www.bbc.com/news/technology-25588605.
- 11. Pejas M., Techniki ukrywania informacji w danych cyfrowych i narzędzia je wykrywające, Przegląd bezpieczeństwa wewnętrznego. Technika, technologia i bezpieczeństwo informatyczne, no. 1/09, p. 105-114
- 12. Praca zbiorowa, Biblia Tysiąclecia - Pismo Święte Starego i Nowego Testamentu, wydawnictwo Pallottinum, 2014, rozdział: Księga Rodzaju
- 13. The NSA Has Quantum Fever, [online] [access: 15.11.2016]. Available on the Internet: http://motherboard.vice.com/read/the-nsa-has-quantum-feve.
- 14. Wobst R,. Kryptologia. Budowa i łamanie zabezpieczeń, Wydawnictwo: RM, 2002. s.218
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2d3efdee-82bc-4488-ad4e-8bae72bcb0d5