Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník
{"title":"网络安全:臭名昭著,但经常被误用和混淆的术语","authors":"Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník","doi":"10.5817/mujlt2023-2-5","DOIUrl":null,"url":null,"abstract":"The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining \"the same\". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity: Notorious, but Often Misused and Confused Terms\",\"authors\":\"Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník\",\"doi\":\"10.5817/mujlt2023-2-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining \\\"the same\\\". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.\",\"PeriodicalId\":38294,\"journal\":{\"name\":\"Masaryk University Journal of Law and Technology\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Masaryk University Journal of Law and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5817/mujlt2023-2-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Masaryk University Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5817/mujlt2023-2-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cybersecurity: Notorious, but Often Misused and Confused Terms
The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining "the same". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.