Opportunity Makes the Thief. A Risk Analysis and Vulnerability Identification Approach in Information Security Management Systems as a Method of Countering Cybercrimes
dc.contributor.author | Świtała, Krzysztof | |
dc.date.accessioned | 2025-04-04T13:02:28Z | |
dc.date.available | 2025-04-04T13:02:28Z | |
dc.date.issued | 2025 | |
dc.description.abstract | Data processing in ICT systems is a fundamental activity in the information society. The aim of this article is to present tools specific to information security management systems, such as risk and vulnerability analysis as solutions that can contribute to reducing the incidence of cybercrimes. Limiting the occurrence of such incidents can therefore be considered as a proactive method of preventing the presence of such criminal acts. Considerations include legal instruments such as the GDPR and the NIS2 Directive, which provide for breach and incident management procedures, as well as a risk-based approach. An analysis of vulnerabilities, together with mechanisms for their reporting and the exchange of such information between authorized entities, is proposed in the new NIS2 Directive. It is an essential tool for increasing the resilience of ICT systems by securing their weakest links. Technical standards from the information security area ISO 27000 are also covered in this article. The interdisciplinary nature of the subject matter analyzed implies a discussion of such methods of increasing the effectiveness of security in ICT systems as penetration testing and hardening. | |
dc.identifier.citation | "Review of European and Comparative Law", 2025, Vol. 60, No. 1, pp. 189-201. | |
dc.identifier.doi | 10.31743/recl.18192 | |
dc.identifier.issn | 2545-384X | |
dc.identifier.uri | https://hdl.handle.net/20.500.12153/8585 | |
dc.language.iso | en | |
dc.publisher | Wydawnictwo KUL | |
dc.rights | Attribution 4.0 International | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.subject | cybersecurity | |
dc.subject | cybercrime | |
dc.subject | ISMS | |
dc.subject | risk management | |
dc.subject | vulnerability analysis | |
dc.title | Opportunity Makes the Thief. A Risk Analysis and Vulnerability Identification Approach in Information Security Management Systems as a Method of Countering Cybercrimes | |
dc.title.alternative | ||
dc.type | info:eu-repo/semantics/article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Switala_Opportunity_makes_the_thief_A_risk_analysis_and_vulnerability_identification_approach_in_information_security_management_systems_as_a_method_of_countering_cybercrimes.pdf
- Size:
- 140.78 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 2.81 KB
- Format:
- Item-specific license agreed upon to submission
- Description: