The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development
pdf with cover (English)

Słowa kluczowe

security studies
information security
digital age
information security management

Kategorie

Jak cytować

Sapiński, A. (2023) „The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development”, Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej. Bielsko-Biała, PL, 27(1), s. 52–55. doi: 10.19192/wsfip.sj1.2023.8.

Abstrakt

In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces. The article focuses on various aspects of information security, such as cyber security, privacy protection, data protection and network security. It also analyses the ways in which countries and organisations are taking steps to ensure information security and the challenges that accompany these efforts. Finally, the article provides an outlook on the development of information security in the digital age and points to the most important directions to be taken to ensure information security in the future

https://doi.org/10.19192/wsfip.sj1.2023.8
pdf with cover (English)

Bibliografia

Accenture, Ponemon Institute (2021) Cost of Cybercrime Study: Global, https://www.accenture.com/us-en/insights/security/cost-cybercrime-study

Cybersecurity Ventures (2020) Cybercrime Report 2020, https://cybersecurityventures.com/cybercrime-report-2020/

IBM Security (2020) Cost of a Data Breach Report, https://www.ibm.com/security/data-breach

Microsoft (2020) Digital Defense Report, https://www.microsoft.com/security/blog/2020/10/12/digital-defense-report/

European Union Agency for Cybersecurity (2021), Threat Landscape Report 2021, https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2021

IBM Security (2020) Cost of a Data Breach Report, https://www.ibm.com/security/data-breach

S.E. Bonner (2020) Cybersecurity Essentials. Packt Publishing Ltd.

D.E. Denning (1999) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, US House of Representatives.

ISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems Requirements, International Organization for Standardization (ISO), 2013.

D. Florêncio & C. Herley (2007) A Large-Scale Study of Web Password Habits, In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada.

M. Jankowski (2018) Bezpieczeństwo informacyjne w przedsiębiorstwie, Wydawnictwo Naukowe PWN.

A. Stachowiak (2019) Bezpieczeństwo informacyjne w organizacji, Oficyna Wydawnicza Politechniki Warszawskiej.

"NATO's Cyber Defence, https://www.nato.int/cps/en/natohq/topics_78170.htm.

J. Kuhn (2005), Different Approaches to Information Security Management, in Proceedings of the 38th Hawaii International Conference on System Sciences

K. Scarfone and P. Mell (2007) Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology, Special Publication 800-94.

P. Swoboda (2014) Agencja Bezpieczeństwa Wewnętrznego w systemie bezpieczeństwa państwa, Bezpieczeństwo RP wczoraj i dziś, (ed.) M. Śliwa, A. Żebrowski, R. Kłaczyński, Kraków: Wydawnictwo Naukowe Uniwersytetu Pedagogicznego.

J. Chakrabarti (2010) Security in the Cloud: Challenges and Opportunities, in Proceedings of the 2010 International Conference on Advances in Computing, Communications and Informatics

A. Jøsang and S. Pope (2004) Formal Requirements for Virtual Organizations, in Proceedings of the 5th IFIP WG 8.5 Working Conference on Virtual Enterprises.

K. Szczypiorski (2019), Cyberbezpieczeństwo. Zagrożenia i wyzwania, Politechnika Warszawska, Warszawa.

D. Wright, N. Tomić, S. Portesi, L. Marinos (2023), ENISA cybersecurity market analysis framework v. 2.0 available at: https://www.enisa.europa.eu/publications/enisa-cybersecurity-market-analysis-framework-ecsmaf-v2.0

Artykuły opublikowane w Zeszytach Naukowych Wyższej Szkoły Finansów i Prawa w Bielsku-Białej (tytuł równoległy: Scientific Journal czy Bielsko-Biała Szkoła Finansów i Prawa) są bezpłatne i udostępniane w trybie online (licencja Creative Commons Attribution CC-BY-NC 4.0). Wydawca nie ponosi odpowiedzialności za dostarczony materiał graficzny. Wersja drukowana to oryginalna wersja wydanego czasopisma. Odpowiedzialność za treść spoczywa na autorach, a nie na czasopiśmie.

##plugins.generic.usageStats.downloads##

##plugins.generic.usageStats.noStats##