Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 6

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cyber-attack
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
EN
Purpose: The changing market conditions in which an economic entity operates requires its executives to choose management support tools, in particular in the area of locating the company's "bottlenecks". The knowledge of the financial situation of an economic entity becomes indispensable in making decisions at both operational and strategic levels. The aim of the article was to indicate that finance management is one of the most important areas in both current and long-term management of the company's operations in a turbulent environment. Design/methodology/approach: CD PROJEKT Group operating on the global video game market, which is one of the most dynamic sectors of the world economy, was selected for research through purposive sampling. The solutions were developed on the basis of the following research methods: analysis of the literature on the subject, case study, analysis of documents. The financial analysis was conducted on the basis of the inductive inference method, consisting in the examination of the details in the first order, followed by generalizing them in the form of conclusions, synthetic assessment and diagnosis. Trend analysis was used to estimate the likelihood of improvement or deterioration of the financial situation. The temporal scope of the research covered in the period of 2017-2021. During the analytical procedure, selected detailed methods were used, which depended on the issues under consideration as well as problems: balance sheet method, comparative method, indicator method, descriptive methods supported by tables and graphs. Findings: The study confirmed that a turbulent environment has a direct impact on the management, functioning and financial performance of the company. Originality/value: The value of the article is in the analysis of the financial situation of CD PROJEKT Group over the five years and indication of the impact of the turbulent environment on the company's operations. The article is addressed to executive staff in order to make them realize the necessity of conducting ongoing financial analysis in order to locate weak areas of activity and properly adjust the strategy to the capabilities and objectives of the company.
2
EN
In the literature on the subject and international legal acts, there is no universal and common definition of cyberspace. Due to the above lack, countries are moving towards regional cooperation in cybersecurity. This descriptive-analytical research was conducted to illustrate cybersecurity threats (faced by countries and private individuals), the list of which, as a result of digital transformation, is constantly growing. The analysis results presented that a wide range of potential cyber-attacks may affect objects of a tangible and intangible character. This research suggests that in cyberspace, which is essentially intangible, non-physical targets (values) can also be an object of a cyber-attack.
EN
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
EN
Purpose: The article attempts to determine what contemporary globalization is and what opportunities and threats this process creates (in terms of global threats to enterprise information systems). Design/methodology/approach: The management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. In this sense, this article will analyse the threats resulting from the dynamic development of information technology, based on the results of research conducted on a sample of Polish enterprises. Findings: This publication is an attempt to identify the basic threats resulting from the fact that the organization operates in a digitized global reality. Research limitations/implications: It seems that the threats mentioned in the article will be gaining momentum and will be evaluated in the unpredictable today direction. Social implications: The 21st century brought a completely new look at the processes of globalization and management of a modern enterprise. It turns out that information has become the basic tool of competitive struggle in the global market. For this reason, the management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. Originality/value: The article addresses current problems of cyberspace security in the context of globalization. It can be useful for company managers as well as for conducting research in this field.
5
Content available remote Cyberterroryzm vs infrastruktura krytyczna. Cz. 5, System finansowy
PL
Sprawne działanie sektora finansowego opiera się na zaufaniu publicznym. Klienci banków muszą wierzyć, że ich poufne informacje finansowe oraz posiadane aktywa są bezpieczne i dostępn w każdej chwili. Wśród badaczy pojawiają się więc głosy, że utrata dostępu do usług finansowych, nagłe rozprzestrzenienie się fałszywych informacji biznesowych czy chociażby czasowa blokada komunikacji mogą spowodować duże straty w globalnej ekonomii oraz zachwiać wiarą obywateli w stabilność i bezpieczeństwo sektora finansowego. Jako jedną z najbardziej prawdopodobnych przyczyn tego typu zdarzeń wskazuje się działalność terrorystów w cyberprzetrzeni. Autor analizuje wskazane zagrożenia na podstawie udostępnionych społeczności naukowej materiałów i zarejestrowanych incydentów oraz podejmuje próbę oceny zagrożenia tego sektora infrastruktury krytycznej.
EN
The smooth operation of the financial sector is based upon public trust. Clients of banks must believe that their confidential financial information and assets are safe and accessible at any time. Therefore, some researchers claim that loss of access to financial services, sudden spread of false business-related information, or even a temporary communication breakdown, can cause significant losses in global economy and shake citizens' faith in the stability and safety of the financial sector. Activity of terrorists in cyberspace is pointed out as one of the most probable causes of this type of incidents.The author analyzes indicated threats on the basis of materials made available to the scientific community and registered incidents, and attempts to evaluate the threat to this sector of critical infrastructure.
PL
Podano definicje cyberterroryzmu i wyjaśniono specyfikę cyberataków pasywnych oraz aktywnych. Zamieszczono opis trzech cyberataków, ukierunkowanych na infrastrukturę wodociągową. Zestawiono metody nielegalnego zdobywania danych oraz zakłócania pracy systemów informatycznych. Wymieniono najczęstsze błędy, zagrażające bezpieczeństwu przechowywanych danych. Omówiono włoskie doświadczenie, mające na celu wskazanie konieczności zabezpieczenia infrastruktury wodociągowej przed cyberatakami.
EN
The paper presents the definitions of cyberterrorism. In addition, the character of passive and active use of IT information or networks to support or play an attack has been clarified. 3 examples of cyber-attacks on water infrastructure have been described. The illegal methods of data obtaining and disruption of the IT systems work were presented. That was pointed to the most common security threats related to the access of an utility network data. The Italian research, which has aimed at protection for water infrastructure against cyber-attacks, was characterised.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.