Pub Date : 2023-03-02DOI: 10.5604/01.3001.0053.8017
Piotr Dela
The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.
{"title":"E-MAIL AS AN ATTACK TOOL","authors":"Piotr Dela","doi":"10.5604/01.3001.0053.8017","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8017","url":null,"abstract":"The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-02DOI: 10.5604/01.3001.0053.8024
P. Rybicki
Cybercrime is an area where improving the effectiveness and interaction of law enforcementagencies is becoming increasingly important today. Standards, understood as technical documentscontaining rules, guidelines or definitions, can be used for this purpose. The article characterisesthe different standards and the standardisation organisations responsible for their development. Itthen presents the common standards operating in the field of cybercrime, in particular, those thatcan be implemented by any organisation that decides to take steps for a so-called 'incidentresponse'. Against this backdrop, a standard linked to the conduct of criminal investigations ischaracterised in more detail, which provides guidance for the handling of digital evidence and canbe used by police organisations to increase the effectiveness of their operations and improveinteroperability. Finally, the results of a study on priority standardisation domains in the area ofcybercrime were presented. These domains were developed based on standardisation proposalsmade by law enforcement representatives from European countries and then prioritised in terms ofimportance and urgency. The resulting recommendations should serve as a basis forstandardisation work in the near future.
{"title":"STANDARDIZATION IN COMBATING CYBERCRIME AREA","authors":"P. Rybicki","doi":"10.5604/01.3001.0053.8024","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8024","url":null,"abstract":"Cybercrime is an area where improving the effectiveness and interaction of law enforcementagencies is becoming increasingly important today. Standards, understood as technical documentscontaining rules, guidelines or definitions, can be used for this purpose. The article characterisesthe different standards and the standardisation organisations responsible for their development. Itthen presents the common standards operating in the field of cybercrime, in particular, those thatcan be implemented by any organisation that decides to take steps for a so-called 'incidentresponse'. Against this backdrop, a standard linked to the conduct of criminal investigations ischaracterised in more detail, which provides guidance for the handling of digital evidence and canbe used by police organisations to increase the effectiveness of their operations and improveinteroperability. Finally, the results of a study on priority standardisation domains in the area ofcybercrime were presented. These domains were developed based on standardisation proposalsmade by law enforcement representatives from European countries and then prioritised in terms ofimportance and urgency. The resulting recommendations should serve as a basis forstandardisation work in the near future.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-02DOI: 10.5604/01.3001.0053.8019
Jakub Syta
This review article presents selected use cases where information technology was used duringRussia's war with Ukraine in 2022. The analysis of these events allows to draw conclusions aboutthe effectiveness of the various activities taking place in cyberspace, which may also be relevantin future conflicts. The conclusions relate to the provision of uninterrupted communications,cyber attacks destroying physical infrastructure elements, the use of mobile phones, theeffectiveness of OSINT activities, and the effectiveness of disinformation and propagandaactivities.
{"title":"CYBER OPERATIONS IN HYBRID CONFLICTS - LESSONS FROM THE","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8019","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8019","url":null,"abstract":"This review article presents selected use cases where information technology was used duringRussia's war with Ukraine in 2022. The analysis of these events allows to draw conclusions aboutthe effectiveness of the various activities taking place in cyberspace, which may also be relevantin future conflicts. The conclusions relate to the provision of uninterrupted communications,cyber attacks destroying physical infrastructure elements, the use of mobile phones, theeffectiveness of OSINT activities, and the effectiveness of disinformation and propagandaactivities.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-02DOI: 10.5604/01.3001.0053.8022
Sylwia Gliwa
The aim of this article is to present the outcome of my research conducted during my PhD studiesand presented in my PhD dissertation “The impact of using social media in Islamic Statepropaganda on security and public order”. The paper presents the outcome of research that coversgraphic, audio and video materials to show the impact of ISIS propaganda on security and publicorder. The conducted analysis covered the content published through social media platforms anddirected to the people of Western countries and Russia.
{"title":"THE IMPACT OF USING SOCIAL MEDIA IN ISLAMIC STATEPROPAGANDA ON SECURITY AND PUBLIC ORDER. PRESENTATION OFRESEARCH OUTCOME","authors":"Sylwia Gliwa","doi":"10.5604/01.3001.0053.8022","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8022","url":null,"abstract":"The aim of this article is to present the outcome of my research conducted during my PhD studiesand presented in my PhD dissertation “The impact of using social media in Islamic Statepropaganda on security and public order”. The paper presents the outcome of research that coversgraphic, audio and video materials to show the impact of ISIS propaganda on security and publicorder. The conducted analysis covered the content published through social media platforms anddirected to the people of Western countries and Russia.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-02DOI: 10.5604/01.3001.0053.8031
Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska
Celem artykułu jest omówienie działalności grupy Anonymous oraz próba określenia jejcharakteru oraz specyfiki poprzez analizę zarówno prowadzonych przez grupę akcji w przeszłości(“Project Chanology”, “Operacja Payback”, “Operacja Tunezja”, “Operacja Egipt”), jak i akcjiaktualnych (“Operacja Rosja”), związanych z trwającym zbrojnym konfliktem ukraińsko –rosyjskim.Istotnym elementem jest określenie stanowiska szeroko pojmowanej opinii publicznej orazuwzględnienie zapisów prawnych, obowiązujących na terenie Stanów Zjednoczonych, UniiEuropejskiej, jak i samej Rosji, które posłużyły w obiektywnej ocenie działalności grupy. Wramach próby uzyskania odpowiedzi na pytanie: „Czy grupa Anonymous powinna byćpostrzegana jako przestępcy, czy jako bohaterowie?”, podjęta została analiza komentarzy,postów, działań użytkowników w mediach społecznościowych oraz poszczególnych kolektywówzwiązanych z grupą („squad303”, „GhostSec”). Całość rozważań dotycząca sposobupostrzegania grupy Anonymous ma charakter teoretyczny i nie rozstrzyga ostatecznie związanegoz zagadnieniem dyskursu.
{"title":"BOHATEROWIE CZY PRZESTĘPCY” - ANALIZA GRUPY ANONYMOUS","authors":"Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska","doi":"10.5604/01.3001.0053.8031","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8031","url":null,"abstract":"Celem artykułu jest omówienie działalności grupy Anonymous oraz próba określenia jejcharakteru oraz specyfiki poprzez analizę zarówno prowadzonych przez grupę akcji w przeszłości(“Project Chanology”, “Operacja Payback”, “Operacja Tunezja”, “Operacja Egipt”), jak i akcjiaktualnych (“Operacja Rosja”), związanych z trwającym zbrojnym konfliktem ukraińsko –rosyjskim.Istotnym elementem jest określenie stanowiska szeroko pojmowanej opinii publicznej orazuwzględnienie zapisów prawnych, obowiązujących na terenie Stanów Zjednoczonych, UniiEuropejskiej, jak i samej Rosji, które posłużyły w obiektywnej ocenie działalności grupy. Wramach próby uzyskania odpowiedzi na pytanie: „Czy grupa Anonymous powinna byćpostrzegana jako przestępcy, czy jako bohaterowie?”, podjęta została analiza komentarzy,postów, działań użytkowników w mediach społecznościowych oraz poszczególnych kolektywówzwiązanych z grupą („squad303”, „GhostSec”). Całość rozważań dotycząca sposobupostrzegania grupy Anonymous ma charakter teoretyczny i nie rozstrzyga ostatecznie związanegoz zagadnieniem dyskursu.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5604/01.3001.0053.8013
Damian Skrzynecki
Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object and the control station, and in the space itself. In order to neutralizethreats and ensure business continuity, inter alia: encrypted communication, createsappropriate legal requirements and standards, and uses new technologies to better secureobjects in space.
{"title":"ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE","authors":"Damian Skrzynecki","doi":"10.5604/01.3001.0053.8013","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8013","url":null,"abstract":"Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object and the control station, and in the space itself. In order to neutralizethreats and ensure business continuity, inter alia: encrypted communication, createsappropriate legal requirements and standards, and uses new technologies to better secureobjects in space.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5604/01.3001.0053.8008
Jakub Syta
This paper characterizes the different areas of knowledge and skills that are useful forthe Chief Information Security Officer (CISO) role. It juxtaposes these with the variousspecializations that are emerging in the cybersecurity field. The work should alloworganizations to more consciously select candidates for the role of CISO who will meetthe expectations
{"title":"THE ROLE OF CISO IN MODERN ORGANIZATIONS","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8008","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8008","url":null,"abstract":"This paper characterizes the different areas of knowledge and skills that are useful forthe Chief Information Security Officer (CISO) role. It juxtaposes these with the variousspecializations that are emerging in the cybersecurity field. The work should alloworganizations to more consciously select candidates for the role of CISO who will meetthe expectations","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5604/01.3001.0053.8003
Andrzej Tałuć
The study presents the level of financial investments made between 2018 and 2022 byRussian Federation authorities in the sector related to cybersecurity of the state.The text covers the following areas: expenses incurred for cybersecurity, projects"Digital economy" and "Independent Internet", funds to support Russian programmers,data security in rail transport, radio and TV, biometric security in passports,participation of commercial entities in the government program "Digital economy",expenses for independent test centers, software and hardware, as well as filteringinternet traffic among children and detecting any malicious activities related to it.
{"title":"INVESTMENTS IN THE AREA OF CYBERSECURITY IN RUSSIANFEDERATION BETWEEN 2018 AND 2022","authors":"Andrzej Tałuć","doi":"10.5604/01.3001.0053.8003","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8003","url":null,"abstract":"The study presents the level of financial investments made between 2018 and 2022 byRussian Federation authorities in the sector related to cybersecurity of the state.The text covers the following areas: expenses incurred for cybersecurity, projects\"Digital economy\" and \"Independent Internet\", funds to support Russian programmers,data security in rail transport, radio and TV, biometric security in passports,participation of commercial entities in the government program \"Digital economy\",expenses for independent test centers, software and hardware, as well as filteringinternet traffic among children and detecting any malicious activities related to it.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5604/01.3001.0053.8010
Teodor Buchner
The aim of this paper is to show, how the approach of nonlinear dynamics and statisticalphysics help to analyze pseudorandom number generators (PRNG) used incryptography. In fact, each PRNG is a highly nonlinear dynamical system, with itsinternal states, and may be analyzed as such.It is shown using PRNG of ARC4 stream cipher as example. A nonlinear phenomenon:1/fα dynamics was found in the new measure of complexity of the cipher: female count,a combinatorial quantity of direct cryptological bearing. We show that this measure canbe helpful in such tasks as measuring stationarity of internal dynamics of the PRNG andmeasuring of quality of initial condition (cryptographic key), which is statisticallyindependent from its entropy.
{"title":"STATISTICAL ANALYSIS OF INTERNAL DYNAMICS OF ARC4 STREAMCIPHER","authors":"Teodor Buchner","doi":"10.5604/01.3001.0053.8010","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8010","url":null,"abstract":"The aim of this paper is to show, how the approach of nonlinear dynamics and statisticalphysics help to analyze pseudorandom number generators (PRNG) used incryptography. In fact, each PRNG is a highly nonlinear dynamical system, with itsinternal states, and may be analyzed as such.It is shown using PRNG of ARC4 stream cipher as example. A nonlinear phenomenon:1/fα dynamics was found in the new measure of complexity of the cipher: female count,a combinatorial quantity of direct cryptological bearing. We show that this measure canbe helpful in such tasks as measuring stationarity of internal dynamics of the PRNG andmeasuring of quality of initial condition (cryptographic key), which is statisticallyindependent from its entropy.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123523040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5604/01.3001.0053.8011
Karol Gazda
The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.
{"title":"SECURITY OF INDUSTRIAL CONTROL SYSTEMS","authors":"Karol Gazda","doi":"10.5604/01.3001.0053.8011","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8011","url":null,"abstract":"The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}