The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development
pdf with cover

Keywords

security studies
information security
digital age
information security management

Categories

How to Cite

Sapiński, A. (2023) “The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development”, Scientific Journal of Bielsko-Biala School of Finance and Law. Bielsko-Biała, PL, 27(1), pp. 52–55. doi: 10.19192/wsfip.sj1.2023.8.

Abstract

In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces. The article focuses on various aspects of information security, such as cyber security, privacy protection, data protection and network security. It also analyses the ways in which countries and organisations are taking steps to ensure information security and the challenges that accompany these efforts. Finally, the article provides an outlook on the development of information security in the digital age and points to the most important directions to be taken to ensure information security in the future

https://doi.org/10.19192/wsfip.sj1.2023.8
pdf with cover

References

Accenture, Ponemon Institute (2021) Cost of Cybercrime Study: Global, https://www.accenture.com/us-en/insights/security/cost-cybercrime-study

Cybersecurity Ventures (2020) Cybercrime Report 2020, https://cybersecurityventures.com/cybercrime-report-2020/

IBM Security (2020) Cost of a Data Breach Report, https://www.ibm.com/security/data-breach

Microsoft (2020) Digital Defense Report, https://www.microsoft.com/security/blog/2020/10/12/digital-defense-report/

European Union Agency for Cybersecurity (2021), Threat Landscape Report 2021, https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2021

IBM Security (2020) Cost of a Data Breach Report, https://www.ibm.com/security/data-breach

S.E. Bonner (2020) Cybersecurity Essentials. Packt Publishing Ltd.

D.E. Denning (1999) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives.

ISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems Requirements, International Organization for Standardization (ISO), 2013.

D. Florêncio & C. Herley (2007) A Large-Scale Study of Web Password Habits, In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada.

M. Jankowski (2018) Bezpieczeństwo informacyjne w przedsiębiorstwie, Wydawnictwo Naukowe PWN.

A. Stachowiak (2019) Bezpieczeństwo informacyjne w organizacji, Oficyna Wydawnicza Politechniki Warszawskiej.

"NATO's Cyber Defence, https://www.nato.int/cps/en/natohq/topics_78170.htm.

J. Kuhn (2005), Different Approaches to Information Security Management, in Proceedings of the 38th Hawaii International Conference on System Sciences

K. Scarfone and P. Mell (2007) Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology, Special Publication 800-94.

P. Swoboda (2014) Agencja Bezpieczeństwa Wewnętrznego w systemie bezpieczeństwa państwa, Bezpieczeństwo RP wczoraj i dziś, (ed.) M. Śliwa, A. Żebrowski, R. Kłaczyński, Kraków: Wydawnictwo Naukowe Uniwersytetu Pedagogicznego.

J. Chakrabarti (2010) Security in the Cloud: Challenges and Opportunities, in Proceedings of the 2010 International Conference on Advances in Computing, Communications and Informatics

A. Jøsang and S. Pope (2004) Formal Requirements for Virtual Organizations, in Proceedings of the 5th IFIP WG 8.5 Working Conference on Virtual Enterprises.

K. Szczypiorski (2019), Cyberbezpieczeństwo. Zagrożenia i wyzwania, Politechnika Warszawska, Warszawa.

D. Wright, N. Tomić, S. Portesi, L. Marinos (2023), ENISA cybersecurity market analysis framework v. 2.0 available at: https://www.enisa.europa.eu/publications/enisa-cybersecurity-market-analysis-framework-ecsmaf-v2.0

The papers published in the ASEJ Journal (alternate title: Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej) - published by the University of Applied Sciences in Bielsko-Biała, are online open access distributed (Creative Commons Attribution CC-BY-NC 4.0 license). The Publisher cannot be held liable for the graphic material supplied. The printed version is the original version of the issued Journal. Responsibility for the content rests with the authors and not upon the Scientific Journal or Bielsko-Biala School of Finance and Law.

Downloads

Download data is not yet available.