Ten serwis zostanie wyłączony 2025-02-11.
Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 9

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cyber-attack
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
One effect of rapid technological progress in the field of processing and storage of information is crime committed withthe use of modern information and communication technologies. Some time ago a completely new area known as cyberspaceappeared within the rapidly evolving sphere of computing. Mankind with its knowledge or ignorance, together with motivation,is the primary source of threats in the era of the information society. Nowadays, in order to commit an offence one does notneed to leave one’s place of residence, it is enough to have a computer, a particular idea and access to the Internet. Knowledgeof masking and hiding on the Web greatly increases the chances of success and confounds the instruments of law enforcementand justice. Law and order, when disrupted by various types of crime, generate in society a sense of fear, injustice and lack of statecontrol. The article discusses the real threat of cyber‑terrorismand ways to use modern tools against state security, and in particularin relation to the safety of railway infrastructure. The authors are of the opinion that the primary element of staying safein cyberspace is the education of institutions responsible for the operation of the Web and ICT systems. Equally important maybe the adoption of permanent rules of law enforcement cooperation with private sector entities, such as internet service providers(ISPs) and administrators of sites, domains and websites relevant to the management of accounts, resources, and permissions.The article also notes that police actions may not be sufficient to effectively combat computer crime related to the threat to criticalinfrastructure systems if the entire society is not also involved in this fight.
2
75%
EN
Purpose: The changing market conditions in which an economic entity operates requires its executives to choose management support tools, in particular in the area of locating the company's "bottlenecks". The knowledge of the financial situation of an economic entity becomes indispensable in making decisions at both operational and strategic levels. The aim of the article was to indicate that finance management is one of the most important areas in both current and long-term management of the company's operations in a turbulent environment. Design/methodology/approach: CD PROJEKT Group operating on the global video game market, which is one of the most dynamic sectors of the world economy, was selected for research through purposive sampling. The solutions were developed on the basis of the following research methods: analysis of the literature on the subject, case study, analysis of documents. The financial analysis was conducted on the basis of the inductive inference method, consisting in the examination of the details in the first order, followed by generalizing them in the form of conclusions, synthetic assessment and diagnosis. Trend analysis was used to estimate the likelihood of improvement or deterioration of the financial situation. The temporal scope of the research covered in the period of 2017-2021. During the analytical procedure, selected detailed methods were used, which depended on the issues under consideration as well as problems: balance sheet method, comparative method, indicator method, descriptive methods supported by tables and graphs. Findings: The study confirmed that a turbulent environment has a direct impact on the management, functioning and financial performance of the company. Originality/value: The value of the article is in the analysis of the financial situation of CD PROJEKT Group over the five years and indication of the impact of the turbulent environment on the company's operations. The article is addressed to executive staff in order to make them realize the necessity of conducting ongoing financial analysis in order to locate weak areas of activity and properly adjust the strategy to the capabilities and objectives of the company.
EN
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
|
|
tom z. 145
321--331
EN
Purpose: The article attempts to determine what contemporary globalization is and what opportunities and threats this process creates (in terms of global threats to enterprise information systems). Design/methodology/approach: The management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. In this sense, this article will analyse the threats resulting from the dynamic development of information technology, based on the results of research conducted on a sample of Polish enterprises. Findings: This publication is an attempt to identify the basic threats resulting from the fact that the organization operates in a digitized global reality. Research limitations/implications: It seems that the threats mentioned in the article will be gaining momentum and will be evaluated in the unpredictable today direction. Social implications: The 21st century brought a completely new look at the processes of globalization and management of a modern enterprise. It turns out that information has become the basic tool of competitive struggle in the global market. For this reason, the management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. Originality/value: The article addresses current problems of cyberspace security in the context of globalization. It can be useful for company managers as well as for conducting research in this field.
PL
Podano definicje cyberterroryzmu i wyjaśniono specyfikę cyberataków pasywnych oraz aktywnych. Zamieszczono opis trzech cyberataków, ukierunkowanych na infrastrukturę wodociągową. Zestawiono metody nielegalnego zdobywania danych oraz zakłócania pracy systemów informatycznych. Wymieniono najczęstsze błędy, zagrażające bezpieczeństwu przechowywanych danych. Omówiono włoskie doświadczenie, mające na celu wskazanie konieczności zabezpieczenia infrastruktury wodociągowej przed cyberatakami.
EN
The paper presents the definitions of cyberterrorism. In addition, the character of passive and active use of IT information or networks to support or play an attack has been clarified. 3 examples of cyber-attacks on water infrastructure have been described. The illegal methods of data obtaining and disruption of the IT systems work were presented. That was pointed to the most common security threats related to the access of an utility network data. The Italian research, which has aimed at protection for water infrastructure against cyber-attacks, was characterised.
6
63%
EN
In the literature on the subject and international legal acts, there is no universal and common definition of cyberspace. Due to the above lack, countries are moving towards regional cooperation in cybersecurity. This descriptive-analytical research was conducted to illustrate cybersecurity threats (faced by countries and private individuals), the list of which, as a result of digital transformation, is constantly growing. The analysis results presented that a wide range of potential cyber-attacks may affect objects of a tangible and intangible character. This research suggests that in cyberspace, which is essentially intangible, non-physical targets (values) can also be an object of a cyber-attack.
|
|
nr 1
101-127
EN
Industrial networks are used to control processes and manufacturing operations of varying scope. Their mission is to provide automatic transfer of information within the structure of distributed control systems. To achieve this industrial networks and systems have to possess ability to withstand wide range of internal and external threats. The consequences of cyber-attacks can potentially be varied from benign traffic disruption, through interventions in the operation (the production process), to deliberate sabotage to cause maximum damage. For this reason, it is important to constantly review environment in which they operate as well as their security.
XX
Sieci przemysłowe są używane do kontrolowania procesów i operacji produkcyjnych różnego zakresu. Ich celem jest dostarczanie automatycznego przepływu informacji w obrębie systemów sterowania. Aby to osiągnąć sieci i systemy przemysłowe muszą mieć możliwość przeciwstawienia się dużej ilości zagrożeń zewnętrznych i wewnętrznych. Konsekwencje cyber-ataków mogą zaczynać się od łagodnego zakłócenia ruchu, poprzez interwencje w pracy (w procesie produkcji), aż do sabotażu powodującego największe szkody. Z tego powodu ważne jest, aby stale kontrolować warunki, w których działają jak również ich bezpieczeństwo.
8
Content available remote Cyberterroryzm vs infrastruktura krytyczna. Cz. 5, System finansowy
63%
|
2017
|
tom Nr 2
184--191
PL
Sprawne działanie sektora finansowego opiera się na zaufaniu publicznym. Klienci banków muszą wierzyć, że ich poufne informacje finansowe oraz posiadane aktywa są bezpieczne i dostępn w każdej chwili. Wśród badaczy pojawiają się więc głosy, że utrata dostępu do usług finansowych, nagłe rozprzestrzenienie się fałszywych informacji biznesowych czy chociażby czasowa blokada komunikacji mogą spowodować duże straty w globalnej ekonomii oraz zachwiać wiarą obywateli w stabilność i bezpieczeństwo sektora finansowego. Jako jedną z najbardziej prawdopodobnych przyczyn tego typu zdarzeń wskazuje się działalność terrorystów w cyberprzetrzeni. Autor analizuje wskazane zagrożenia na podstawie udostępnionych społeczności naukowej materiałów i zarejestrowanych incydentów oraz podejmuje próbę oceny zagrożenia tego sektora infrastruktury krytycznej.
EN
The smooth operation of the financial sector is based upon public trust. Clients of banks must believe that their confidential financial information and assets are safe and accessible at any time. Therefore, some researchers claim that loss of access to financial services, sudden spread of false business-related information, or even a temporary communication breakdown, can cause significant losses in global economy and shake citizens' faith in the stability and safety of the financial sector. Activity of terrorists in cyberspace is pointed out as one of the most probable causes of this type of incidents.The author analyzes indicated threats on the basis of materials made available to the scientific community and registered incidents, and attempts to evaluate the threat to this sector of critical infrastructure.
PL
Zagrożenia wynikające z dokonywania cyberataków stanowią wyzwanie dla bezpieczeństwa narodowego. Takie ataki mogą być wymierzone w każde państwo, aby zakłócić jego codzienne funkcjonowanie. W obliczu złożonych i różnorodnych kryzysów Unia Europejska w ostatnich dekadach zwiększyła swoje możliwości reagowania, wprowadzając do art. 42 ust. 7 Traktatu o Unii Europejskiej (TUE) tzw. klauzulę pomocy i wsparcia, mającą zastosowanie w przypadku zbrojnej agresji przeciwko państwu członkowskiemu UE na jego terytorium. Głównym celem niniejszej publikacji jest analiza potencjalnych warunków zastosowania art. 42 ust. 7 TUE w odpowiedzi na operacje cybernetyczne. Autor argumentuje, że w określonych sytuacjach klauzula pomocy i wsparcia z art. 42 ust. 7 TUE może być stosowana w odpowiedzi na niektóre operacje cybernetyczne przeciwko państwu członkowskiemu UE na jego terytorium.
EN
The threat posed by the occurrence of cyber-attacks constitutes a challenge to national security. Such attacks may target and disturb the daily functioning of any state. Faced with complex and diverse crises, the European Union (EU) has improved its response capacities over the last decades, introducing a so-called ‘aid and assistance clause’ into Article 42(7) of the Treaty on European Union (TEU) applicable in the case of armed aggression against an EU member state on its territory. The main objective of this publication is to examine potential conditions for the application of Article 42(7) TEU in response to cyber operations. The author argues that under certain conditions, the aid and assistance clause in Article 42(7) TEU may be invoked in response to certain cyber operations against an EU member state on its territory.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.