Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
6
Bezpieczeństwopaństwawcyberprzestrzeni
TableofContents
Abbreviations......................................................9
Preface.............................................................11
ArturTrubalski,JustynaTrubalska
Chapter1.Poland'ssafetyinthecyberspace........................17
1.1.Introduction...........................................................17
1.2.Safetyofthestateinthecyberspaceanditsconditions.......................18
1.3.Treatsinthecyberspace................................................22
1.4.Legalandinstitutionalsolutionsinprovidingsecurityofthestateinthe
cyberspace............................................................23
1.5.Conclusions...........................................................28
KrzysztofGawkowski
Chapter2.Impactofthedevelopmentofnewtechnologieson
thecybersecurity..................................................31
2.1.Introduction...........................................................31
2.2.Securityintheworldoftechnology.......................................33
2.3.Technologyandinformationinthesociety................................34
1.4.Cyberfreedomorcyberslavery?.........................................36
2.5.Legalaspectsofthecybersecurity........................................38
2.6.Conclusions...........................................................41
PiotrMakarzec
Chapter3.Protectionoftheclassifiedinformationintherela-
tionsbetweentheRepublicofPolandandothercountriesand
internationalorganizations........................................43
3.1.Introduction...........................................................43
3.2.Classificationduetothesecurityofthestate...............................44
3.3.Legalactsregardingtheprotectionoftheinternationalclassifiedinformation...46
3.4.TeroleoftheheadoftheInternalSecurityAgencyconcerningtheprotec-
tionoftheinternationalclassifiedinformation.............................48
3.5.Conclusions...........................................................54
GrzegorzPilarski
Chapter4.ComputerIncidentResponseSystem-selectedissues....57
4.1.Introduction...........................................................57
4.2.Cyberspaceandthreats.................................................58
4.3.Originofthecybersecurityentities.......................................67
4.4.DeterminantsofthefunctioningoftheComputerIncidentResponseSystem...72
4.5.Conclusions...........................................................76