SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE

One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of...

Full description

Bibliographic Details
Main Authors: Radosław BIELAWSKI, Aleksandra RADOMSKA
Format: Article
Language:English
Published: Wydawnictwo Akademii Sztuki Wojennej 2017-03-01
Series:Security and Defence Quarterly
Subjects:
Online Access:http://www.journalssystem.com/sdq/SELECTED-MODELS-OF-INFORMATION-WARFARE-nIN-CYBERSPACE,103195,0,2.html
id doaj-0175dd58ab0748138431cb1744003b6b
record_format Article
spelling doaj-0175dd58ab0748138431cb1744003b6b2020-11-25T03:23:14ZengWydawnictwo Akademii Sztuki WojennejSecurity and Defence Quarterly2300-87412544-994X2017-03-01141355010.5604/01.3001.0010.8470103195SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACERadosław BIELAWSKI0Aleksandra RADOMSKA1Wydział Zarządzania i Dowodzenia, Akademia Obrony Narodowej, Warszawa, PolskaWar Studies UniversityOne form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.http://www.journalssystem.com/sdq/SELECTED-MODELS-OF-INFORMATION-WARFARE-nIN-CYBERSPACE,103195,0,2.htmlcyberspaceinformation modelsnational securitymilitary systemcriticalinfrastructure
collection DOAJ
language English
format Article
sources DOAJ
author Radosław BIELAWSKI
Aleksandra RADOMSKA
spellingShingle Radosław BIELAWSKI
Aleksandra RADOMSKA
SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
Security and Defence Quarterly
cyberspace
information models
national security
military system
critical
infrastructure
author_facet Radosław BIELAWSKI
Aleksandra RADOMSKA
author_sort Radosław BIELAWSKI
title SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
title_short SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
title_full SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
title_fullStr SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
title_full_unstemmed SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
title_sort selected models of information warfare in cyberspace
publisher Wydawnictwo Akademii Sztuki Wojennej
series Security and Defence Quarterly
issn 2300-8741
2544-994X
publishDate 2017-03-01
description One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
topic cyberspace
information models
national security
military system
critical
infrastructure
url http://www.journalssystem.com/sdq/SELECTED-MODELS-OF-INFORMATION-WARFARE-nIN-CYBERSPACE,103195,0,2.html
work_keys_str_mv AT radosławbielawski selectedmodelsofinformationwarfareincyberspace
AT aleksandraradomska selectedmodelsofinformationwarfareincyberspace
_version_ 1724606702427308032