PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Defined cybersecurity threats in undefined cyberspace

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the literature on the subject and international legal acts, there is no universal and common definition of cyberspace. Due to the above lack, countries are moving towards regional cooperation in cybersecurity. This descriptive-analytical research was conducted to illustrate cybersecurity threats (faced by countries and private individuals), the list of which, as a result of digital transformation, is constantly growing. The analysis results presented that a wide range of potential cyber-attacks may affect objects of a tangible and intangible character. This research suggests that in cyberspace, which is essentially intangible, non-physical targets (values) can also be an object of a cyber-attack.
Czasopismo
Rocznik
Strony
31--39
Opis fizyczny
Bibliogr. 24 poz.
Twórcy
  • Cardinal Stefan Wyszyński University in Warsaw, Faculty of Law and Administration, Poland
Bibliografia
  • 1. Chmielewski M. (2022). Działania w cyberprzestrzeni. Narzędzia, Organizacja, Metody (Actions in cyberspace. Tools, Organisation, Methods) https://www.researchgate.net/publication/366275555_Dzialania_w_cyberprzestrz eni_Narzedzia_Organizacja_Metody [access: 28.06.2023].
  • 2. Computer Security Resource Center. https://csrc.nist.gov/glossary/term/malware [access: 28.06.2023].
  • 3. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive).
  • 4. EC-Council. (2023). What is Threat Intelligence in Cybersecurity? https://www.eccouncil.org/cybersecurity/what-is-cyber-threat-intelligence/ [access: 28.06.2023].
  • 5. European Union Agency for Cybersecurity. (2023). What is "Social Engineering"? https://www.enisa.europa.eu/topics/incident-response/glossary/what-is-social- engineering [access: 28.06.2023].
  • 6. International Telecommunication Union. https://www.itu.int/en/ITU- T/studygroups/com17/Pages/cybersecurity.aspx [access: 28.06.2023].
  • 7. Ivanowa K.A., Myltykbaev M.Zh., Shtodina D.D. (2022). The concept of cyberspace in international law. Law Enforcement Review, vol. 6, no. 4, pp. 32–44.
  • 8. Lambach D. (2019). The Territorialization of Cyberspace. International Studies Review, vol. 22, no. 3, pp. 482–506.
  • 9. Liaropoulos A. (2017). Cyberspace Governance and State Sovereignty. In: G.C. Bitros, N.C. Kyriazis (ed.), Democracy and an Open-Economy World Order. Springer, New York City, pp. 25–35.
  • 10. Moore M. (2023). Top Cybersecurity Threats in 2023. https://onlinedegrees.sandiego.edu/top-cyber-security-threats/ [access: 28.06.2023].
  • 11. Odebade A.T., Benkhelifa E. (2023). A Comparative Study of National Cyber Security Strategies of ten nations. https://www.researchgate.net/publication/369540767_A_Comparative_Study_of_N ational_Cyber_Security_Strategies_of_ten_nations [access: 28.06.2023].
  • 12. Olejnik Ł., Kurasiński A. (2022). Filozofia Cyberbezpieczeństwa. Jak zmienia się świat? Od złośliwego oprogramowania do cyberwojny (Cybersecurity philosophy. How is the world changing. From malware to cyber warfare). Wydawnictwo Naukowe PWN, Warszawa.
  • 13. Perlroth N. (2022). This Is How They Tell Me the World Ends: A True Story. Bloomsbury Publishing, New York City.
  • 14. Portman C.P (1986). Jurisprudence: A Descriptive and Normative Analysis of Law. Michigan Law Review, vol. 84, Issue 4, pp. 1041–1046.
  • 15. Report of the Open-ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security of 18 March 2021, A/75/816.
  • 16. Resolution No. 125 of the Council of Ministers of the Republic of Poland of 22 October 2019 on the Cybersecurity Strategy of the Republic of Poland for 2019–2024.
  • 17. Resolution of the General Assembly of 5 December 2018, A/RES/73/27.
  • 18. Sanger D.E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishing Group, New York City.
  • 19. Serrano Iova R., Watashiba T. (2023). NCSS: A Global Census of National Positions on Conflict, Neutrality and Cooperation. https://www.researchgate.net/publication/371703348_NCSS_A_global_census_of_n ational_positions_on_conflict_neutrality_and_cooperation [access: 28.06.2023].
  • 20. Singh D., Mohanty N.P., Swagatika S., Kumar S. (2020). The key Concept for Cyber Security in Cyberspace. Test Engineering and Management, vol. 83, pp. 8145–8152.
  • 21. Smeets M. (2022). The Role of Military Cyber Exercises: A Case Study of Locked Shields. In: T. Jančárková, G. Visky, I. Winther (ed.), 14th International Conference on Cyber Conflict: Keep Moving. CCDCOE, Tallinn, pp. 9–26.
  • 22. Szpor G., Gryszczyńska A. (2022). Hacking in the (Cyber)Space. GIS Odyssey Journal, vol. 2, no. 1, pp. 141–152.
  • 23. The Commonwealth of Massachusetts. https://www.mass.gov/service-details/know- the-types-of-cyber-threats [access: 28.06.2023].
  • 24. Wielec M., Oręziak B. (2023). Cyberprzestrzeń i cyberprzestępczość: uwagi dotyczące definicji z elementami analizy prawnoporównawczej (Cyberspace and cybercrime: comments on definition with elements of comparative law analysis) In: M. Wielec (ed.), Cyberbezpieczeństwo na rzecz zapobiegania przyczynom przestępczości (Cybersecurity to prevent crime causes). Wydawnictwo Instytutu Wymiaru Sprawiedliwości, Warszawa, pp. 9–34.
Uwagi
PL
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-6ffea86b-6c54-4b82-a8d8-23bb7fa6a28f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.