Cybersecurity & Cybercrime最新文献

筛选
英文 中文
E-MAIL AS AN ATTACK TOOL 电子邮件是一种攻击工具
Cybersecurity & Cybercrime Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8017
Piotr Dela
{"title":"E-MAIL AS AN ATTACK TOOL","authors":"Piotr Dela","doi":"10.5604/01.3001.0053.8017","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8017","url":null,"abstract":"The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STANDARDIZATION IN COMBATING CYBERCRIME AREA 规范打击网络犯罪领域
Cybersecurity & Cybercrime Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8024
P. Rybicki
{"title":"STANDARDIZATION IN COMBATING CYBERCRIME AREA","authors":"P. Rybicki","doi":"10.5604/01.3001.0053.8024","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8024","url":null,"abstract":"Cybercrime is an area where improving the effectiveness and interaction of law enforcementagencies is becoming increasingly important today. Standards, understood as technical documentscontaining rules, guidelines or definitions, can be used for this purpose. The article characterisesthe different standards and the standardisation organisations responsible for their development. Itthen presents the common standards operating in the field of cybercrime, in particular, those thatcan be implemented by any organisation that decides to take steps for a so-called 'incidentresponse'. Against this backdrop, a standard linked to the conduct of criminal investigations ischaracterised in more detail, which provides guidance for the handling of digital evidence and canbe used by police organisations to increase the effectiveness of their operations and improveinteroperability. Finally, the results of a study on priority standardisation domains in the area ofcybercrime were presented. These domains were developed based on standardisation proposalsmade by law enforcement representatives from European countries and then prioritised in terms ofimportance and urgency. The resulting recommendations should serve as a basis forstandardisation work in the near future.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CYBER OPERATIONS IN HYBRID CONFLICTS - LESSONS FROM THE 混合冲突中的网络作战——来自美国的教训
Cybersecurity & Cybercrime Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8019
Jakub Syta
{"title":"CYBER OPERATIONS IN HYBRID CONFLICTS - LESSONS FROM THE","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8019","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8019","url":null,"abstract":"This review article presents selected use cases where information technology was used duringRussia's war with Ukraine in 2022. The analysis of these events allows to draw conclusions aboutthe effectiveness of the various activities taking place in cyberspace, which may also be relevantin future conflicts. The conclusions relate to the provision of uninterrupted communications,cyber attacks destroying physical infrastructure elements, the use of mobile phones, theeffectiveness of OSINT activities, and the effectiveness of disinformation and propagandaactivities.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE IMPACT OF USING SOCIAL MEDIA IN ISLAMIC STATEPROPAGANDA ON SECURITY AND PUBLIC ORDER. PRESENTATION OFRESEARCH OUTCOME 在伊斯兰国家宣传中使用社交媒体对安全和公共秩序的影响。研究成果展示
Cybersecurity & Cybercrime Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8022
Sylwia Gliwa
{"title":"THE IMPACT OF USING SOCIAL MEDIA IN ISLAMIC STATEPROPAGANDA ON SECURITY AND PUBLIC ORDER. PRESENTATION OFRESEARCH OUTCOME","authors":"Sylwia Gliwa","doi":"10.5604/01.3001.0053.8022","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8022","url":null,"abstract":"The aim of this article is to present the outcome of my research conducted during my PhD studiesand presented in my PhD dissertation “The impact of using social media in Islamic Statepropaganda on security and public order”. The paper presents the outcome of research that coversgraphic, audio and video materials to show the impact of ISIS propaganda on security and publicorder. The conducted analysis covered the content published through social media platforms anddirected to the people of Western countries and Russia.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BOHATEROWIE CZY PRZESTĘPCY” - ANALIZA GRUPY ANONYMOUS
Cybersecurity & Cybercrime Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8031
Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska
{"title":"BOHATEROWIE CZY PRZESTĘPCY” - ANALIZA GRUPY ANONYMOUS","authors":"Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska","doi":"10.5604/01.3001.0053.8031","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8031","url":null,"abstract":"Celem artykułu jest omówienie działalności grupy Anonymous oraz próba określenia jejcharakteru oraz specyfiki poprzez analizę zarówno prowadzonych przez grupę akcji w przeszłości(“Project Chanology”, “Operacja Payback”, “Operacja Tunezja”, “Operacja Egipt”), jak i akcjiaktualnych (“Operacja Rosja”), związanych z trwającym zbrojnym konfliktem ukraińsko –rosyjskim.Istotnym elementem jest określenie stanowiska szeroko pojmowanej opinii publicznej orazuwzględnienie zapisów prawnych, obowiązujących na terenie Stanów Zjednoczonych, UniiEuropejskiej, jak i samej Rosji, które posłużyły w obiektywnej ocenie działalności grupy. Wramach próby uzyskania odpowiedzi na pytanie: „Czy grupa Anonymous powinna byćpostrzegana jako przestępcy, czy jako bohaterowie?”, podjęta została analiza komentarzy,postów, działań użytkowników w mediach społecznościowych oraz poszczególnych kolektywówzwiązanych z grupą („squad303”, „GhostSec”). Całość rozważań dotycząca sposobupostrzegania grupy Anonymous ma charakter teoretyczny i nie rozstrzyga ostatecznie związanegoz zagadnieniem dyskursu.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE 加强空间物体网络安全的活动
Cybersecurity & Cybercrime Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8013
Damian Skrzynecki
{"title":"ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE","authors":"Damian Skrzynecki","doi":"10.5604/01.3001.0053.8013","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8013","url":null,"abstract":"Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object and the control station, and in the space itself. In order to neutralizethreats and ensure business continuity, inter alia: encrypted communication, createsappropriate legal requirements and standards, and uses new technologies to better secureobjects in space.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE ROLE OF CISO IN MODERN ORGANIZATIONS ciso在现代组织中的作用
Cybersecurity & Cybercrime Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8008
Jakub Syta
{"title":"THE ROLE OF CISO IN MODERN ORGANIZATIONS","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8008","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8008","url":null,"abstract":"This paper characterizes the different areas of knowledge and skills that are useful forthe Chief Information Security Officer (CISO) role. It juxtaposes these with the variousspecializations that are emerging in the cybersecurity field. The work should alloworganizations to more consciously select candidates for the role of CISO who will meetthe expectations","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INVESTMENTS IN THE AREA OF CYBERSECURITY IN RUSSIANFEDERATION BETWEEN 2018 AND 2022 2018年至2022年俄罗斯联邦网络安全领域的投资
Cybersecurity & Cybercrime Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8003
Andrzej Tałuć
{"title":"INVESTMENTS IN THE AREA OF CYBERSECURITY IN RUSSIANFEDERATION BETWEEN 2018 AND 2022","authors":"Andrzej Tałuć","doi":"10.5604/01.3001.0053.8003","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8003","url":null,"abstract":"The study presents the level of financial investments made between 2018 and 2022 byRussian Federation authorities in the sector related to cybersecurity of the state.The text covers the following areas: expenses incurred for cybersecurity, projects\"Digital economy\" and \"Independent Internet\", funds to support Russian programmers,data security in rail transport, radio and TV, biometric security in passports,participation of commercial entities in the government program \"Digital economy\",expenses for independent test centers, software and hardware, as well as filteringinternet traffic among children and detecting any malicious activities related to it.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STATISTICAL ANALYSIS OF INTERNAL DYNAMICS OF ARC4 STREAMCIPHER arc4流密码内部动态的统计分析
Cybersecurity & Cybercrime Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8010
Teodor Buchner
{"title":"STATISTICAL ANALYSIS OF INTERNAL DYNAMICS OF ARC4 STREAMCIPHER","authors":"Teodor Buchner","doi":"10.5604/01.3001.0053.8010","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8010","url":null,"abstract":"The aim of this paper is to show, how the approach of nonlinear dynamics and statisticalphysics help to analyze pseudorandom number generators (PRNG) used incryptography. In fact, each PRNG is a highly nonlinear dynamical system, with itsinternal states, and may be analyzed as such.It is shown using PRNG of ARC4 stream cipher as example. A nonlinear phenomenon:1/fα dynamics was found in the new measure of complexity of the cipher: female count,a combinatorial quantity of direct cryptological bearing. We show that this measure canbe helpful in such tasks as measuring stationarity of internal dynamics of the PRNG andmeasuring of quality of initial condition (cryptographic key), which is statisticallyindependent from its entropy.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123523040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY OF INDUSTRIAL CONTROL SYSTEMS 工业控制系统的安全性
Cybersecurity & Cybercrime Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8011
Karol Gazda
{"title":"SECURITY OF INDUSTRIAL CONTROL SYSTEMS","authors":"Karol Gazda","doi":"10.5604/01.3001.0053.8011","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8011","url":null,"abstract":"The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信