THREATS FROM CYBERSPACE FOR CIVIL AVIATION
DOI:
https://doi.org/10.34752/2021-h276Słowa kluczowe:
Cyberspace, cyberattacks, air terrorism, aviation security, preventionAbstrakt
Digital transformation and mobility, which is what drives the revolution in aviation, they are also a challenge to ensure safety. Increasing automation means a greater risk of cyberattack. The author in the article below touches on the issues related to Cyberspace, characterizes it and shows the issues related to violation of civil aviation security by performing cyberattacks, drone attacks, and thus violating civil aviation security. Civil aviation is a specific user of highly advanced information technology and therefore requires special protection against unauthorized access (cyberattacks). This protection covers the entire aviation ecosystem, and in it; Air Traffic Control, aircraft (aviation industry), airports. In the whole process of civil aviation security, and in particular the prevention of cyberattacks and air terrorism, legislation plays a very important role. In recent decades we have witnessed various events that were a serious threat to the safety of air navigation. These situations gave impetus to search and creating new preventive systems ensuring a high level of security in international civil aviation transport.
Pobrania
Bibliografia
Bógadał-Brzezińska A., Gawrycki F. M., Cyberterrorism and the problem of IT security in the modern world, ASPRA-JR, Warsaw 2003
Pokaż w Google Scholar
Borowik, R., Transformations of cultural awareness in the era of the information society, http://www.uci.agh.edu.pl/agh/dep/wsss/konferencja/doc
Pokaż w Google Scholar
Dobrzeniecki K., Law and ethos of cyberspace, Adam Marszałek, Toruń 2021, p. 11
Pokaż w Google Scholar
Gagnon B., Are We Headed for a “Cyber-9/11?”: The American Failure in Cyberstrategy, Center for United States Studies of the Raoul Dandurand Chair of Strategic and Diplomatic Studies, Occasional Paper no 5, Quebec, 2004
Pokaż w Google Scholar
Gibson W., Neuromancer, ed. II, Poznan 1999
Pokaż w Google Scholar
Horoszkiewicz J., Internet - uncontrolled zone in cyberspace, Political Review, 2001. No. 2 (62)
Pokaż w Google Scholar
Kisieliński S., The government wants to protect the cyberspace of the Republic of Poland, Computerworld.pl, February 5, 2009
Pokaż w Google Scholar
Janowska A., Cyberterrorism - reality or fiction ?, [in:] Information society - vision or reality ?, Kraków 2003, http://www.angelfire.com/az/sthurston/Cyberwar.html
Pokaż w Google Scholar
Jasper S., Conflict and Cooperation in the Global Commons. A Comprehensive Approach for International Security, Georgetown University Press/Washington, DC, 2012
Pokaż w Google Scholar
Koziej S., Security: Essence, basic categories and historical evolution, National Security, 2011, No. 18
Pokaż w Google Scholar
Leśnikowski W., Unmanned platforms in cyberspace, Adam Marszałek Toruń, 2017
Pokaż w Google Scholar
Leśnikowski W., Welcome to the cyberwar world, Air Force Review, 2011, No. 4 (046)
Pokaż w Google Scholar
Leśnikowski W., Military use of cyberspace and conventional combat operations, Monograph, Contemporary bioterrorist and cyberterrorist threats and Polish national security, Warsaw, December 2013
Pokaż w Google Scholar
Leśnikowski W., Cyberattacks against critical infrastructure as cheap and effective means to paralyze developed countries, Air Force Review, September 2012 No. 02 (059), (electronic version)
Pokaż w Google Scholar
Leśnikowski W., Welcome to the world of cyberwar part. one; Air Force Review, 2011 No. 4 (046)
Pokaż w Google Scholar
Rattray J. Gregory Strategic war in cyberspace. Secret - Attack - Defense. Scientific and Technical Publishing House, Warsaw 2004
Pokaż w Google Scholar
The governmental cyberspace protection program of the Republic of Poland for 2011-2016, version 1.1, June 2010)
Pokaż w Google Scholar
Sienkiewicz P., 25 lectures, AON, 2013
Pokaż w Google Scholar
Sienkiewicz P., Świeboda H., Lichocki E., System analysis of the phenomenon of cyberterrorism, National Defence Academy.. http://www1.aon.edu.pl/zen2/index.php?option=content&task=view&id=571
Pokaż w Google Scholar






