PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Threats from cyberspace for civil aviation

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Digital transformation and mobility, which is what drives the revolution in aviation, they are also a challenge to ensure safety. Increasing automation means a greater risk of cyberattack. The author in the article below touches on the issues related to Cyberspace, characterizes it and shows the issues related to violation of civil aviation security by performing cyberattacks, drone attacks, and thus violating civil aviation security. Civil aviation is a specific user of highly advanced information technology and therefore requires special protection against unauthorized access (cyberattacks). This protection covers the entire aviation ecosystem, and in it; Air Traffic Control, aircraft (aviation industry), airports. In the whole process of civil aviation security, and in particular the prevention of cyberattacks and air terrorism, legislation plays a very important role. In recent decades we have witnessed various events that were a serious threat to the safety of air navigation. These situations gave impetus to search and creating new preventive systems ensuring a high level of security in international civil aviation transport.
Czasopismo
Rocznik
Tom
Strony
124--153
Opis fizyczny
Bibliogr. 30 poz.
Twórcy
Bibliografia
  • Bógadał-Brzezińska A., Gawrycki F. M., Cyberterrorism and the problem of IT security in the modern world, ASPRA-JR, arsaw 2003
  • Borowik, R., Transformations of cultural awareness in the era of the information society, http://www.uci.agh.edu.pl/agh/dep/wsss/konferencja/doc
  • Dobrzeniecki K., Law and ethos of cyberspace, Adam Marszałek, Toruń 2021, p. 11
  • Gagnon B., Are We Headed for a “Cyber-9/11?”: The American Failure in Cyberstrategy, Center for United States Studies of the Raoul Dandurand Chair of Strategic and Diplomatic Studies, Occasional Paper no 5, Quebec, 2004
  • Gibson W., Neuromancer, ed. II, Poznan 1999
  • Horoszkiewicz J., Internet - uncontrolled zone in cyberspace, Political Review, 2001. No. 2 (62)
  • Kisieliński S., The government wants to protect the cyberspace of the Republic of Poland, Computerworld.pl, February 5, 2009
  • Janowska A., Cyberterrorism - reality or fiction ?, [in:] Information society - vision or reality ?, Kraków 2003,http://www.angelfire.com/az/sthurston/Cyberwar.html
  • Jasper S., Conflict and Cooperation in the Global Commons. A Comprehensive Approach for International Security, Georgetown University Press/Washington, DC, 2012
  • Koziej S., Security: Essence, basic categories and historical evolution, National Security, 2011, No. 18
  • Leśnikowski W., Unmanned platforms in cyberspace, Adam Marszałek Toruń, 2017
  • Leśnikowski W., Welcome to the cyberwar world, Air Force Review, 2011, No. 4 (046)
  • Leśnikowski W., Military use of cyberspace and conventional combat operations, Monograph, Contemporary bioterrorist and cyberterrorist threats and Polish national security, Warsaw, December 2013
  • Leśnikowski W., Cyberattacks against critical infrastructure as cheap and effective means to paralyze developed countries, Air Force Review, September 2012 No. 02 (059), (electronic version)
  • Leśnikowski W., Welcome to the world of cyberwar part. one; Air Force Review, 2011 No. 4 (046)
  • Rattray J. Gregory Strategic war in cyberspace. Secret - Attack - Defense. Scientific and Technical Publishing House, Warsaw 2004
  • The governmental cyberspace protection program of the Republic of Poland for 2011-2016, version 1.1, June 2010) Sienkiewicz P., 25 lectures, AON, 2013
  • Sienkiewicz P., Świeboda H., Lichocki E., System analysis of the phenomenon of cyberterrorism, National Defence Academy.. http://www1.aon.edu.pl/zen2/index.php?option=content&task=view&id=571
  • ŹRÓDŁA
  • SOURCES
  • Directions of development of the command system of the Polish Armed Forces - selected aspects, http://www.angelfire.com/az/sthurston/Cyberwar.html
  • https://rcb.gov.pl/infrastruktura-krytyczna/
  • https://www.aiaa.org/"ecosystem" of aviation - www.rynekinfrastruktury.pl/.../nowa-strategia-rozkieta-europejskiego-lotnictwa-52198....
  • www.dictionary.com/browse/fbi
  • www.dictionary.com/browse/fbi
  • Technologia.dziennik.pl/.../502623,expert-warns-hackers-can-attack-plane
  • http://www.altair.com.pl/news/view?news_id=18466
  • https://www.icao.int/
  • https://pl.wikipedia.org/.../International_ association of _air carriers
  • m.pl.relyrfwireless.com/info/rf-testing-definition-description-22424659.html
  • www.ulc.gov.pl/pl/urzad/kierownictwo/248-wazne/1482-easa
  • https://www.recode.net/2017/2/14/14600030/dedrone-disarm-illegal-drones-15-million-funding
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8f223a36-bb02-42ee-b795-b3e98f8b3e9e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.