Cybersecurity: Notorious, but Often Misused and Confused Terms

Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník
{"title":"Cybersecurity: Notorious, but Often Misused and Confused Terms","authors":"Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník","doi":"10.5817/mujlt2023-2-5","DOIUrl":null,"url":null,"abstract":"The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining \"the same\". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Masaryk University Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5817/mujlt2023-2-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining "the same". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.
网络安全:臭名昭著,但经常被误用和混淆的术语
该条款涉及在实施和提供网络和信息安全时使用的术语问题。虽然这个术语被理解为臭名昭著,但实践表明,对“相同”的定义有不同的观点。如今,主要是在通过欧洲议会和理事会关于确保欧盟网络安全高水平共同措施(NIS 2)的指令(EU) 2022/2555的背景下,需要对所使用的术语进行一致的解释,特别是理解,以便真正确保网络安全和信息安全。在分析比较各种定义的基础上,提出了清晰、通用、普遍适用的关键术语定义。这些术语之间的关系是在一个概念模型中提出的,也通过一个实际的例子。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.00
自引率
0.00%
发文量
9
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信