PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Tackling cyberspace threats – The international approach

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
Rocznik
Strony
100--117
Opis fizyczny
Bibliogr. 17 poz., rys.
Twórcy
  • War Studies University, Warsaw, Poland, Faculty of Military Studies, Cyberspace Security Branch
Bibliografia
  • 1. Cybersecurity. A generic reference curriculum, 1217-16 NATO Graphics & Printing, ISBN 978-92-845-0196-0.
  • 2. Cyberspace protection policy of the Republic of Poland, Warsaw, 25 June 2013.
  • 3. Denning D.E., Wojna informacyjna i bezpieczeństwo informacji, Warszawa, 2002.
  • 4. Department of Defense Dictionary of Military and Associated Terms, Joint Chiefs of Staff USA, February 2016.
  • 5. EU Concept on Cyber Defence for EU-led Military Operations and Missions, Brussels, 14 November 2016.
  • 6. Grzelak M., Międzynarodowa strategia USA dla cyberprzestrzeni, kwartalnik Bezpieczeństwo Narodowe II-2011/18.
  • 7. Information systems defence and security France’s strategy, February 2011.
  • 8. Major General M. de LANGLOIS A. CAPSTACK, The role of the military in the EU’s external action, IRSEM, 2014 No 23, ISBN 978-2-11-138614-3.
  • 9. Kissel R., Glossary of Key Information Security Terms, National Institute of Standards and Technology, May 2013.
  • 10. National cyber security strategy 2016-2021, HM Government, 2016, p. 75.
  • 11. Pilarski G., Ochrona informacji w sieciach komputerowych, AON, Warszawa 2004.
  • 12. The UK Cyber Security Strategy Protecting and promoting the UK in a digital world, Cabinet Office, London, November 2011.
  • 13. Ustawa z dnia 16 lipca 2004 r. - Prawo telekomunikacyjne (Dz. U. Nr 171, poz. 1800, z późn. zm.).
  • 14. https://www.ecs-org.eu/ - access February 2017.
  • 15. http://www.nato.int/ - access February 2017. http://www.first.org/ - access February 2017.
  • 16. https://www.cybsecurity.org/ - access February 2017.
  • 17. http://www.cert.gov.pl/- access February 2017.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-da701855-97e6-4052-a533-a769f1ad1fe4
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.