Central and Eastern European Countries under Cyberthreats
- Institution: Pedagogical University of Kraków (Poland)
- Year of publication: 2017
- Source: Show
- Pages: 30-39
- DOI Address: http://dx.doi.org/10.15804/ppsy2017102
- PDF: ppsy/46-1/ppsy2017102.pdf
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this issue from the perspective of Central and Eastern European Countries. It argues that this form of hostile actions will be increasingly utilized in the region. The main assumption, following Alvin Toffler’s theory, is that “information” – as an increasingly important element of modern societies and as their strategic resource – also serves as a significant tool of modern conflicts. Since information is nowadays strongly related to new technologies, mainly the aspects connected to cybersecurity are analysed. The article looks closer at different aspects of cyberthreats and explains their possible consequences. It may serve as good material for further research and recommendations on countermeasures that may increase security in Europe.
References:
- “Apt28: A Window Into Russia’s Cyber Espionage Operations?” (2014). Fireeye. Retrieved from: www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf.
- Alberts, D.S. Garstka, J.J. Stein, F.P. (2000). Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP Publication Series.
- Libicki, M. (2012). Crisis and Escalation in Cyberspace. RAND Corporation.
- Castells, M. (2008). Społeczeństwo sieci. Warszawa: Wydawnictwo Naukowe PWN.
- Ciborowski, L. (1999). Walka informacyjna. Toruń: Wydawnictwo ECT.
- European Security Strategy (2003). Secure Europe In a Better World. Brussels: Council of the European Union.
- Ferfecki, W. (2017). “MSZ na celowniku rosyjskich hakerów”. Rzeczpospolita. Retrieved from: www.rp.pl/Polityka/301299943-MSZ-na-celowniku-rosyjskich-hakerow.html.
- Goban-Klas, T., & Sienkiewicz, P. (1999). Społeczeństwo informacyjne: Szanse, zagrożenia, wyzwania. Kraków: Wydawnictwo Fundacji Postępu Telekomunikacji.
- Healey, J. (2011). “Beyond Attribution: Seeking National Responsibility for Cyber Attacks”. Washington, DC: Atlantic Council.
- Intelligence Community Assessment (2017). “Assessing Russian Activities and Intentions in Recent US Elections”. Senate.gov, Retrieved from: www.intelligence.senate.gov/sites/default/files/documents/ICA_2017_01.pdf.
- Komunikat do Parlamentu Europejskiego i Rady (2016). Wspólne ramy dotyczące przeciwdziałania zagrożeniom hybrydowym – odpowiedź Unii Europejskiej. Brussels: the European Union.
- Kozłowski, A. (2014). “Comparative Analysis Of Cyberattacks On Estonia, Georgia And Kyrgyzstan”. European Scientific Journal, 3, pp. 237-245.
- Kushner, D. (2013). “The Real Story of Stuxnet”. IEEE Spectrum, Retrieved from: spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet.
- Kvochko, E. (2013). “Five ways technology can help the economy”. World Economic Forum, Retrieved from: www.weforum.org/agenda/2013/04/five-ways-technology-can-help-the-economy/.
- Kwiećka, R. (2001). Informacja w walce zbrojnej. Warszawa: Akademia Obrony Narodowej.
- Muller, R. (2017). “Foreign state seen behind hack into Czech Foreign Ministry email”, Reuters. Retrieved from: www.reuters.com/article/us-czech-cybercrime-idUSKBN15F1OS.
- Nye, J. S. (2004). Soft Power. The Means to Success In World Politics, New York.
- Rządowe Centrum Bezpieczeństwa (2013). Narodowy Program Ochrony Infrastruktury Krytycznej. Warszawa: RCB.
- Singer, P.W. (2010). Wired for War. The Robotic Revolution and Conflict in the 21st Century. Penguin Books.
- Toffler, A. (2006). Trzecia Fala. Poznań: Wydawnictwo Kurpisz S.A.
- Toffler, A., & Toffler, H. (2006). Wojna i antywojna. Jak przetrwać na progu XXI wieku?. Poznań: Wydawnictwo Kurpisz S.A.
- „USA oskarża Rosję o cyberatak na Ukrainę” (2016). Rzeczpospolita. Retrieved from: www.rp.pl/Konflikt-na-Ukrainie/160219754-USA-oskarza-Rosje-o-cyberatak-na-Ukraine.html.
cyberattacks secuity hybrid conflict information security CEE region cyberthreats cybersecurity information warfare