RESEARCH PAPER
Tackling cyberspace threats – The international approach
 
More details
Hide details
1
War Studies University, Warsaw, Poland, Faculty of Military Studies, Cyberspace Security Branch
 
 
Online publication date: 2016-09-23
 
 
Publication date: 2016-09-30
 
 
Security and Defence Quarterly 2016;12(3):100-117
 
KEYWORDS
ABSTRACT
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
 
REFERENCES (16)
1.
The USA National Institute of Standards and Technology (NIST) - NIST security glossary: http://nvlpubs.nist.gov/nistpu... - access February 2017.
 
2.
William Gibson – American science fiction writer, forefather of the so called cyberpunk.
 
3.
Department of Defense Dictionary of Military and Associated Terms, Joint Chiefs of Staff USA, February 2016, p. 58.
 
4.
he UK Cyber Security Strategy Protecting and promoting the UK in a digital world, Cabinet Office, London, November 2011, p. 10.
 
5.
National cyber security strategy 2016-2021, HM Government, 2016, p. 75. Information systems defence and security France’s strategy, February 2011, p
 
6.
Information systems defence and security France’s strategy, February 2011, p. 21.
 
7.
Cybersecurity. A generic reference curriculum, 1217-16 NATO Graphics & Printing, ISBN 978-92-845-0196-0, p. 63.
 
8.
The document determines that the IT system – a group of IT devices and software cooperating with one another which assures the processing, storing, as well as sending and receiving data via ICT networks through a user’s device proper for a given type of ICT network in accordance with the Act of 16th July 2004 – ICT law (Journal of laws of 2014, item 243 and 827).
 
9.
Vide International strategy for cyberspace on: www.whitehouse.gov/sites/default/files/ rss_viewer/ international_strategy_for_cyberspace.pdf
 
10.
Ibidem, p. 5.
 
11.
Vide M. Grzelak, Międzynarodowa strategia USA dla cyberprzestrzeni, kwartalnik Bezpieczeństwo Narodowe II-2011/18.
 
12.
D.E. Denning, Wojna informacyjna i bezpieczeństwo informacji, Warsaw 2002, p. 430.
 
13.
Vide By decision CDPC/103/211196.
 
14.
Vide: www.first.org – access February 2017.
 
15.
DARPA - Defense Advanced Research Projects Agency – American governmental agency dealing with the development of military technology operating in the Department of Defence structures.
 
16.
WANK - Worms Against Nuclear Killers – the worm had a vivid political envoi.
 
 
CITATIONS (1):
1.
Modelling computer networks for further security research
Zsolt Bederna, Tamás Szádeczky
Security and Defence Quarterly
 
eISSN:2544-994X
ISSN:2300-8741
Journals System - logo
Scroll to top