Abstract
Cybersecurity has only recently become a major topic in the Slovak republic, mainly because of the introduction of new legislation, such as the General Data Protection Regulation and the Cybersecurity Act as well as the impact of a pandemic that moved many human activities into the digital world. This legislation makes public and private institutions legally responsible for keeping the nation’s IT infrastructure and data safe under the threat of legal consequences. This sudden shift saw many companies and public institutions scrambling to meet the new legal demands, but have often found a lack of professionals, institutions, systems, but mainly information. Cybersecurity is a young science with its terminology still in debate. Within this paper we will be defining key terms necessary for discussions on this topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Čupka, O.: Manažment bezpečnosti zamestnanca. Univerzita Komenského, Diplomová práca (2020)
Miller, M.: The Clock Strikes 13 on the 2020 Verizon Data Breach Investigations Report. BeyondTrust. https://www.beyondtrust.com/blog/entry/the-clock-strikes-13-on-the-2020-verizon-data-breach-investigations-report (2020). Accessed 29 Apr 2021
Avast: What is Hacking? https://www.avast.com/c-hacker (2021). Accessed 29 Apr 2021
Cisco: What is Malware?—Definition and Examples. Cisco. https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html. Accessed 29 Apr 2021
Norton: What is a Computer Virus? https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html (2021). Accessed 29 Apr 2021
Kaspersky: What is a Trojan?—Definition and Explanation. Kaspersky. https://www.kaspersky.com/resource-center/threats/trojans (2021). Accessed 29 Apr 2021
Norton: What is a Computer Worm and How Does It Work? https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html (2021). Accessed 29 Apr 2021
Kaspersky: What is Spyware? https://www.kaspersky.com/resource-center/threats/spyware (2021). Accessed 29 Apr 2021
McAfee: What is Ransomware? McAfee. https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware.html (2021). Accessed 29 Apr 2021
ENISA: What is “Social Engineering”? https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/what-is-social-engineering (2020). Accessed 3 Mar 2020
Cisco: What is Phishing? Cisco. https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html. Accessed 29 Apr 2021
Cisco: Cyber Attack—What Are Common Cyberthreats? Cisco. https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html (2021). Accessed 29 Apr 2021
IBM Security: X-Force Threat Intelligence Index 2021 (2021)
Kaspersky: Brute Force Attack: Definition and Examples. https://www.kaspersky.com/resource-center/definitions/brute-force-attack (2021). Accessed 1 May 2021
ESET: Cryptojacking Definition. https://www.eset.com/int/malicious-cryptominers/ (2021). Accessed 1 May 2021
Elgan, M.: Nation-State Cyber Attacks Aren’t Like Your Average Cyber Adversary. Verizon Enterprise. https://enterprise.verizon.com/resources/articles/s/nation-state-cyber-attacks-arent-like-your-average-cyber-adversary/ (2021). Accessed 1 May 2021
Pawera, R.: Manažment rizík medzinárodnej bezpečnosti v 21. storočí ako súčasť globálneho manažmentu. In: Hodnoty trestného práva, kriminalistiky, kriminológie, forenzných a bezpečnostných vied v teórii a praxi: pocta prof., pp. 796–809. Vydavatelství a nakladatelství Aleš Čeněk, Plzeň (2020)
Zákon č. 171/1993 Z.z. o Policajnom zbore v znení 395/2019 Z.z. o Policajnom zbore v znení neskorších predpisov
NBÚ - SK Cert: Národná stratégia kybernetickej bezpečnosti na roky 2021 až 2025 (2021)
Tropina, T.: Cyber-policing: the role of the police in fighting cybercrime. In: European Police Science and Research Bulletin 2009, pp. 287–294. CEPOL, Bad Hoevedorp (2017)
PurpleSec: 2019 Cyber Security Statistics Trends & Data. PurpleSec. https://purplesec.us/resources/cyber-security-statistics/ (2020). Accessed 31 Dec 2020
Statista Number of Ransomware Attacks Per Year 2019. Statista. https://www.statista.com/statistics/494947/ransomware-attacks-per-year-worldwide/. Accessed 3 Jan 2021
Herjavec: The 2020 Official Annual Cybercrime Report. Herjavec Group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/. Accessed 3 Jan 2021
Strawbridge, G.: How Do Hackers Normally Get Caught? MetaCompliance. https://www.metacompliance.com/blog/how-do-hackers-normally-get-caught/ (2019). Accessed 3 Jan 2021
Grimes, R.A.: Why It’s So Hard to Prosecute Cyber Criminals. CSO Online. https://www.csoonline.com/article/3147398/why-its-so-hard-to-prosecute-cyber-criminals.html (2016). Accessed 3 Jan 2021
Halloran, N.: The Fallen of World War II. Highermedia (2016)
NATO: Defence Expenditure of NATO Countries (2013–2020) (2021)
TASR: Slovenská armáda do konca roku 2022 navýši svoje stavy. Vojakov bude takmer 20-tisíc. https://www.trend.sk/spravy/slovenska-armada-konca-roku-2022-navysi-svoje-stavy-vojakov-bude-takmer-20-tisic (2021). Accessed 4 Nov 2021
Bezpečnostná stratégia SR/2017
NATO: What is NATO? https://www.nato.int/nato-welcome/index.html (2020). Accessed 13 Mar 2021
Herzenhorn, D.M.: Biden Embraces NATO, but European Allies Are Weak. POLITICO. https://www.politico.eu/article/us-president-joe-biden-embraces-nato-but-european-allies-are-weak/ (2021). Accessed 6 Nov 2021
NBÚ: Obranná stratégia Slovenskej republiky (2021)
NCSI: Slovakia. https://ncsi.ega.ee/country/sk/ (2020). Accessed 24 Apr 2021
Belan, Ľ: Bezpečnostný manažment. Žilinská univerzita, Žilina (2015)
Petrufová, M., Naď, J.: Zodpovednosť manažérov za riadenie organizácií v bezpečnostnom sektore. In: Národná a medzinárodná bezpečnosť 2016. Akadémia ozbrojených síl generála M.R. Štefánika, Liptovský Mikuláš (2016)
Poniszewska-Maranda, D., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H.: A real-time service system in the cloud. J. Ambient Intell. Hum. Comput. 11(3), 961–977 (2020). https://doi.org/10.1007/s12652-019-01203-7
Cisco: What is Cybersecurity? Cisco. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html (2016). Accessed 31 Dec 2020
Veselý, P.: Manažment ochrany informácií, 1st edn. TopSmart Business, Praha (2020)
Fedushko, S., Ustyianovych, T., Gregus, M.: Real-time high-load infrastructure transaction status output prediction using operational intelligence and big data technologies. Electronics 9(4), 668 (2020). https://doi.org/10.3390/electronics9040668
Keller, N.: The Five Functions. NIST. https://www.nist.gov/cyberframework/online-learning/five-functions (2018). Accessed 27 Mar 2021
Botelho, B.: What is Context-Aware Security? SearchSecurity. https://searchsecurity.techtarget.com/definition/context-aware-security (2013). Accessed 27 Mar 2021
CIS: CIA Triad. CIS. https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/ (2020). Accessed 14 Mar 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Čupka, O., Federlova, E., Vesely, P. (2023). Definition of Terminology in Security Sciences. In: Kryvinska, N., Greguš, M., Fedushko, S. (eds) Developments in Information and Knowledge Management Systems for Business Applications. Studies in Systems, Decision and Control, vol 462. Springer, Cham. https://doi.org/10.1007/978-3-031-25695-0_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-25695-0_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25694-3
Online ISBN: 978-3-031-25695-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)