Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 11
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The paper introduces a topology mutation – the novel concept in Moving Target Defense (MTD). MTD is a new technique that represents a significant shift in cyber defense. Traditional cybersecurity techniques have primarily focused on the passive defense of static networks only. In MTD approach cyber attackers are confused by making the attack surface dynamic, and thus harder to probe and infiltrate. The emergence of Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technology has opened up new possibilities in network architecture management. The application of combined NFV and SDN technologies provides a unique platform for implementing MTD techniques for securing the network infrastructure by morphing the logical view of the network topology.

Go to article

Authors and Affiliations

Mariusz Rawski
Download PDF Download RIS Download Bibtex

Abstract

The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanced technical and cultural creation – it is an embodiment of dreams of numerous creators, inventors and engineers; (2) a technical one: security and cyberspace are inseparable components (hence cybersecurity); (3) and a paranoid one: complete security, if achievable, is not a permanent state (hence cyber(in)security). Cyberspace is conceived as a set of digital techniques used to exchange information but also as a new type of social space, partially virtual, which may constitute a being entirely separated from a physical one. A pivotal date for arising of cyberspace may be considered the year 1968 in which routing in the ARPANET network appeared and so did the first programmable logical controller (PLC). For cyberspace this will be the year 1976 – publishing of the key agreement protocol by Witfield Diffie and Martin Hellman. Development of security is correlated with warfare and armament – the military sector has historically made the most significant investments in this area.

Go to article

Authors and Affiliations

Krzysztof Szczypiorski
Download PDF Download RIS Download Bibtex

Abstract

Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.

Go to article

Authors and Affiliations

Michał Glet
Kamil Kaczyński
Download PDF Download RIS Download Bibtex

Abstract

The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for online security risk analysis and for generation and distribution of early warnings.

Go to article

Authors and Affiliations

Marek Amanowicz
Download PDF Download RIS Download Bibtex

Abstract

The COVID-19 pandemic is accompanied by a cyber pandemic, involving changes in the modi operandi of perpetrators of various crimes, and an infodemic, associated with the spread of disinformation. The article analyses the impact of the COVID-19 pandemic on cybercrime and presents the latest research on the number of cybercrime cases in Poland and their growth dynamics. It determines the factors that contribute to the commission of a crime and prevent easy identification of criminals. It also suggests the legal and organisational changes that could reduce the number and effects of the most frequently recorded cyberattacks at a time of COVID-19. Particular attention is paid to legal problems of the growing phenomenon of identity theft, and the need to ensure better protection of users from phishing, including through education and proactive security measures consisting in blocking Internet domains used for fraudulent attempts to obtain data and financial resources.
Go to article

Bibliography

  1.  “Agari H2 2020 Email Fraud Report”. [Online]. Available: https://www.agari.com/cyber-intelligence-research/e-books/agari-h2-2020-email- fraud-report.pdf [Accessed: 15-Jun-2021].
  2.  “IC3 Internet Crime Report 2019”, p. 9. [Online]. Available: https://www.ic3.gov/Media/PDF/AnnualReport/2019_IC3Report.pdf [Accessed: 15-Jun-2021].
  3.  “Internet Organised Crime Threat Assessment (IOCTA) 2020” [Online]. Available: https://www.europol.europa.eu/activities-services/ main-reports/internet-organised-crime-threat-assessment-iocta-2020 [Accessed: 15-Jun-2021], hereinafter as: IOCTA 2020.
  4.  “How COVID-19-related crime infected Europe during 2020” [Online]. Available: https://www.europol.europa.eu/publications-documents/ how-covid-19-related-crime-infected-europe-during-2020 [Accessed: 15-Jun-2021].
  5.  Rise of fake ‘corona cures’ revealed in global counterfeit medicine operation. [Online]. Available: https://www.europol.europa.eu/newsroom/ news/rise-of-fake-%E2%80%98corona-cures%E2%80 %99-revealed-in-global-counterfeit-medicine-operation [Accessed: 15-Jun-2021].
  6.  Warnings about fake online shops are published on consumer or cybersecurity websites. Sample fake online shop search engine: “Suspicious online shops!” [Online]. Available: https://www.legalniewsieci.pl/aktualnosci/podejrzane-sklepy-internetowe [Accessed: 15-Jun-2021], [in Polish].
  7.  Criminal Code of June 6, 1997 (Journal of Laws of 2020, item 1444, as amended), hereinafter CC.
  8.  Already on 16 March 2020, criminals created a fraudulent fundraiser in Poland at https://pomoc.siepomaga.net/koronawirus?SS52.
  9.  “Annual Report on the Activities of CERT Poland. Security Landscape of the Polish Internet”, 2018, pp. 59–67. [Online]. Available: https:// www.cert.pl/uploads/docs/Raport_CP_2018.pdf [Accessed: 15-Jun-2021], [in Polish].
  10.  In connection with the discovered insufficient implementation of technical and organisational measures to secure customer data, by a decision of 10 September 2019, Morele.net Sp. z o.o. was charged with an administrative fine of PLN 2.8 million (Decision of President of the Personal Data Protection Office of 10 September 2019, no. ZSPR.421.2.2019, subsequently upheld by a judgement of the Provincial Administrative Court in Warsaw of 3 September 2020, no. II SA/Wa 2559/19, [in Polish].
  11.  Regulation of the Minister of National Education of 11 March 2020 on the temporary restriction of the functioning of educational facilities in relation to preventing, counteracting and combating COVID- 19 (Journal of Laws item 410 as amended), [in Polish].
  12.  Government’s bill to amend the Law on special solutions to prevent, counteract and combat COVID-1  9, other communicable diseases and the resultant crises, and to amend certain other laws, form no. 299 of 26 March 2020. [Online]. Available: http://sejm.gov.pl/Sejm9. nsf/druk.xsp?nr=299 [in Polish].
  13.  A. Gryszczyńska, “The use of COVID- 19 in scenarios of social engineering attacks”, Maritime Security Yearbook, 2021, pp. 137‒161, [Online]. Available: https://wdiom.amw.gdynia.pl/wp-content/uploads/2021/06/PT2020v0.13.pdf [in Polish].
  14.  M.S. Islam et al., “COVID- 19-Related Infodemic and Its Impact on Public Health: A Global Social Media Analysis”, Am. J. Trop. Med. Hyg. 103(4), 1621–1629, (2020), doi: 10.4269/ajtmh.20-0812.
  15.  J. Tidy, “Dr Reddy’s: Covid vaccine-maker suffers cyber-attack”, BBC, Oct. 22, 2020 [Online]. Available: https://www.bbc.com/news/ technology-54642870 [Accessed: 15-Jun-2021].
  16.  “Advisory: APT29 targets COVID- 19 vaccine development”. [Online]. Available: https://www.ncsc.gov.uk/files/Advisory-APT29-targets- COVID-19-vaccine-development.pdf [Accessed: 15-Jun-2021].
  17.  BBC News, “Pfizer/BioNTech vaccine docs hacked from European Medicines Agency”, BBC, Dec. 09, 2020 [Online]. Available: https:// www.bbc.com/news/technology-55249353 [Accessed: 15-Jun-2021].
  18.  “Pandemic profiteering: how criminals exploit the COVID- 19 crisis”. [Online]. Available: https://www.europol.europa.eu/publications- documents/pandemic-profiteering-how-criminals-exploit-covid-19-crisis [Accessed: 15-Jun-2021].
  19.  Wired, Sep. 19, 2020 [Online]. Available: https://www.wired.com/story/a-patient-dies-after-a-ransomware-attack-hits-a-hospital [Accessed: 15-Jun-2021].
  20.  “Annual Report on the Activities of CERT Poland. Security Landscape of the Polish Internet”, 2019. [Online]. Available: https://www. cert.pl/uploads/docs/Raport_CP_2019.pdf [Accessed: 15-Jun-2021], [in Polish].
  21.  “Report on the state of Poland’s cybersecurity in 2019”. [Online]. Available: https://csirt.gov.pl/cer/publikacje/raporty-o-stanie- bezpi/969,Raport-o-stanie-bezpieczenstwa-cyberprzestrzeni-RP-w-2019-roku.html [Accessed: 15-Jun-2021], [in Polish].
  22.  A. Pérez-Escoda, C. Jiménez-Narros, M. Perlado-Lamo-de-Espinosa, and L. Miguel Pedrero-Esteban, “Social Networks Engagement During the COVID-1  9 Pandemic in Spain: Health Media vs. Healthcare Professionals”, Int. J. Environ. Res. Public Health 17(14), (2020), doi: 10.3390/ijerph17145261.
  23.  GWI Coronavirus Research, March 2020 Series 2: Travel & Commuting, GWI Connecting the dots 2021; The biggest COVID- 19 trends that are here to stay. [Online]. Available: https://www.globalwebindex.com [Accessed: 15-Jun-2021].
  24.  “Information society in Poland in 2020”, Central Statistical Office, [Online]. Available: https://stat.gov.pl/obszary-tematyczne/nauka-i- technika-spoleczenstwo-informacyjne/spoleczenstwo-informacyjne/spoleczenstwo-informacyjne-w-polsce-w-2020 -roku,1,14.html [Accessed: 15-Jun-2021], [in Polish].
  25.  “IOCTA 2020”, pp. 6‒7, 13‒17 (2020). [Online]. Available: https://www.europol.europa.eu/sites/default/files/documents/internet_organised_ crime_threat_assessment_iocta_2020.pdf.
  26.  For example in 2013 the Silk Road has been seized: “Ross Ulbricht, the Creator and Owner of the Silk Road Website, Found Guilty in Manhattan Federal Court on All Counts — FBI”. [Online]. Available: https://www.fbi.gov/contact-us/field-offices/newyork/news/press- releases/ross-ulbricht-the-creator-and-owner-of-the-silk-road-website-found-guilty-in-manhattan-federal-court-on-all-counts [Accessed: 15-Jun-2021].
  27.  “Cybercriminals’ favourite VPN taken down in global action”. [Online]. Available: https://www.europol.europa.eu/newsroom/news/ cybercriminals%E2%80%99-favourite-vpn-taken-down-in-global-action [Accessed: 15-Jun-2021].
  28.  “21 arrests in nationwide cyber crackdown”. [Online]. Available: https://www.yorkpress.co.uk/news/18970445.21-arrests-nationwide- crackdown-website-selling-stolen-personal-data/ [Accessed: 15-Jun-2021].
  29.  Recommendation for a Council Decision authorising the opening of negotiations in view of an agreement between the European Union and the United States of America on cross-border access to electronic evidence for judicial cooperation in criminal matters, COM/2019/70 final.
  30.  Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation Orders for electronic evidence in criminal matters, COM/2018/225 final – 2018/0108 (COD).
  31.  Proposal for a Directive of the European Parliament and of the Council laying down harmonised rules on the appointment of legal representatives for the purpose of gathering evidence in criminal proceedings, COM/2018/226 final – 2018/0107 (COD).
  32.  A. Gryszczyńska, “Acquisition and analysis of data on cybersecurity incidents”, Internet. Data analyst, G. Szpor, Ed., C.H. Beck, Warsaw, 2019, pp. 296‒313, [in Polish].
  33.  “Information society in Poland in 2020”, p. 156, [in Polish].
  34.  “Comparative study on filtering, blocking and take-down of illegal content on the Internet”, Swiss Institute of Comparative Law, 2015, [Online]. Available: https://edoc.coe.int/en/internet/7289-pdf-comparative-study-on-blocking-filtering-and-take-down-of-illegal-internet- content-.html [Accessed: 15-Jun-2021].
  35.  Law of 24 May 2002 on the Internal Security Agency and the Intelligence Agency (Journal of Laws of 2020 item 27 as amended), [in Polish].
  36.  Law of 19 November 2009 on Gambling (Journal of Laws of 2020 item 2094), [in Polish].
  37.  P. Dęba, “Multi-vector protection of Internet users as illustrated by the Orange Cyber Shield”, presented at the 12th Scientific Conference Security in the Internet – Cyber Pandemic, UKSW, Warsaw, Oct. 22‒23, 2020, [in Polish].
  38.  Index of domains. [Online]. Available: https://hole.cert.pl/domains/ [Accessed: 15-Jun-2021].
Go to article

Authors and Affiliations

Agnieszka Gryszczyńska
Download PDF Download RIS Download Bibtex

Abstract

The paper addresses a managerial problem related to ensuring cybersecurity of information and knowledge resources in production enterprises interested in the implementation of INDUSTRY 4.0 technologies. The material presented shows the results of experimental research of a qualitative nature, using two expert inventive methods: brain-netting and a fuzzy formula of inference. The experts' competences included the following three variants of the industrial application of the INDUSTRY 4.0 concept: (1) high production volumes achieved using a dedicated and fully robotic production line (2) the manufacture of short, personalized series of products through universal production cells, and (3) the manufacture of specialized unit products for individual customers. The Google Forms software was used to collect these expert opinions. The conclusions of the research carried out using the brain-netting method point to nine variants of the cybersecurity strategy of IT networks and knowledge base resources in manufacturing enterprises represented by the experts. The results of the research using the fuzzy formula of inference are numerically and situationally defined relations linking the above-mentioned nine strategies with five types of cyber-attacks. The summary record of these relations as the basis for managerial cybersecurity recommendations has a matrix form.
Go to article

Authors and Affiliations

Leszek Pacholski
1
ORCID: ORCID

  1. Poznan University of Technology, Faculty of Engineering Management, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article presents a number of comments regarding artificial intelligence (AI) that are not obvious to people who do not deal with this field on a daily basis. At the beginning, the name “artificial intelligence” itself and what it is are discussed. This is needed to follow the discussion on what this AI is. Then it was described how AI was created – in the world and in Poland. The consequences of the appearance of the Chat GPT program, as well as the principles of its operation, are also discussed. Due to the widespread interest in AI, controversial statements have also appeared, often coming from scientific authorities from areas of science far from computer science. There is a polemic against such statements in the section entitled “Weeds to weed out”. The article goes on to show that people have wanted AI since ancient times and describe what an intelligent avatar can do. It also presents what legal regulations are currently being tried to impose on AI systems – in the United States and in the European Union, respectively, and therefore also in Poland. Finally, the topic of mutual relations between AI and cybersecurity was discussed.
Go to article

Authors and Affiliations

Wacław Iszkowski
1 2
Ryszard Tadeusiewicz
3

  1. Polskie Towarzystwo Informatyczne
  2. Polska Izba Informatyki i Telekomunikacji
  3. Akademia Górniczo-Hutnicza, Kraków
Download PDF Download RIS Download Bibtex

Abstract

This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level.

Go to article

Authors and Affiliations

Daniel Wiechecki
Download PDF Download RIS Download Bibtex

Abstract

The aim of the paper is to show how graduated engineering students in classical ICT view practically the advent of the QIT. The students do their theses in El.Eng. and ICT and were asked how to implement now or in the future the QIT in their current or future work. Most of them have strictly defined research topics and in some cases the realization stage is advanced. Thus, most of the potential QIT application areas are defined and quite narrow. In such a case, the issue to be considered is the incorporation of QIT components and interfaces into the existing ICT infrastructure, software and hardware alike, and propose a solution as a reasonable functional hybrid system. The QIT components or circuits are not standalone in most cases, they should be somehow incorporated into existing environment, with a measurable added value. Not an easy task indeed. We have to excuse the students if the proposed solutions are not ripe enough. The exercise was proposed as an on-purpose publication workshop, related strictly to the fast and fascinating development of the QIT. The paper is a continuation of publishing exercises with previous groups of students participating in QIT lectures.
Go to article

Authors and Affiliations

Marcin Wojtkowski
1
Michał Bartoszewski
1
Wojciech Buchwald
1
Karolina Joachimczyk
1
Ada Kawala
1
Ryszard S. Romaniuk
1

  1. Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Under the pressure of sanitary restrictions, the potential of information technologies available to the academic communities for over a dozen years, but not used for various reasons, is released. As a specific case of this trend, a migration from brick-and-mortar voting towards the remote voting by electronic means may intensify in the post-pandemic period at universities. This phenomenon requires an in-depth analysis, the aim of which is to facilitate the management of academic units to choose optimal solutions in the coming years, when such decisions can be made without time pressure and invasive sanitary restrictions. In the process of electronic remote voting, security is a key requirement, which has a number of various attributes: authenticity, correctness, anonymity, verifiability, receiptfreeness, availability. In response to these, to some extent contradictory, requirements, the world of science has been developing protocols and systems based on cryptographic formalisms for years. This article explains the main challenges related to security of remote electronic voting, from which even advanced solutions implemented in academic practice are not free.
Go to article

Authors and Affiliations

Adam Wójtowicz
1

  1. Katedra Technologii Informacyjnych, Uniwersytet Ekonomiczny w Poznaniu
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland

This page uses 'cookies'. Learn more