PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cyber(in)security

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanced technical and cultural creation – it is an embodiment of dreams of numerous creators, inventors and engineers; (2) a technical one: security and cyberspace are inseparable components (hence cybersecurity); (3) and a paranoid one: complete security, if achievable, is not a permanent state (hence cyber(in)security). Cyberspace is conceived as a set of digital techniques used to exchange information but also as a new type of social space, partially virtual, which may constitute a being entirely separated from a physical one. A pivotal date for arising of cyberspace may be considered the year 1968 in which routing in the ARPANET network appeared and so did the first programmable logical controller (PLC). For cyberspace this will be the year 1976 – publishing of the key agreement protocol by Witfield Diffie and Martin Hellman. Development of security is correlated with warfare and armament – the military sector has historically made the most significant investments in this area.
Słowa kluczowe
Twórcy
  • 1. Faculty of Electronics and Information Technologies, Institute of Telecommunications, Cybersecurity Division, Warsaw University of Technology, Poland
  • 2. Cybersecurity and Data Science Research Centre, Warsaw University of Technology, Poland
  • 3. Cryptomage S.A., Poland
Bibliografia
  • [1] Wikipedia contributors,“Cyberspace - Wikipedia, The Free Encyclopedia,” https://en.wikipedia.org/wiki/Cyberspace, 2020, [Online; accessed 3-February-2020].
  • [2] V. Pleszakov, https://www.litres.ru/vladimir-pleshakov/kibersocializaciya-cheloveka-ot-homo-sapiens-a-do-homo-cyberus-a/,2012.
  • [3] J. Lillemose and M. Kryger, “The (Re)invention of Cyberspace – Kunstkritikk,” https://kunstkritikk.com/the-reinvention-of-cyberspace/, 2015, [Online; accessed 3-February-2020].
  • [4] Wikipedia contributors, “William Gibson - Wikipedia, The Free Encyclopedia,” https://en.wikipedia.org/w/index.php?title=William_Gibson&oldid=937885621, 2020, [Online; accessed 3-February-2020].
  • [5] F. Arute, K. Arya, R. Babbush, D. Bacon, J. Bardin, R. Barends, R. Biswas, S. Boixo, F. Brandao, D. Buell, B. Burkett, Y. Chen, Z. Chen, B. Chiaro, R. Collins, W. Courtney, A. Dunsworth, E. Farhi, B. Foxen, and J. Martinis, “Quantum supremacy using a programmable superconducting processor,” Nature, vol. 574, pp. 505–510, 10 2019.
  • [6] D. J. Bernstein and T. Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017. [Online]. Available: http://dx.doi.org/10.1038/nature23461
  • [7] Wikipedia contributors, “Enigma machine - Wikipedia, The Free Encyclopedia,” https://en.wikipedia.org/wiki/Enigma_machine, 2020, [Online; accessed 3-February-2020].
  • [8] Crypto Museum, “Bombe,” https://www.cryptomuseum.com/crypto/bombe/, 2020, [Online; accessed 3-February-2020].
  • [9] B. Leiner, V. Cerf, D. Clark, R. Kahn, L. Kleinrock, D. Lynch, J. Postel, L. Roberts, and S. Wolff, “A brief history of the internet,” Computer Communication Review, vol. 39, pp. 22–31, 10 2009.
  • [10] AutomationDirect.com, “History of the PLC,” https://library.automationdirect.com/history-of-the-plc/, 2020, [Online; accessed 3-February-2020].
  • [11] “Specification of Internet Transmission Control Program,” RFC 675, Dec. 1974. [Online]. Available: https://rfc-editor.org/rfc/rfc675.txt
  • [12] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theor., vol. 22, no. 6, p. 644–654, Sep. 2006. [Online]. Available: https://doi.org/10.1109/TIT.1976.1055638
  • [13] Des, “Data encryption standard,” in In FIPS PUB 46, Federal Information Processing Standards Publication, 1977, pp. 46–2.
  • [14] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, p. 120–126, Feb. 1978. [Online]. Available: https://doi.org/10.1145/359340.359342
  • [15] Wikipedia contributors, “Silicon valley - Wikipedia, the free encyclopedia,” https://en.wikipedia.org/wiki/Silicon_Valley, 2020, [Online; accessed 3-February-2020].
  • [16] U.S. Army Cyber Command, “Army Cyber Command Home,” https://www.arcyber.army.mil/, 2020, [Online; accessed 3-February-2020].
  • [17] BMBF-Internetredaktion, “Industrie 4.0 - BMBF,” https://www.bmbf.de/de/zukunftsprojekt-industrie-4-0-848.html, 2020, [Online; accessed 3-February-2020].
  • [18] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (iiot): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, 10 2018.
  • [19] [accessed 3-February-2020]. [Online]. Available: https://glavcom.ua/scotch/showbiz/kultovaya-trilogiya-matrica-oficialno-poluchit-perezapusk-483980/g358176.html
  • [20] “The Matrix Fan Theory Puts Agent Smith As The One, And It Kind Of Works - CINEMABLEND,” https://www.cinemablend.com/new/Matrix-Fan-Theory-Puts-Agent-Smith-One-It-Kind-Works-121077.html, 2020, [Online; accessed 3-February-2020].
  • [21] B. Stafanowicz, “Informacja, wiedza, mądrość,” Biblioteka Wiadomości Statystycznych, t. 66, 2013.
  • [22] ISO, “7498-2. information processing systems open systems interconnection basic reference model-part 2: Security architecture,” ISO Geneva, Switzerland, 1989.
  • [23] N. Perlroth, J. Larson, and S. Shane, “N.S.A. Able to Foil Basic Safeguards of Privacy on Web,” https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html, 2013, [Online; accessed 3February-2020].
  • [24] ISO, “Risk Management-Guidelines (Standard No. ISO 31000: 2018),” ISO, vol. 31000, 2018.
  • [25] J. Bieniasz, M. Stepkowska, A. Janicki, and K. Szczypiorski, “Mobile agents for detecting network attacks using timing covert channels,” J. UCS, vol. 25, no. 9, pp. 1109–1130, 2019. [Online]. Available: http://www.jucs.org/jucs 25 9/mobile agents for detecting
  • [26] “Lucy (2014),” https://www.imdb.com/title/tt2872732/, 2014, [Online; accessed 3-February-2020].
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ee8483bc-b126-45ce-88ea-56cb7cc16acd
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.