首页 > 最新文献

Cybersecurity & Cybercrime最新文献

英文 中文
HISTORY AND OVERVIEW OF ATTACKS AGAINST CELL PHONES 手机攻击的历史和概述
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8029
Bartosz Słupczewski
The purpose of this article is to present the highlights of cell phone attacks, along with adiscussion of how the actors and software operate. For many people, mobile devices are anintegral part of daily life, which is used for contacting, searching for information or managingfinances. Storing sensitive information in the memory of phones increases the interest ofcybercriminals in this sphere, thus the use of spyware. The paper first presents highlights from thetimeline of the use of malware to attack cell phones. Then the history of the Hacking Teamcompany was introduced, along with the spyware tool developed. The Dark Caracal campaign andthe use of Pegasus software in the EU were also presented. With the increase in the amount ofsensitive data processed via cell phones, there is a need to verify the security level of devices andthe effectiveness of security features.
本文的目的是介绍手机攻击的重点,并讨论攻击者和软件是如何操作的。对于许多人来说,移动设备是日常生活中不可或缺的一部分,用于联系,搜索信息或管理财务。将敏感信息存储在手机内存中增加了网络犯罪分子在这一领域的兴趣,因此使用间谍软件。本文首先介绍了利用恶意软件攻击手机的时间轴上的亮点。然后介绍了黑客团队公司的历史,以及开发的间谍软件工具。同时也介绍了Dark Caracal战役和Pegasus软件在欧盟的使用情况。随着通过手机处理的敏感数据量的增加,有必要验证设备的安全级别和安全功能的有效性。
{"title":"HISTORY AND OVERVIEW OF ATTACKS AGAINST CELL PHONES","authors":"Bartosz Słupczewski","doi":"10.5604/01.3001.0053.8029","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8029","url":null,"abstract":"The purpose of this article is to present the highlights of cell phone attacks, along with adiscussion of how the actors and software operate. For many people, mobile devices are anintegral part of daily life, which is used for contacting, searching for information or managingfinances. Storing sensitive information in the memory of phones increases the interest ofcybercriminals in this sphere, thus the use of spyware. The paper first presents highlights from thetimeline of the use of malware to attack cell phones. Then the history of the Hacking Teamcompany was introduced, along with the spyware tool developed. The Dark Caracal campaign andthe use of Pegasus software in the EU were also presented. With the increase in the amount ofsensitive data processed via cell phones, there is a need to verify the security level of devices andthe effectiveness of security features.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTENTYCZNOŚĆ I INTEGRALNOŚĆ ELEKTRONICZNYCHMAP NAWIGACYJNYCH W SYSTEMIE ECDIS
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8028
P. Kata
W artykule przedstawiono przegląd metod przyjętych przez Międzynarodową OrganizacjęHydrograficzną w schemacie ochrony danych mających na celu zapewnić autentyczność iintegralność plików obszarów map nawigacyjnych wykorzystywanych przez nawigatorówjednostek pływających obsługujących system ECDIS. Przedstawiono sposób tworzeniacertyfikatów dystrybutorów map elektronicznych potwierdzających autentyczność ich podpisówcyfrowych oraz sposób zapewnienia integralności dostarczanych plików map. Opisano metodęasynchronicznego szyfrowania danych przy użyciu pary kluczy: prywatnego i publicznego,wykorzystywaną w schemacie ochrony danych Międzynarodowej Organizacji Hydrograficznej.Przedstawiona została procedura weryfikacji autentyczności i integralności plików mapelektronicznych przez użytkownika końcowego.
本文概述了国际海道测量组织在其数据保护计划中采用的方法,以确保启用 ECDIS 的船舶导航员使用的导航图区域文件的真实性和完整性。介绍了一种创建电子地图分发者证书的方法,以确认其数字签名的真实性,以及如何确保交付的地图文件的完整性。介绍了国际水文组织数据保护计划中使用的一对私人和公共密钥进行异步数据加密的方法。
{"title":"AUTENTYCZNOŚĆ I INTEGRALNOŚĆ ELEKTRONICZNYCHMAP NAWIGACYJNYCH W SYSTEMIE ECDIS","authors":"P. Kata","doi":"10.5604/01.3001.0053.8028","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8028","url":null,"abstract":"W artykule przedstawiono przegląd metod przyjętych przez Międzynarodową OrganizacjęHydrograficzną w schemacie ochrony danych mających na celu zapewnić autentyczność iintegralność plików obszarów map nawigacyjnych wykorzystywanych przez nawigatorówjednostek pływających obsługujących system ECDIS. Przedstawiono sposób tworzeniacertyfikatów dystrybutorów map elektronicznych potwierdzających autentyczność ich podpisówcyfrowych oraz sposób zapewnienia integralności dostarczanych plików map. Opisano metodęasynchronicznego szyfrowania danych przy użyciu pary kluczy: prywatnego i publicznego,wykorzystywaną w schemacie ochrony danych Międzynarodowej Organizacji Hydrograficznej.Przedstawiona została procedura weryfikacji autentyczności i integralności plików mapelektronicznych przez użytkownika końcowego.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MANAGING IT SERVICES WITH MODERN METHODOLOGIES 用现代方法管理it服务
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8026
Arkadiusz Gałecki
The article below discusses the broadly understood approach to modern service managementbased on the best market practices. The basis for the preparation of the study were, among others,such practices as: ITILv4, Lean, Agile, Scrum, Theory of Constraints, DevOps, DevSecOps,Rugged DevOps, SRE and many years of design and training experience of the author in theabove areas. The article addresses an approach to service management that can be widely used invarious areas, from the defense sector or the armed forces, through the public sector, to businessorganizations, in order to provide high-quality, safe products and services that meet customerexpectations.
下面的文章将讨论基于最佳市场实践的被广泛理解的现代服务管理方法。该研究的准备基础包括:ITILv4、精益、敏捷、Scrum、约束理论、DevOps、DevSecOps、Rugged DevOps、SRE等实践,以及作者在上述领域多年的设计和培训经验。本文介绍了一种服务管理方法,这种方法可以广泛应用于各个领域,从国防部门或武装部队,到公共部门,再到商业组织,以提供满足客户期望的高质量、安全的产品和服务。
{"title":"MANAGING IT SERVICES WITH MODERN METHODOLOGIES","authors":"Arkadiusz Gałecki","doi":"10.5604/01.3001.0053.8026","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8026","url":null,"abstract":"The article below discusses the broadly understood approach to modern service managementbased on the best market practices. The basis for the preparation of the study were, among others,such practices as: ITILv4, Lean, Agile, Scrum, Theory of Constraints, DevOps, DevSecOps,Rugged DevOps, SRE and many years of design and training experience of the author in theabove areas. The article addresses an approach to service management that can be widely used invarious areas, from the defense sector or the armed forces, through the public sector, to businessorganizations, in order to provide high-quality, safe products and services that meet customerexpectations.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NORTH KOREA’S CYBER CAPABILITIES 朝鲜的网络能力
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8030
Bartosz Smutek
The purpose of the article is to show the most important attacks from North Korea and theiroffensive and defensive capabilities. The structure of cyber organizations and their operations arepresented. Nowadays North Korea is seen head on as a military threat, the work aims to presenttheir potential cyber capabilities and the attacks they have made. The beginning of the workdescribes issues related to the organization of the structures, their structure, role and purpose. Thenext section presents the most interesting attacks related to spying and information extraction,cyber-terrorism operations and financial extraction, which are most often used to strengthenmilitary capabilities. This was followed by a closer look at the Lazarus group's activities, theirtactics, tasks and the attacks they have committed. The subject of Poland, which has also been thetarget of attacks, was also touched upon. Finally, the topic of the future strategy of cyber forceswas discussed.
这篇文章的目的是展示朝鲜最重要的攻击及其攻防能力。介绍了网络组织的结构及其运作。如今,朝鲜被视为一个正面的军事威胁,这项工作旨在展示他们潜在的网络能力和他们所进行的攻击。工作的开头描述了与结构的组织、结构、作用和目的相关的问题。下一节介绍了与间谍和信息提取、网络恐怖主义行动和金融提取有关的最有趣的攻击,这些攻击最常用于加强军事能力。接下来是对拉撒路组织的活动、战术、任务和攻击的进一步调查。同样是攻击目标的波兰也被提及。最后,对网络力量的未来战略进行了探讨。
{"title":"NORTH KOREA’S CYBER CAPABILITIES","authors":"Bartosz Smutek","doi":"10.5604/01.3001.0053.8030","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8030","url":null,"abstract":"The purpose of the article is to show the most important attacks from North Korea and theiroffensive and defensive capabilities. The structure of cyber organizations and their operations arepresented. Nowadays North Korea is seen head on as a military threat, the work aims to presenttheir potential cyber capabilities and the attacks they have made. The beginning of the workdescribes issues related to the organization of the structures, their structure, role and purpose. Thenext section presents the most interesting attacks related to spying and information extraction,cyber-terrorism operations and financial extraction, which are most often used to strengthenmilitary capabilities. This was followed by a closer look at the Lazarus group's activities, theirtactics, tasks and the attacks they have committed. The subject of Poland, which has also been thetarget of attacks, was also touched upon. Finally, the topic of the future strategy of cyber forceswas discussed.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"129 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARTIFICIAL INTELLIGENCE AND CYBERSECURITY 人工智能与网络安全
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8018
Jerzy Kosinski
The article introduces the concept of artificial intelligence and identifies its main applications inthe field of cybersecurity. The main problems of scale, context, precision, accuracy, and speed aredescribed. The types of problems solved by machine learning are identified. Attention was paid tothe risks and limitations of using artificial intelligence in cybersecurity and the problems ofimplementing it in an organisation.
本文介绍了人工智能的概念,并指出了人工智能在网络安全领域的主要应用。描述了规模、上下文、精度、准确度和速度等主要问题。确定了机器学习解决的问题类型。人们关注了在网络安全中使用人工智能的风险和局限性,以及在组织中实施人工智能的问题。
{"title":"ARTIFICIAL INTELLIGENCE AND CYBERSECURITY","authors":"Jerzy Kosinski","doi":"10.5604/01.3001.0053.8018","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8018","url":null,"abstract":"The article introduces the concept of artificial intelligence and identifies its main applications inthe field of cybersecurity. The main problems of scale, context, precision, accuracy, and speed aredescribed. The types of problems solved by machine learning are identified. Attention was paid tothe risks and limitations of using artificial intelligence in cybersecurity and the problems ofimplementing it in an organisation.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF THE GENERALISABILITY OF THE PARKING TEST 停车试验的通用性分析
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8027
Rafał Bogiel
In 1995, George Marsaglia published a collection of randomness tests , "DIE HARD". One of thetests included there was the ,,Parking Lot Test", which was designed around the problem ofrandomly placing hyperspheres in d-dimensional space. Designed in this way, the randomness testworked very well for small amounts of data and was able to detect randomness where other testshad failed. However, due to its statistical properties, it could not cope with longer bit strings.The main objective of the present study was to parameterise the test under investigation so that itcould be used to test longer pseudorandom strings. The statistical properties of the test withalready different parameters were established empirically by performing a series of tests onstrings generated by pseudorandom generators constructed from Trivium and LFSR ciphersencrypted with the AES-128-ECB algorithm.The work also included an analysis of the possibility of optimizing the computational andmemory performance of the test. As a result of the research, the parameters of the test wereselected to allow an increase in the amount of analyzed data, while maintaining the computationaland memory complexity that allows its practical application.This article is an abstract of a Master's thesis of the same title9, which received a distinction in the2nd edition of the competition for the Marian Rejewski Award for the best Master's thesis in thefield of cyber security and cryptology.
1995年,乔治·马萨格利亚出版了随机测试集《虎胆龙威》。其中一个测试是“停车场测试”,它是围绕在d维空间中随机放置超球体的问题设计的。以这种方式设计,随机性测试对于少量数据非常有效,并且能够在其他测试失败的地方检测到随机性。然而,由于它的统计特性,它不能处理更长的位串。本研究的主要目的是参数化正在调查的测试,以便它可以用于测试更长的伪随机字符串。通过对Trivium和使用AES-128-ECB算法加密的LFSR密码构造的伪随机生成器生成的字符串进行一系列测试,经验地建立了具有不同参数的测试的统计特性。这项工作还包括分析优化测试的计算和内存性能的可能性。研究的结果是,测试参数的选择允许增加分析数据的数量,同时保持计算和内存的复杂性,使其能够实际应用。本文是一篇同名硕士论文的摘要,该论文在第二届Marian Rejewski奖网络安全和密码学领域最佳硕士论文竞赛中获得了优异的成绩。
{"title":"ANALYSIS OF THE GENERALISABILITY OF THE PARKING TEST","authors":"Rafał Bogiel","doi":"10.5604/01.3001.0053.8027","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8027","url":null,"abstract":"In 1995, George Marsaglia published a collection of randomness tests , \"DIE HARD\". One of thetests included there was the ,,Parking Lot Test\", which was designed around the problem ofrandomly placing hyperspheres in d-dimensional space. Designed in this way, the randomness testworked very well for small amounts of data and was able to detect randomness where other testshad failed. However, due to its statistical properties, it could not cope with longer bit strings.The main objective of the present study was to parameterise the test under investigation so that itcould be used to test longer pseudorandom strings. The statistical properties of the test withalready different parameters were established empirically by performing a series of tests onstrings generated by pseudorandom generators constructed from Trivium and LFSR ciphersencrypted with the AES-128-ECB algorithm.The work also included an analysis of the possibility of optimizing the computational andmemory performance of the test. As a result of the research, the parameters of the test wereselected to allow an increase in the amount of analyzed data, while maintaining the computationaland memory complexity that allows its practical application.This article is an abstract of a Master's thesis of the same title9, which received a distinction in the2nd edition of the competition for the Marian Rejewski Award for the best Master's thesis in thefield of cyber security and cryptology.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KRYTYCZNA INFRASTRUKTURA INFORMACYJNA FEDERACJI ROSYJSKIEJ
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8021
Andrzej Tałuć
Niniejsze opracowanie przedstawia problematykę związaną z zagadnieniami dotyczącymibezpieczeństwa informacyjnego, krytycznej infrastruktury informacyjnej, obiektów krytycznejinfrastruktury informacyjnej, kategoryzacji obiektów krytycznej infrastruktury informacyjnej.Przytaczane są także informacje z rosyjskich źródeł otwartych na temat powstałych zagrożeń w2022 roku, szczególnie po 24 lutego tj. rozpoczęcia przez Federację Rosyjską wojny napastniczejna Ukrainę, w obszarze szeroko rozumianego cyberbezpieczeństwa. Z przedstawionych opiniirosyjskich ekspertów w dziedzinie cyberbezpieczeństwa przedstawia się obraz wzmożonychataków ukraińskich (innych czynników zewnętrznych) w trakcie trwającego konfliktu, a takżeniewystarczających własnych możliwości przeciwdziałania cyberzagrożeniom.
本研究介绍了与信息安全、关键信息基础设施、关键信息基础设施设施、关键信息基础设施设施分类有关的问题。还引用了俄罗斯公开来源提供的关于 2022 年出现的威胁的信息,特别是 2 月 24 日(即俄罗斯联邦对乌克兰的侵略战争开始后)在广义网络安全领域出现的威胁。俄罗斯网络安全领域专家的意见表明,在冲突期间,乌克兰的攻击(由其他外部因素造成)有所增加,而俄罗斯自身应对网络威胁的能力不足。
{"title":"KRYTYCZNA INFRASTRUKTURA INFORMACYJNA FEDERACJI ROSYJSKIEJ","authors":"Andrzej Tałuć","doi":"10.5604/01.3001.0053.8021","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8021","url":null,"abstract":"Niniejsze opracowanie przedstawia problematykę związaną z zagadnieniami dotyczącymibezpieczeństwa informacyjnego, krytycznej infrastruktury informacyjnej, obiektów krytycznejinfrastruktury informacyjnej, kategoryzacji obiektów krytycznej infrastruktury informacyjnej.Przytaczane są także informacje z rosyjskich źródeł otwartych na temat powstałych zagrożeń w2022 roku, szczególnie po 24 lutego tj. rozpoczęcia przez Federację Rosyjską wojny napastniczejna Ukrainę, w obszarze szeroko rozumianego cyberbezpieczeństwa. Z przedstawionych opiniirosyjskich ekspertów w dziedzinie cyberbezpieczeństwa przedstawia się obraz wzmożonychataków ukraińskich (innych czynników zewnętrznych) w trakcie trwającego konfliktu, a takżeniewystarczających własnych możliwości przeciwdziałania cyberzagrożeniom.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CONSEQUENCES OF PAYING A RANSOM WHILE RANSOMWARE ATTACK 在勒索软件攻击时支付赎金的后果
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8023
Jacek Bil
The subject of this article is devoted to the actions taken by personnel of organizations that havebecome the target of a ransomware attack. It should be noted here that within the framework ofthe considerations undertaken, reference was made not to technical - IT undertakings aimed atunlocking the attacked system, but to the harmfulness of ransomware behavior, both in the area ofactivities of public entities and in the business environment. The methodology for thedevelopment of the article was based on the analysis of information on the phenomenon ofransomware, as well as on the ranking and analysis of the legislation governing the issue ofliability in the event of ransomware placement. The research problem of the manuscript wascontained in the question: what are the consequences for those who decide to transferransomware, as well as those who seek a way to finance the ransomware attack? At the same time,it was assumed that this is the responsibility of both those who decide to pay the ransom and thepersonnel who supervise the activities of the entities. It was also attempted to depict that theresponsibility for the ransomware decision arises both in the area of public entities and withingthe scope of companies prospering in the private economic sector.
本文的主题致力于成为勒索软件攻击目标的组织人员所采取的行动。这里应该指出的是,在所考虑的框架内,提到的不是旨在解锁被攻击系统的技术- It承诺,而是勒索软件行为的危害性,无论是在公共实体的活动领域还是在商业环境中。本文的编写方法是基于对勒索软件现象的信息分析,以及对有关勒索软件安置责任问题的立法的排名和分析。手稿的研究问题包含在这个问题中:对于那些决定转移勒索软件的人,以及那些寻求资助勒索软件攻击的人来说,后果是什么?同时,假定这是决定支付赎金的人和监督实体活动的人员的责任。它还试图描述勒索软件决策的责任既出现在公共实体领域,也出现在私营经济部门蓬勃发展的公司范围内。
{"title":"CONSEQUENCES OF PAYING A RANSOM WHILE RANSOMWARE ATTACK","authors":"Jacek Bil","doi":"10.5604/01.3001.0053.8023","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8023","url":null,"abstract":"The subject of this article is devoted to the actions taken by personnel of organizations that havebecome the target of a ransomware attack. It should be noted here that within the framework ofthe considerations undertaken, reference was made not to technical - IT undertakings aimed atunlocking the attacked system, but to the harmfulness of ransomware behavior, both in the area ofactivities of public entities and in the business environment. The methodology for thedevelopment of the article was based on the analysis of information on the phenomenon ofransomware, as well as on the ranking and analysis of the legislation governing the issue ofliability in the event of ransomware placement. The research problem of the manuscript wascontained in the question: what are the consequences for those who decide to transferransomware, as well as those who seek a way to finance the ransomware attack? At the same time,it was assumed that this is the responsibility of both those who decide to pay the ransom and thepersonnel who supervise the activities of the entities. It was also attempted to depict that theresponsibility for the ransomware decision arises both in the area of public entities and withingthe scope of companies prospering in the private economic sector.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE IMPACT OF MALWARE ON THE INTERNET 恶意软件对互联网的影响
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8020
Adam Stojałowski
The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.
本文的目的是根据最近的网络攻击来介绍高级恶意软件的特点。考虑的主题是近似和分析恶意软件使用的技术,以绕过安全和保护功能,这反过来可能导致控制被攻击的计算机。本文的目的还在于介绍安全访问公共网络的概念。
{"title":"THE IMPACT OF MALWARE ON THE INTERNET","authors":"Adam Stojałowski","doi":"10.5604/01.3001.0053.8020","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8020","url":null,"abstract":"The aim of this article is to present the characteristics of advanced malware in terms of the recentcyber-attacks. The subject of the considerations is to approximate and analyze the techniques usedby malicious software in order to bypass security and protection functions, which in turn may leadto taking control over the attacked computer. The aim of the article is also to introduce theconcept of secure access to the public network.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANTIFRAGILITY IN SECURITY MANAGEMENT IN AN ERA OFTURBULENCE 动荡时代安全管理的反脆弱性
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8025
Sebastian Burgemejster
The purpose of this article is to present the concept of antifragility as developed within TheAntifragility Institute and its application in a dynamic and changing environment. This is the firstarticle in a series describing an indication of the fragility and inadequacy of the solutions usedtoday to the challenges faced by organisations, particularly in the area of security management.The article is intended to be an introduction and to build a foundation of knowledge onantifragility for further consideration by the author and its application
本文的目的是介绍反脆弱性研究所内部发展的反脆弱性概念及其在动态和变化环境中的应用。这是系列文章中的第一篇,描述了当今组织面临的挑战,特别是在安全管理领域,所使用的解决方案的脆弱性和不充分性。本文旨在介绍并建立反脆弱性知识的基础,以供作者及其应用进一步考虑
{"title":"ANTIFRAGILITY IN SECURITY MANAGEMENT IN AN ERA OFTURBULENCE","authors":"Sebastian Burgemejster","doi":"10.5604/01.3001.0053.8025","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8025","url":null,"abstract":"The purpose of this article is to present the concept of antifragility as developed within TheAntifragility Institute and its application in a dynamic and changing environment. This is the firstarticle in a series describing an indication of the fragility and inadequacy of the solutions usedtoday to the challenges faced by organisations, particularly in the area of security management.The article is intended to be an introduction and to build a foundation of knowledge onantifragility for further consideration by the author and its application","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity & Cybercrime
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1