Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna
For the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channe...
Main Author: | |
---|---|
Format: | Article |
Language: | deu |
Published: |
Szczecin University Press
2021-01-01
|
Series: | Acta Politica Polonica |
Subjects: | |
Online Access: | https://wnus.edu.pl/ap/pl/issue/1208/article/19199/ |
id |
doaj-96ab2ac333c24ac689fff6b406fdbc3b |
---|---|
record_format |
Article |
spelling |
doaj-96ab2ac333c24ac689fff6b406fdbc3b2021-10-08T09:55:35ZdeuSzczecin University PressActa Politica Polonica2451-04322021-01-015110.18276/ap.2021.51-01Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretycznaMarek Górka0Politechnika Koszalińska, Wydział HumanistycznyFor the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channels of communication, to discredit and criticize the way government is run. A key problem is that digital technology dominates the functioning of the economy as well as society, and its widespread use is also one of the basic foundations of modern military operations. Threats in the area of the state’s cyberspace are becoming more and more complex, because the adversary that can cause a lot of damage can be a foreign and hostile state as well as organizations or individuals who are professional and determined in their actions.https://wnus.edu.pl/ap/pl/issue/1208/article/19199/cyber warfarecyber threatscyber security policy |
collection |
DOAJ |
language |
deu |
format |
Article |
sources |
DOAJ |
author |
Marek Górka |
spellingShingle |
Marek Górka Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna Acta Politica Polonica cyber warfare cyber threats cyber security policy |
author_facet |
Marek Górka |
author_sort |
Marek Górka |
title |
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna |
title_short |
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna |
title_full |
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna |
title_fullStr |
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna |
title_full_unstemmed |
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna |
title_sort |
współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. analiza teoretyczna |
publisher |
Szczecin University Press |
series |
Acta Politica Polonica |
issn |
2451-0432 |
publishDate |
2021-01-01 |
description |
For the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channels of communication, to discredit and criticize the way government is run. A key problem is that digital technology dominates the functioning of the economy as well as society, and its widespread use is also one of the basic foundations of modern military operations. Threats in the area of the state’s cyberspace are becoming more and more complex, because the adversary that can cause a lot of damage can be a foreign and hostile state as well as organizations or individuals who are professional and determined in their actions. |
topic |
cyber warfare cyber threats cyber security policy |
url |
https://wnus.edu.pl/ap/pl/issue/1208/article/19199/ |
work_keys_str_mv |
AT marekgorka wspołczesnezagrozeniacybernetycznenaprzykładziezjawiskacyberwojnyanalizateoretyczna |
_version_ |
1716838515970408448 |