The article’s goal is to outline the most characteristic features of the problem of the growing role and predominance of cybersecurity as a key element in the functioning of critical infrastructure ...and the possibilities of the best solutions. Due to the fact that from all systems of critical infrastructure, the most important for the proper functioning of the economy and society is the system of energy and fuel supply. The article will analyze past, present and future threats and evolution of tools to combat them. Particular emphasis will be placed on the characteristics of these threats, especially cyberattacks, as well as the most effective ways of counter-actions. The article might be an element of the debate on the critical impact of cyberattacks on critical infrastructure, which has a direct impact on national security.
The last decades have brought about the rapid development of information technology, which was reflected in all areas of social life and economic. Unfortunately, the ongoing digitization and the ...presence of individuals, private entities as well as countries in the network makes them exposed to new types of threats that have never been seen before. The perpetrators of these threats may be individuals, organized criminal groups or foreign country interviews. Threats and vectors of attacks has many forms, and their evolution continues all along with the progressive development of broadly understood cyberspace. In order to be able to effectively fight with the increasing threats in cyberspace, not only technical and organizational measures are needed, but also the formal and legal framework to combat cyber-attacks. In this article, the authors discuss the legal comparison of the basics of cyber security against the Polish background and EU legislation.
Space Systems as the Weakest Link Dygnatowski, Sławomir
Advances in Military Technology,
6/2021, Letnik:
16, Številka:
1
Journal Article
Recenzirano
Although it is widely believed that the space sector is one of the pillars of national security, in practice cosmic systems exist somewhat outside the area of critical infra-structures discussion. ...Cybersecurity of space systems does not differ significantly from industrial cybersecurity, however, the uniqueness of the sector and space technologies means that its vulnerability to digital incidents depends on a number of factors that does not occur anywhere else. The purpose of the article is to defend the thesis that space systems are the weakest link in critical infrastructure systems, because the level of their cybersecurity is still disproportionate to the level of their technological ad-vancement.
The article deals with the subject of diagnosing the current system of pilot training on multi-role aircraft in Poland. The authors pay particular attention to changes in its organization, arising ...from the compromise between technology, needs and funds on the part of the organizers. The recommended perspective changes in its organization in Poland result from the past three years of research in the Air Force University and institutions engaged in the discussed issues. The issues continue the research process handled in the dissertation 5, resulting from analyses and comparisons with world trends in this respect. The obtained findings suggest that it is essential to achieve the planned outcomes of training pilots on multi-role aircraft, at the same time reducing time and costs. It is linked to the introduction of modern aircraft or equipment supporting the process of pilot training.
The paper describes issues related to reliability of military vehicles based on recorded operational events. Seeking the quantification of reliability for exploiting vehicles in military units, an ...extensive analysis of factors shaping the reliability level was made, taking into consideration all phases of military vehicles existence and a peculiar character of the exploitation process of military vehicles. The importance of reliability research in the decision process optimization was emphasized, controlling the efficiency and availability of the exploitation system.
The modern battlefield seems to be nothing without the electronic infrastructure. The susceptibility of specific systems to threats from electronic countermeasures or hackers has a substantial ...influence on the potential conflict. This article describes the measures used by the state of Israel in the field of cybersecurity. Development level of their systems is very high since their relations with neighbours are hostile, constant threat extorted the development of efficient solutions, which were tested on the battlefield. In addition, the article presented the potential course of Orchard operation to demonstrate the correct usage of offensive measures in cyberspace.