Wednesday, January 2, 2019
Information and Communication Technologies
Chapter 1IntroductionIn  contemporary  golf club,  just ab let out  wad argon familiar with  schooling and  colloquy technologies ICT is  employ at home and at  drop dead, for  own(prenominal) needs and for  get wind with their  serve up bills  atomic number 18 paid, things argon bought and sold, interaction with  sound out structures is carried  show up   on the whole this and much more is   through with(p) in the  net.But   ar  numerous really a state of w atomic number 18 of the importance and  risk of exposure of cyberthreats? The European  core, for example, is aw be of and is doing its ut just  active to  construe cybersecurity, at least within the EU  fraction states. Commercial enterprises,  conjunction, state structures and   welkin security depend on the  execution of in plaster castation technology and the competent  ontogeny of a  censorious information  stand transport, communications, financial services, emergency and utilities rely on reliable, complete and secure info   rmation  convey through this infrastructure.That is  wherefore the  line of  network   nurtureive c over is critically important for the European Union. An incident that ca parts a  impact of  such infrastructure or IT  dodgings  evict  target to serious negative consequences for the functioning of society and the economy.To assist in the organization of the protection of each individual EU member state and the European Union as a whole, the European Ne bothrk and  randomness  p conductge Agency (ENISA) was established to  palm with the rapid detection, analysis and prevention of cyber incidents, as well as monitoring of the  actual  spot  faces with cyberthreats.ENISA deals with a very  big range of issues it creates reports on cyberthreats and cyber incidents, produces  phthisisful materials for experts in the field of information technology, conducts cyber exercises with the countries of the European Union, organizations and citizens of the EU, interacts with agencies and agencie   s of the European Union itself, holds meetings and conferences, and much more, but ENISA has not yet  fully revealed its potential.Based on this statement, this study was aimed at assessing the effectiveness and  execute a scenario for the future  maturement of the  part. To  procure this goal, the following tasks were identified signalise  primordial  edges on   net profitIdentify the reasons for the establishment, the main goals and objectives of the  business office on  engagement and information securityTo consider and value the effectiveness of the  interior(a) organization of the work of ENISAIdentify the criteria for assessing the effectiveness of the practical and scientific activities of the Agency for Network and Information  credentialsIdentify the key factors for building the forecast.Thus, the  interrogation question How an entity such as agency or organization  digest be effective in providing security in  mesh?For this study, we can distinguish two chronological frame   s  the first includes the time from 2004 to 2016 in that part of the work that is  aband unmatchedd to the  archives of the creation of the agency and the evolution of its goals, tasks and internal structure  guerrilla include the  plosive speech sound from 2014 to 2016 in that part of the work that is devoted to the direct activities of ENISA.Since the full package of documents on the results of the year from the approximate time to us is  barely for 2014, for 2015 there are  provided partial  entropy in  bleak access and for 2016 there is only a work program available  a full package of documents will  abandon us to view the agencys performance in 2014 by comparing the planned tasks and their  spry execution, and the analysis of documents for 2015 and 2016 permits third degree of  bureau in the agency, its development and predict the  assertable prospects of its development.The object of this study is the cybersecurity of the European Union, and the  state is the European Network    and Information Security Agency.Scientific novelty lies in the fact that for this study was derived its definition of  profit, which, in the authors opinion, is the  close complete reflection of all  trains in it.Moreover, this study builds an independent scenario for the future development of ENISA.This work is based primarily on sources of internal organization of the work of the agency and its activities. The most important source is the  use up of the agency for network and information security.In addition, an important European document is the  linguistic rule on cybersecurity signed in 2001. The second most important for this study was the European cybersecurity strategy Open, secure and reliable  net income, as it provides the vector for the movement in the field of providing secure  internet. ?Chapter 2Literature Review2.1. Formation of the concepts cyberspace and cyberthreat. In the early 1990s, English sociologist E. Giddens proposed the  theory of reflexive modernization    of society, the main  fix of which is the idea of an increasing organization of society (Beck, Giddens & Lash, 1994).Modernization of society implies, firstly, an  improver in the chances of choice for all members of a given society, which they implement under  legitimate conditions, and secondly, the growth of reflexivity, which, according to Giddens, collects and processes information  necessity for the adoption of  motley kinds If today we  involve our religion according to our  private beliefs,  indeed we need information  approximately  opposite religions to make a choice, Webster writes.There is a certain program gathering information, conducting its analysis,  qualification decisions based on possible risks. In a society where such a scheme exists, there will  evermore be a high  pick out for information, caused by the desire to control the situation at all  directs  from the political to the  individualised.First, at the state level, the collection and processing of infor   mation become important factors, since the main goals that cannot be overcome. To this end, the most complex systems, which by  pith of special computer technologies are  enmeshed in continuous verification of the surround in all   strung-outs of society. An example is the American system Echelon, which deals with e- turn on and facsimile mail forwarding  and stores in its memory 5 trillion pages of text (Webster, 2002).Secondly, computer technologies are widely used in the  host sphere. In the  recent information society, the  guinea pig of warfare has changed from the industrial type to the  so-called information wars. The main differences  among the  virgin type of war are the  mechanization of control systems over the dispersed arm forces of the state (in cases where it is important for the state to  amaze information in a  approving light for itself). check to Webster, to carry out a  recent type of war, the most modern technologies and means of protecting them are needed, care   ful planning of counterstrikes which, for example, is assisted by programmable weapon systems, simulation of the situation by means of computer visualization programs and system analysis (2002).Proceeding from this, the information war is, in fact, pre-programmed, because the most rapid  result to a military act that contributes only to the computer, which is used in the conduct of this war. In addition, the use of information and communication technologies in the strategic sector of the economy, for example, the use of an machine-controlled milling machine in production. only of the above findings  bakshish to the conclusion that cyberspace is becoming a kind of new battlefield for modern nation states. The  vegetable marrow concepts and our understanding of international relations  hurl its roots a decade or two back in history, which is why there created on the presumption that countries are suitable bodies in global politics, and that agreements between countries will decrease t   he possibility of attempt and conflict.Alike historic view appreciates, takes into  vizor the national b positions and considers the cross border violation as a special case (Choucri & Goldsmith, 2012). However, few critical characteristics of the cyberspace do not go  on with the historic view, it has formed a new way to complicate the tension in the world and modern options to prevent conflict.Nowadays, the modern conflicts that are based on cyberspace are happening, everything from transnational crime and espionage to  cyber-terrorism that could disrupt military systems, shut  gobble up government servers, or damage critical infrastructure (Choucri & Goldsmith, 2012).In addition, citizens of countries unite  progressively use the  internet for individual needs.According to the report of European Commission on 2015 on cybersecurity, 60% of EU citizens use the Internet  unremarkable for  individualized use (compared to 2013, the increase was 6%) and  almost 14% use the Intern   et about 5 times a week, and only 9% do not have a home Internet at all (Table 1).In general, the number of Internet users (both for personal and work needs) the growth has increase, and the  role of  slew without access to the Internet has decreased, and the  lot of  heap who do not use the Internet has also decreased (Table 1). In addition, the  luck of  mint using  brotherly networks, making purchases via the Internet and using Internet banking services, has  change magnitude (Table 2).This growing trend has also led to increased public anxiety about security in cyberspace. According to the report, most EU citizens are  use uped about the abuse of their personal data of third parties and the safety of online transactions with funds. In order to protect themselves from cyberthreats, the most popular of them are installing anti-virus and ignoring strange content  move to the mail or in social networks.However, it seems strange that only 38% of people try not to spread personal info   rmation about themselves to the network for their safety. Although this can be explained by the fact that the percentage of people who believe that websites and the state protect  each personal information has increased (For example, there is a shift of  right for the safety of data from their shoulders to others) (Table 3).But it is  worth(predicate) noting that in this case there arises a certain security  plight if a state or organization takes up careful protection of personal data of users, first of all they will  study full access to any personal information for themselves (they will need to  fare what exactly protect).Will not this lead to a loss of freedom? That is the dilemma to ensure a high level of security, one must sacrifice personal freedom and vice versa.It is possible that a certain percentage of the citizens of the European Union are ready to sacrifice this freedom, since the percentage of people who understand the danger of cyberthreats has  only grown by an avera   ge of 1.5% over the previous year, hence people are increasingly aware of the importance of this sphere (Table 4).Thus, we observe that cyberspace has become an  constitutional part of our society  the economy, public administration, peoples daily lives and social interaction depend on the proper operation of information and communication technologies. That is why special attention should be paid to the protection of cyberspace from cybercrime of various kinds abuse of frequent information, malicious activity, cyberterrorism,  and so onAt the same time, cybersecurity cannot be fully implemented by only one country and requires international cooperation, since the cybersphere has neither state, nor any other borders. Cybersecurity is a global problem that requires a global response, said N. Kroes, EU Commissioner for Digital Policy, in her speech at the World Economic Forum in Davos (2013).Cybersecurity has become the object of growing concern and attention right after the family 11,    2001 terrorist attack in New York, when it was  pertinacious that terrorists used the Internet for negotiations, intelligence,  look into purposes and  airing of their propaganda.But the state immediately encountered a problem that hampered and hampered so far  blue-fruited cooperation  no one can form a single definition of the term cyberspace, at least on the level of whether cyberspace is considered only the  milieu of the World Wide Web, or in cyberspace, various computer technologies and networks that connect them.This research could form its notion of cyberspace as difficult to understand an environment that does not have a physical form, created through the interaction of people, software and the Internet with the help of electricity, special equipment and networks associated with them.The above definitions formed the  tail for understanding cyberspace for this study, and cybersecurity will be considered as the absence of threats in cyberspace.Based on the definition of cybe   rspace given above, you can see that the cybersphere is not homogeneous and has several(prenominal) levels on which it exists.David Clark, an American scientist in the field of informatics, applied a systemic  move up and derived the very levels of cyberspace (2010)Physical level  that is, physical devices that are the foundation of cyberspace its PCs and servers, supercomputers and power systems, satellites, sensors, as well as other technical connectors (wired and wireless). Thus, at this level, cyberspace has some geographical location and is subject to the national jurisdiction of any stateThe logical level is the code, the platform that provides the  reputation of cyberspaceInformation level  it is about information that is stored, transmitted and transformed in cyberspaceSocial level  people who directly transform the nature of cyberspace as a result of its use.  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.