网络安全研究的历史发展:文献回顾及其在安全研究中的地位

Q4 Social Sciences
Kamil Tarhan
{"title":"网络安全研究的历史发展:文献回顾及其在安全研究中的地位","authors":"Kamil Tarhan","doi":"10.14746/ps.2022.1.23","DOIUrl":null,"url":null,"abstract":"This study discusses the formation and development of cybersecurity studies since the creation of the Internet. Although the origin of cybersecurity studies dates back to the 1970s, hacking, malicious software, computer intrusions, and espionage attacks that took place in the 1980s led cybersecurity studies to form in the area of computer science. By the 1990s, the Internet began to be used widely, and an increase in the level of attacks in cyberspace began to occur. This period was a major reason for the growth in writing on software and network security. Network security has become a key priority for governments and many industries. Cybersecurity studies have become a priority area in security studies with the increasing complexity of cyber threats towards 2000s. States and some supranational organizations have started to create cybersecurity strategies. The security of critical infrastructure and computer networks has begun to emerge as a high-priority area. It has been observed that the transition from classical security policies to modern security policies, which should be established in the information age, has begun. Cybersecurity studies were taken more seriously after the 2007 Estonian attacks, especially in the 2010s. In this period, the intensity of attacks on critical infrastructures and the occurrence of some physical attacks caused cybersecurity to deepen and become an issue on an international scale. Cybersecurity studies continue to be shaped by being influenced by many different disciplines, regardless of any discipline, with the important discussions and cyber incidents that have taken place in recent years. Therefore, the studies were handled from a multidisciplinary perspective.","PeriodicalId":37800,"journal":{"name":"Przeglad Strategiczny","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies\",\"authors\":\"Kamil Tarhan\",\"doi\":\"10.14746/ps.2022.1.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study discusses the formation and development of cybersecurity studies since the creation of the Internet. Although the origin of cybersecurity studies dates back to the 1970s, hacking, malicious software, computer intrusions, and espionage attacks that took place in the 1980s led cybersecurity studies to form in the area of computer science. By the 1990s, the Internet began to be used widely, and an increase in the level of attacks in cyberspace began to occur. This period was a major reason for the growth in writing on software and network security. Network security has become a key priority for governments and many industries. Cybersecurity studies have become a priority area in security studies with the increasing complexity of cyber threats towards 2000s. States and some supranational organizations have started to create cybersecurity strategies. The security of critical infrastructure and computer networks has begun to emerge as a high-priority area. It has been observed that the transition from classical security policies to modern security policies, which should be established in the information age, has begun. Cybersecurity studies were taken more seriously after the 2007 Estonian attacks, especially in the 2010s. In this period, the intensity of attacks on critical infrastructures and the occurrence of some physical attacks caused cybersecurity to deepen and become an issue on an international scale. Cybersecurity studies continue to be shaped by being influenced by many different disciplines, regardless of any discipline, with the important discussions and cyber incidents that have taken place in recent years. Therefore, the studies were handled from a multidisciplinary perspective.\",\"PeriodicalId\":37800,\"journal\":{\"name\":\"Przeglad Strategiczny\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Przeglad Strategiczny\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14746/ps.2022.1.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Przeglad Strategiczny","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14746/ps.2022.1.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0

摘要

本研究探讨网路安全研究自网际网路诞生以来的形成与发展。尽管网络安全研究的起源可以追溯到20世纪70年代,但20世纪80年代发生的黑客攻击、恶意软件、计算机入侵和间谍攻击导致网络安全研究在计算机科学领域形成。到20世纪90年代,互联网开始被广泛使用,网络空间的攻击水平开始上升。这一时期是软件和网络安全写作增长的主要原因。网络安全已成为政府和许多行业的首要任务。随着21世纪网络威胁的日益复杂,网络安全研究已成为安全研究的优先领域。国家和一些超国家组织已经开始制定网络安全战略。关键基础设施和计算机网络的安全已开始成为一个高度优先的领域。人们观察到,从传统的安全策略向信息时代应该建立的现代安全策略的过渡已经开始。在2007年爱沙尼亚遭受攻击之后,网络安全研究受到了更大的重视,尤其是在2010年代。在此期间,对关键基础设施的攻击强度和一些物理攻击的发生使网络安全加深并成为国际范围内的问题。网络安全研究继续受到许多不同学科的影响,无论任何学科,近年来发生的重要讨论和网络事件。因此,这些研究是从多学科的角度来处理的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies
This study discusses the formation and development of cybersecurity studies since the creation of the Internet. Although the origin of cybersecurity studies dates back to the 1970s, hacking, malicious software, computer intrusions, and espionage attacks that took place in the 1980s led cybersecurity studies to form in the area of computer science. By the 1990s, the Internet began to be used widely, and an increase in the level of attacks in cyberspace began to occur. This period was a major reason for the growth in writing on software and network security. Network security has become a key priority for governments and many industries. Cybersecurity studies have become a priority area in security studies with the increasing complexity of cyber threats towards 2000s. States and some supranational organizations have started to create cybersecurity strategies. The security of critical infrastructure and computer networks has begun to emerge as a high-priority area. It has been observed that the transition from classical security policies to modern security policies, which should be established in the information age, has begun. Cybersecurity studies were taken more seriously after the 2007 Estonian attacks, especially in the 2010s. In this period, the intensity of attacks on critical infrastructures and the occurrence of some physical attacks caused cybersecurity to deepen and become an issue on an international scale. Cybersecurity studies continue to be shaped by being influenced by many different disciplines, regardless of any discipline, with the important discussions and cyber incidents that have taken place in recent years. Therefore, the studies were handled from a multidisciplinary perspective.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Przeglad Strategiczny
Przeglad Strategiczny Social Sciences-Political Science and International Relations
CiteScore
0.20
自引率
0.00%
发文量
0
期刊介绍: The periodical “Strategic Review” is published by the Faculty of Political Science and Journalism of Adam Mickiewicz University in Poznan. The aim of the journal is to create possibilities to share views and present results of research focusing on contemporary international relations, internal and international security and strategic studies. The journal’s aim is to encourage discussion and debate in these fields.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信