{"title":"Cyberattack — Examples of Threats","authors":"Adam Stojałowski","doi":"10.2478/sjpna-2019-0023","DOIUrl":null,"url":null,"abstract":"Abstract The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).","PeriodicalId":34248,"journal":{"name":"Scientific Journal of Polish Naval Academy","volume":"219 1","pages":"29 - 39"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Journal of Polish Naval Academy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/sjpna-2019-0023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).