Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Verification of Challenges And Threats in Normative Documents Regulating The Cybersecurity of The State

Authors

[ 1 ] Wydział Wojskowy, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.3] Security studies

Year of publication

2022

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • Cyberspace
  • Hazards
  • Information security
  • Military telecommunication
  • National security
  • Security strategy
Abstract

EN The article presents hazards and indicates opportunities and risks highlighted in the documents standardising cyberspace functioning. The author made an attempt to answer the following question: How are the state’s cybersecurity challenges and hazards characterised in normative documents? Since the emergence of the Internet, different countries have pointed out the growing significance of national regulations and international agreements on cyberspace nature. Cybersecurity is a vital area nowadays since it protects all data categories from theft and damage. It covers sensitive data, information enabling identifying a person, protected health information, personal data, intellectual property, data and governmental and sectoral ICT systems. The research problem concerns evaluation of standards used in Polish reality are supposed to present a general evaluation of the fitness, correctness and validity of cybersecurity challenges and hazards. For the analysis of the factual material, selected theoretical methods were used, such as analysis, synthesis, comparison and deductive inference. It allowed to put forward the thesis of a general increase in the risk of using the Internet, aggravated by global communication and using cloud services to store sensitive and personal data. The typically poor configuration of cloud services combined with increasingly sophisticated cybercriminals means a rising risk of successful cyberattacks and data violence. Without implementing legal acts and establishing specific cybersecurity programmes, no contemporary organisation can defend itself from attempted data security breaches, making it an easy target for cybercriminals.

Date of online publication

07.02.2023

Pages (from - to)

170 - 180

Comments

Bibliografia na stronie 180.

Book

Proceedings of the 40th International Business Information Management Association (IBIMA), 23-24 November 2022, Seville, Spain. Business Success and Innovation Management: A 2025 Vision to Sustain Economic Development During Global Crisis

Presented on

40th International Business Information Management Association Conference (IBIMA), 23-24.11.2022, Seville, Spain

Ministry points / chapter

5

Ministry points / chapter (humanities, social sciences and theology)

5

Ministry points / conference (CORE)

70