W zależności od ilości danych do przetworzenia generowanie pliku może się wydłużyć.

Jeśli generowanie trwa zbyt długo można ograniczyć dane np. zmniejszając zakres lat.

Rozdział

Pobierz BibTeX

Tytuł

Verification of Challenges And Threats in Normative Documents Regulating The Cybersecurity of The State

Autorzy

[ 1 ] Wydział Wojskowy, Akademia Sztuki Wojennej | [ P ] pracownik

Dyscyplina naukowa (Ustawa 2.0)

[6.3] Nauki o bezpieczeństwie

Rok publikacji

2022

Typ rozdziału

rozdział w monografii naukowej / referat

Język publikacji

angielski

Słowa kluczowe
EN
  • Cyberspace
  • Hazards
  • Information security
  • Military telecommunication
  • National security
  • Security strategy
Streszczenie

EN The article presents hazards and indicates opportunities and risks highlighted in the documents standardising cyberspace functioning. The author made an attempt to answer the following question: How are the state’s cybersecurity challenges and hazards characterised in normative documents? Since the emergence of the Internet, different countries have pointed out the growing significance of national regulations and international agreements on cyberspace nature. Cybersecurity is a vital area nowadays since it protects all data categories from theft and damage. It covers sensitive data, information enabling identifying a person, protected health information, personal data, intellectual property, data and governmental and sectoral ICT systems. The research problem concerns evaluation of standards used in Polish reality are supposed to present a general evaluation of the fitness, correctness and validity of cybersecurity challenges and hazards. For the analysis of the factual material, selected theoretical methods were used, such as analysis, synthesis, comparison and deductive inference. It allowed to put forward the thesis of a general increase in the risk of using the Internet, aggravated by global communication and using cloud services to store sensitive and personal data. The typically poor configuration of cloud services combined with increasingly sophisticated cybercriminals means a rising risk of successful cyberattacks and data violence. Without implementing legal acts and establishing specific cybersecurity programmes, no contemporary organisation can defend itself from attempted data security breaches, making it an easy target for cybercriminals.

Data udostępnienia online

07.02.2023

Strony (od-do)

170 - 180

Uwagi

Bibliografia na stronie 180.

Książka

Proceedings of the 40th International Business Information Management Association (IBIMA), 23-24 November 2022, Seville, Spain. Business Success and Innovation Management: A 2025 Vision to Sustain Economic Development During Global Crisis

Zaprezentowany na

40th International Business Information Management Association Conference (IBIMA), 23-24.11.2022, Seville, Spain

Punktacja Ministerstwa / rozdział

5

Punktacja Ministerstwa / rozdział (nauki humanistyczne, społeczne i teologiczne)

5

Punktacja Ministerstwa / konferencja (CORE)

70