{"title":"网络攻击——威胁示例","authors":"Adam Stojałowski","doi":"10.2478/sjpna-2019-0023","DOIUrl":null,"url":null,"abstract":"Abstract The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).","PeriodicalId":34248,"journal":{"name":"Scientific Journal of Polish Naval Academy","volume":"219 1","pages":"29 - 39"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyberattack — Examples of Threats\",\"authors\":\"Adam Stojałowski\",\"doi\":\"10.2478/sjpna-2019-0023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).\",\"PeriodicalId\":34248,\"journal\":{\"name\":\"Scientific Journal of Polish Naval Academy\",\"volume\":\"219 1\",\"pages\":\"29 - 39\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Journal of Polish Naval Academy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2478/sjpna-2019-0023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Journal of Polish Naval Academy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/sjpna-2019-0023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).