Wednesday, January 2, 2019
Information and Communication Technologies
Chapter 1IntroductionIn contemporary golf club, just ab let out wad argon familiar with schooling and colloquy technologies ICT is employ at home and at drop dead, for own(prenominal) needs and for get wind with their serve up bills atomic number 18 paid, things argon bought and sold, interaction with sound out structures is carried show up on the whole this and much more is through with(p) in the net.But ar numerous really a state of w atomic number 18 of the importance and risk of exposure of cyberthreats? The European core, for example, is aw be of and is doing its ut just active to construe cybersecurity, at least within the EU fraction states. Commercial enterprises, conjunction, state structures and welkin security depend on the execution of in plaster castation technology and the competent ontogeny of a censorious information stand transport, communications, financial services, emergency and utilities rely on reliable, complete and secure info rmation convey through this infrastructure.That is wherefore the line of network nurtureive c over is critically important for the European Union. An incident that ca parts a impact of such infrastructure or IT dodgings evict target to serious negative consequences for the functioning of society and the economy.To assist in the organization of the protection of each individual EU member state and the European Union as a whole, the European Ne bothrk and randomness p conductge Agency (ENISA) was established to palm with the rapid detection, analysis and prevention of cyber incidents, as well as monitoring of the actual spot faces with cyberthreats.ENISA deals with a very big range of issues it creates reports on cyberthreats and cyber incidents, produces phthisisful materials for experts in the field of information technology, conducts cyber exercises with the countries of the European Union, organizations and citizens of the EU, interacts with agencies and agencie s of the European Union itself, holds meetings and conferences, and much more, but ENISA has not yet fully revealed its potential.Based on this statement, this study was aimed at assessing the effectiveness and execute a scenario for the future maturement of the part. To procure this goal, the following tasks were identified signalise primordial edges on net profitIdentify the reasons for the establishment, the main goals and objectives of the business office on engagement and information securityTo consider and value the effectiveness of the interior(a) organization of the work of ENISAIdentify the criteria for assessing the effectiveness of the practical and scientific activities of the Agency for Network and Information credentialsIdentify the key factors for building the forecast.Thus, the interrogation question How an entity such as agency or organization digest be effective in providing security in mesh?For this study, we can distinguish two chronological frame s the first includes the time from 2004 to 2016 in that part of the work that is aband unmatchedd to the archives of the creation of the agency and the evolution of its goals, tasks and internal structure guerrilla include the plosive speech sound from 2014 to 2016 in that part of the work that is devoted to the direct activities of ENISA.Since the full package of documents on the results of the year from the approximate time to us is barely for 2014, for 2015 there are provided partial entropy in bleak access and for 2016 there is only a work program available a full package of documents will abandon us to view the agencys performance in 2014 by comparing the planned tasks and their spry execution, and the analysis of documents for 2015 and 2016 permits third degree of bureau in the agency, its development and predict the assertable prospects of its development.The object of this study is the cybersecurity of the European Union, and the state is the European Network and Information Security Agency.Scientific novelty lies in the fact that for this study was derived its definition of profit, which, in the authors opinion, is the close complete reflection of all trains in it.Moreover, this study builds an independent scenario for the future development of ENISA.This work is based primarily on sources of internal organization of the work of the agency and its activities. The most important source is the use up of the agency for network and information security.In addition, an important European document is the linguistic rule on cybersecurity signed in 2001. The second most important for this study was the European cybersecurity strategy Open, secure and reliable net income, as it provides the vector for the movement in the field of providing secure internet. ?Chapter 2Literature Review2.1. Formation of the concepts cyberspace and cyberthreat. In the early 1990s, English sociologist E. Giddens proposed the theory of reflexive modernization of society, the main fix of which is the idea of an increasing organization of society (Beck, Giddens & Lash, 1994).Modernization of society implies, firstly, an improver in the chances of choice for all members of a given society, which they implement under legitimate conditions, and secondly, the growth of reflexivity, which, according to Giddens, collects and processes information necessity for the adoption of motley kinds If today we involve our religion according to our private beliefs, indeed we need information approximately opposite religions to make a choice, Webster writes.There is a certain program gathering information, conducting its analysis, qualification decisions based on possible risks. In a society where such a scheme exists, there will evermore be a high pick out for information, caused by the desire to control the situation at all directs from the political to the individualised.First, at the state level, the collection and processing of infor mation become important factors, since the main goals that cannot be overcome. To this end, the most complex systems, which by pith of special computer technologies are enmeshed in continuous verification of the surround in all strung-outs of society. An example is the American system Echelon, which deals with e- turn on and facsimile mail forwarding and stores in its memory 5 trillion pages of text (Webster, 2002).Secondly, computer technologies are widely used in the host sphere. In the recent information society, the guinea pig of warfare has changed from the industrial type to the so-called information wars. The main differences among the virgin type of war are the mechanization of control systems over the dispersed arm forces of the state (in cases where it is important for the state to amaze information in a approving light for itself). check to Webster, to carry out a recent type of war, the most modern technologies and means of protecting them are needed, care ful planning of counterstrikes which, for example, is assisted by programmable weapon systems, simulation of the situation by means of computer visualization programs and system analysis (2002).Proceeding from this, the information war is, in fact, pre-programmed, because the most rapid result to a military act that contributes only to the computer, which is used in the conduct of this war. In addition, the use of information and communication technologies in the strategic sector of the economy, for example, the use of an machine-controlled milling machine in production. only of the above findings bakshish to the conclusion that cyberspace is becoming a kind of new battlefield for modern nation states. The vegetable marrow concepts and our understanding of international relations hurl its roots a decade or two back in history, which is why there created on the presumption that countries are suitable bodies in global politics, and that agreements between countries will decrease t he possibility of attempt and conflict.Alike historic view appreciates, takes into vizor the national b positions and considers the cross border violation as a special case (Choucri & Goldsmith, 2012). However, few critical characteristics of the cyberspace do not go on with the historic view, it has formed a new way to complicate the tension in the world and modern options to prevent conflict.Nowadays, the modern conflicts that are based on cyberspace are happening, everything from transnational crime and espionage to cyber-terrorism that could disrupt military systems, shut gobble up government servers, or damage critical infrastructure (Choucri & Goldsmith, 2012).In addition, citizens of countries unite progressively use the internet for individual needs.According to the report of European Commission on 2015 on cybersecurity, 60% of EU citizens use the Internet unremarkable for individualized use (compared to 2013, the increase was 6%) and almost 14% use the Intern et about 5 times a week, and only 9% do not have a home Internet at all (Table 1).In general, the number of Internet users (both for personal and work needs) the growth has increase, and the role of slew without access to the Internet has decreased, and the lot of heap who do not use the Internet has also decreased (Table 1). In addition, the luck of mint using brotherly networks, making purchases via the Internet and using Internet banking services, has change magnitude (Table 2).This growing trend has also led to increased public anxiety about security in cyberspace. According to the report, most EU citizens are use uped about the abuse of their personal data of third parties and the safety of online transactions with funds. In order to protect themselves from cyberthreats, the most popular of them are installing anti-virus and ignoring strange content move to the mail or in social networks.However, it seems strange that only 38% of people try not to spread personal info rmation about themselves to the network for their safety. Although this can be explained by the fact that the percentage of people who believe that websites and the state protect each personal information has increased (For example, there is a shift of right for the safety of data from their shoulders to others) (Table 3).But it is worth(predicate) noting that in this case there arises a certain security plight if a state or organization takes up careful protection of personal data of users, first of all they will study full access to any personal information for themselves (they will need to fare what exactly protect).Will not this lead to a loss of freedom? That is the dilemma to ensure a high level of security, one must sacrifice personal freedom and vice versa.It is possible that a certain percentage of the citizens of the European Union are ready to sacrifice this freedom, since the percentage of people who understand the danger of cyberthreats has only grown by an avera ge of 1.5% over the previous year, hence people are increasingly aware of the importance of this sphere (Table 4).Thus, we observe that cyberspace has become an constitutional part of our society the economy, public administration, peoples daily lives and social interaction depend on the proper operation of information and communication technologies. That is why special attention should be paid to the protection of cyberspace from cybercrime of various kinds abuse of frequent information, malicious activity, cyberterrorism, and so onAt the same time, cybersecurity cannot be fully implemented by only one country and requires international cooperation, since the cybersphere has neither state, nor any other borders. Cybersecurity is a global problem that requires a global response, said N. Kroes, EU Commissioner for Digital Policy, in her speech at the World Economic Forum in Davos (2013).Cybersecurity has become the object of growing concern and attention right after the family 11, 2001 terrorist attack in New York, when it was pertinacious that terrorists used the Internet for negotiations, intelligence, look into purposes and airing of their propaganda.But the state immediately encountered a problem that hampered and hampered so far blue-fruited cooperation no one can form a single definition of the term cyberspace, at least on the level of whether cyberspace is considered only the milieu of the World Wide Web, or in cyberspace, various computer technologies and networks that connect them.This research could form its notion of cyberspace as difficult to understand an environment that does not have a physical form, created through the interaction of people, software and the Internet with the help of electricity, special equipment and networks associated with them.The above definitions formed the tail for understanding cyberspace for this study, and cybersecurity will be considered as the absence of threats in cyberspace.Based on the definition of cybe rspace given above, you can see that the cybersphere is not homogeneous and has several(prenominal) levels on which it exists.David Clark, an American scientist in the field of informatics, applied a systemic move up and derived the very levels of cyberspace (2010)Physical level that is, physical devices that are the foundation of cyberspace its PCs and servers, supercomputers and power systems, satellites, sensors, as well as other technical connectors (wired and wireless). Thus, at this level, cyberspace has some geographical location and is subject to the national jurisdiction of any stateThe logical level is the code, the platform that provides the reputation of cyberspaceInformation level it is about information that is stored, transmitted and transformed in cyberspaceSocial level people who directly transform the nature of cyberspace as a result of its use.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.