REAL

Cyberattacks/Incidents and Responding to Them

Kaczmarczyk, Barbara (2024) Cyberattacks/Incidents and Responding to Them. In: Shielding Europe with the Common Security and Defence Policy: The EU Legal Framework for the Development of an Innovative European Defence Industry in Times of a Changing Global Security Environment. Studies of the Central European Professors’ Network . Central European Academic Publishing, Miskolc - Budapest, pp. 619-661. ISBN 978-615-6474-63-6 (printed version), 978-615-6474-64-3 (pdf), 978-615-6474-65-0 (epub)

[img]
Preview
Text
617-662.pdf - Published Version

Download (1MB) | Preview

Abstract

The 21st century has brought forth the digital age. In the past, various types of activities and services could only be performed in the real world, and could be understood without computers. Currently, digital development has rendered possible the performance of numerous, if not almost all, everyday activities online. Services such as online shopping, booking trips, and opening bank accounts are also currently more financially profitable than traditional methods, as well as less time-consuming. Importantly, it is also possible to conduct elections and educational or product promotional campaigns via the Internet in today’s digital world, and to conduct fast, free searches for various different pieces of information and large datasets. Digitalisation has undoubtedly contributed to the development of many areas of human life, groups, and institutions. The development of civilization and the digital world also led to the rise of various mechanisms, such as incidents or cyberattacks, that can disrupt these processes. Some of the reasons underlying incidents or cyberattacks, which are highly varied, include achieving quick financial success and destabilising the functioning of specific groups or organisations. Therefore, it is very important to recognise how incidents or cyberattacks work and how to prepare for them, prevent them, and if they occur, how to respond to them. It is also important to restore the status to that before the occurrence of the incidents or the cyberattack.

Item Type: Book Section
Uncontrolled Keywords: cyber incident, cyberattack, cybersecurity, cyber space, cyber defence
Subjects: K Law / jog > K Law (General) / jogtudomány általában
Depositing User: Dr. Bernadett Solymosi-Szekeres
Date Deposited: 03 Dec 2024 11:27
Last Modified: 03 Dec 2024 11:27
URI: https://real.mtak.hu/id/eprint/210739

Actions (login required)

Edit Item Edit Item