Perception of Cyber Threats in Polish Cyber Security Policy on the Example of Strategic Documents in the Period 2013–2024

  • Author: Marek Górka
  • Institution: Koszalin University of Technology
  • ORCID: https://orcid.org/0000-0002-6964-1581
  • Author: Małgorzata Kamola-Cieślik
  • Institution: University of Szczecin
  • ORCID: https://orcid.org/0000-0003-2956-3969
  • Year of publication: 2024
  • Source: Show
  • Pages: 24-38
  • DOI Address: https://doi.org/10.15804/rop2024302
  • PDF: rop/29/rop2902.pdf

The article analyzes the growing role of digitization and the related security challenges in the context of the increasing number of internet-connected devices and increasingly sophisticated cyberattacks. In the context of the dynamic development of technology and the increase in cyber incidents, the article focuses on an interdisciplinary analysis of strategic documents on cyber security policy in Poland, such as Polish Cyberspace Protection Policy and Polish Cyber Security Strategy. The study identifies key threats and assesses the state’s responses to the growing challenges of cyberattacks. The relevant research question around which the analysis in the article is conducted is: What actions are needed to strengthen the cyber security culture in society and organizations? In the face of growing threats, the article also highlights the need to build a culture of cyber security and cooperation between public and private sectors.

REFERENCES:

  • Backman, S. (2023). Normal cyber accidents. Journal of Cyber Policy, 8(1).
  • Doktryna Cyberbezpieczeństwa Rzeczypospolitej Polskiej (2015). Retrieved from: https://bbn.gov.pl/ftp/dok/01/DCB.pdf.
  • Fusi, F., Jung, H., & Welch, E. (2023). Technological vulnerability and knowledge of cyberincidents: threats to innovativeness in local governments? Public Management Review.
  • Hunter, L. Y., Albert, C. D., Garrett, E., Rutland, J. (2022). Democracy and cyberconflict: how regime type affects state-sponsored cyberattacks. Journal of Cyber Policy, 7(1).
  • Katagiri, N. (2023). Artificial Intelligence and Cross-Domain Warfare: Balance of Power and Unintended Escalation. Global Society, 38(1).
  • Khaliq, Z., Khan, D. A., Baba, A. I., Ali, S., & Farooq, S. U. (2024). Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android. CyberPhysical Systems.
  • Marszałek-Kawa, J., Plecka, D., & Hołub, A. (eds.). (2018). Social Security. Selected Aspects. Toruń: Wydawnictwo Adam Marszałek.
  • Ministerstwo Cyfryzacji (2017). Krajowe Ramy Polityki Ochrony Cyberprzestrzeni Rzeczypospolitej Polskiej na lata 2017–2022. Retrieved from: https://cyberpolicy.nask.pl/wp-content/uploads/2017/05/krajowe_ramy_polityki_cyberbezpieczenstwa_rzeczypospolitej_polskiej_na_lata_2017_-_2022.pdf
  • Ministerstwo Cyfryzacji i  Administracji (2013). Polityka ochrony cyberprzestrzeni Rzeczypospolitej Polskiej. Retrieved from: https://mc.bip.gov.pl/projekty-aktowprawnych-archiwum/polityka-ochrony-cyberprzestrzeni-rp-resortowe-zglaszanieuwag-do12-10-2012.html.
  • Najwyższa Izba Kontroli. (2025). Informacja o  wynikach kontroli. Realizacja przez podmioty państwowe zadań w zakresie ochrony cyberprzestrzeni RP. Retrieved from: https://www.nik.gov.pl/kontrole/P/14/043/.
  • NASK, CERT Polska (2015). System bezpieczeństwa cyberprzestrzeni RP. Retrieved from: https://cert.pl/uploads/2015/12/nask_rekomendacja.pdf.
  • Norris, D. F., & Mateczun, L. K. (2022). Cyberattacks on local governments 2020: findings from a key informant survey. Journal of Cyber Policy, 7(3).
  • Prasad, A., & Chandra S. (2023). Machine learning to combat cyberattack: a survey of datasets and challenges. The Journal of Defense Modeling and Simulation, 20(4).
  • Sen, R., Verma, A., & Heim, G. R. (2020). Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. Journal of Management Information Systems, 37(1).
  • Shukla, S., Misra, M., & Varshney, G. (2023). Spoofed Email Based Cyberattack Detection Using Machine Learning. Journal of Computer Information Systems.
  • Smith, T. (2021). The Infodemic as a Threat to Cybersecurity. The International Journal of Intelligence. Security, and Public Affairs, 23(3).
  • Strategii Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej (2014). Retrieved from: https://www.bbn.gov.pl/ftp/SBN%20RP.pdf.
  • Thomas, M. A. (2022). Rozróżnianie cyberataków według stopnia trudności. International Journal of Intelligence and CounterIntelligence, 35(4).
  • Uchwała nr 125 Rady Ministrów z dnia 22 października 2019 r. w sprawie Strategii Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2019–2024. Retrieved from: https://cyberpolicy.nask.pl/wp-content/uploads/2020/01/Strategia-cyberbezpiecze %C5%84stwa-rp-na-lata-2019-2024.pdf.
  • van der Meer, S. (2022). Responding to large-scale cyberattacks: a toolbox for policymakers. Journal of Cyber Policy, 7(2).

digital infrastructure cyber security strategy cyber security policy digitization cyber threats cyberattacks

Message to:

 

 

© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart