PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Attributes of cyber conflict in the context of armed conflict : an outline of the problem

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Objectives: This article explains the concepts of cyber conflict attributes in relation to the classical attributes of armed conflicts. Problems related to the study of the causes of armed conflicts and wars, forms of their conduct, ending and ways of their resolution. This paper outlines selected definitions of conflict and war that have formed the basis of analysis for the attributes of cyber conflict - in particular the attributes of: nature, forms, sources, complexity, and the difficulty of uniquely identifying the "aggressor" if the attack is not "overt". Methods: Statistical analysis, document analysis. Results: The characteristics of a cyber conflict are, in particular: no certain identification of the aggressor, no possibility of an official declaration of war or official defense and retaliation. Conclusions: The key determinant of defense - should be digital and electromagnetic offensive measures. Security threats and more frequent attacks in broadly defined cyberspace have unquestionably become the challenge of today’s world - consisting of alliances, which the sum of security being the security levels of individual members and their defense capabilities. However only the level of commitment and cooperation can contribute to the achievement of a common goal, defined by the Alliance - including, above all, the elaboration of common, acceptable by all members - „modern” solutions. However, the common defense and deterrence potential equipped with real, though digital, both offensive and defensive resources would allow practical implementation of the challenge for art.
Słowa kluczowe
Rocznik
Strony
134--154
Opis fizyczny
Bibliogr. 12 poz.
Twórcy
  • Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego, ul. gen. Sylwestra Kaliskiego 2, 00-908, Warszawa
Bibliografia
  • [1] Balcerowicz, B. (2002) Peace and non‐peace. Bellona, p. 160.
  • [2] Kęsoń, T. (1999) Contemporary armed conflicts in the aspect of forecasting military threats of the Republic of Poland – doctoral dissertation. AON – Warsaw, p. 21.
  • [3] Sun Tzu (1994) The art of war. Przedświt, p. 7, 13.
  • [4] C. von Clausewitz (1958) About war. Warsaw, p. 15.
  • [5] Cesarz, Z. (1993) Contemporary political problems in the world. University of Wroclaw, p. 30–31.
  • [6] Gałganek, A. (1986) Polemology – studies on war and peace. International Affairs, 6, p. 112.
  • [7] Rotfeld, D. (2010) NATO 2020. Zapewnione bezpieczeństwo. Dynamiczne zaangażowanie („Raport Albright”). Polski Instytut Spraw Międzynarodowych, Warszawa.
  • Electronic sources
  • [1] Brzeziński, Z. (2013) The New Rules of Cyber-War. Tvo Today.
  • https://www.tvo.org/transcript/2104174/zbigniew-brzezinski-the-new-rules-of-cyber-war
  • [2] Czulda, R. (2013) Virtual attack. Polska-zbrojna.pl. http://polska-zbrojna.pl/home/articleinmagazineshow/10171?t=ATAK-W-WIRTUALU.
  • [3] III Geneva Convention Relative to The Treatment of Prisoners of War of 12 August 1949: http://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.32_GC-III-EN.pdf
  • [4] Grzelak, M.,Liedel, K. Security in cyberspace. Threats and challenges for Poland – an outline of the problem. http://www.bbn.gov.pl.
  • [5] Rosenberg, M., Nixon, R. (2017) Kaspersky lab antivirus software is ordered Off U.S. government computers. https://www.nytimes.com/2017/09/13/us/politics/kaspersky-lab-antivirus-federal-government.html?searchResultPosition=1.
Uwagi
Dwa liczbowania bibliografii
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b6750f9c-3385-4a7e-9e22-20bdd265d3b0
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.