Abstract

Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area.This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.

Highlights

  • The armed struggle between states, political groups or international organizations in present times is not a typical armed struggle with the use of armed forces or military formations

  • A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security

  • This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area

Read more

Summary

INTRODUCTION

The armed struggle between states, political groups or international organizations in present times is not a typical armed struggle with the use of armed forces or military formations. Threats in cyberspace do affect state activities but can cause the paralysis of the whole structure, offices and state institutions without the use of armed forces Such activities are not a domain of criminal groups or other organizations which are geared to steal information or gain merely an economic profits. In accordance to the cybersecurity doctrine of the Republic of Poland (Doktryna cyberbezpieczeństwa RP), signed in 2015, cyberspace is defined as “the space of processing and exchanging information created by the ICT systems (sets of interoperable IT equipment and software, which facilitate data processing, their storage, as well as sending and receiving through telecommunication networks by means of a device appropriate for a specific type of telecommunication network which can be directly or indirectly connected to interfaces) together with the links between them, and the relations with users” (own transl.)[6].

USE OF CYBERSPACE FOR MILITARY OPERATIONS
ACTIVITIES AIMED TO PROTECT CYBERSPACE OF THE REPUBLIC OF POLAND
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call