Skip to main content

Abstract

Cybersecurity has only recently become a major topic in the Slovak republic, mainly because of the introduction of new legislation, such as the General Data Protection Regulation and the Cybersecurity Act as well as the impact of a pandemic that moved many human activities into the digital world. This legislation makes public and private institutions legally responsible for keeping the nation’s IT infrastructure and data safe under the threat of legal consequences. This sudden shift saw many companies and public institutions scrambling to meet the new legal demands, but have often found a lack of professionals, institutions, systems, but mainly information. Cybersecurity is a young science with its terminology still in debate. Within this paper we will be defining key terms necessary for discussions on this topic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Čupka, O.: Manažment bezpečnosti zamestnanca. Univerzita Komenského, Diplomová práca (2020)

    Google Scholar 

  2. Miller, M.: The Clock Strikes 13 on the 2020 Verizon Data Breach Investigations Report. BeyondTrust. https://www.beyondtrust.com/blog/entry/the-clock-strikes-13-on-the-2020-verizon-data-breach-investigations-report (2020). Accessed 29 Apr 2021

  3. Avast: What is Hacking? https://www.avast.com/c-hacker (2021). Accessed 29 Apr 2021

  4. Cisco: What is Malware?—Definition and Examples. Cisco. https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html. Accessed 29 Apr 2021

  5. Norton: What is a Computer Virus? https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html (2021). Accessed 29 Apr 2021

  6. Kaspersky: What is a Trojan?—Definition and Explanation. Kaspersky. https://www.kaspersky.com/resource-center/threats/trojans (2021). Accessed 29 Apr 2021

  7. Norton: What is a Computer Worm and How Does It Work? https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html (2021). Accessed 29 Apr 2021

  8. Kaspersky: What is Spyware? https://www.kaspersky.com/resource-center/threats/spyware (2021). Accessed 29 Apr 2021

  9. McAfee: What is Ransomware? McAfee. https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware.html (2021). Accessed 29 Apr 2021

  10. ENISA: What is “Social Engineering”? https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/what-is-social-engineering (2020). Accessed 3 Mar 2020

  11. Cisco: What is Phishing? Cisco. https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html. Accessed 29 Apr 2021

  12. Cisco: Cyber Attack—What Are Common Cyberthreats? Cisco. https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html (2021). Accessed 29 Apr 2021

  13. IBM Security: X-Force Threat Intelligence Index 2021 (2021)

    Google Scholar 

  14. Kaspersky: Brute Force Attack: Definition and Examples. https://www.kaspersky.com/resource-center/definitions/brute-force-attack (2021). Accessed 1 May 2021

  15. ESET: Cryptojacking Definition. https://www.eset.com/int/malicious-cryptominers/ (2021). Accessed 1 May 2021

  16. Elgan, M.: Nation-State Cyber Attacks Aren’t Like Your Average Cyber Adversary. Verizon Enterprise. https://enterprise.verizon.com/resources/articles/s/nation-state-cyber-attacks-arent-like-your-average-cyber-adversary/ (2021). Accessed 1 May 2021

  17. Pawera, R.: Manažment rizík medzinárodnej bezpečnosti v 21. storočí ako súčasť globálneho manažmentu. In: Hodnoty trestného práva, kriminalistiky, kriminológie, forenzných a bezpečnostných vied v teórii a praxi: pocta prof., pp. 796–809. Vydavatelství a nakladatelství Aleš Čeněk, Plzeň (2020)

    Google Scholar 

  18. Zákon č. 171/1993 Z.z. o Policajnom zbore v znení 395/2019 Z.z. o Policajnom zbore v znení neskorších predpisov

    Google Scholar 

  19. NBÚ - SK Cert: Národná stratégia kybernetickej bezpečnosti na roky 2021 až 2025 (2021)

    Google Scholar 

  20. Tropina, T.: Cyber-policing: the role of the police in fighting cybercrime. In: European Police Science and Research Bulletin 2009, pp. 287–294. CEPOL, Bad Hoevedorp (2017)

    Google Scholar 

  21. PurpleSec: 2019 Cyber Security Statistics Trends & Data. PurpleSec. https://purplesec.us/resources/cyber-security-statistics/ (2020). Accessed 31 Dec 2020

  22. Statista Number of Ransomware Attacks Per Year 2019. Statista. https://www.statista.com/statistics/494947/ransomware-attacks-per-year-worldwide/. Accessed 3 Jan 2021

  23. Herjavec: The 2020 Official Annual Cybercrime Report. Herjavec Group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/. Accessed 3 Jan 2021

  24. Strawbridge, G.: How Do Hackers Normally Get Caught? MetaCompliance. https://www.metacompliance.com/blog/how-do-hackers-normally-get-caught/ (2019). Accessed 3 Jan 2021

  25. Grimes, R.A.: Why It’s So Hard to Prosecute Cyber Criminals. CSO Online. https://www.csoonline.com/article/3147398/why-its-so-hard-to-prosecute-cyber-criminals.html (2016). Accessed 3 Jan 2021

  26. Halloran, N.: The Fallen of World War II. Highermedia (2016)

    Google Scholar 

  27. NATO: Defence Expenditure of NATO Countries (2013–2020) (2021)

    Google Scholar 

  28. TASR: Slovenská armáda do konca roku 2022 navýši svoje stavy. Vojakov bude takmer 20-tisíc. https://www.trend.sk/spravy/slovenska-armada-konca-roku-2022-navysi-svoje-stavy-vojakov-bude-takmer-20-tisic (2021). Accessed 4 Nov 2021

  29. Bezpečnostná stratégia SR/2017

    Google Scholar 

  30. NATO: What is NATO? https://www.nato.int/nato-welcome/index.html (2020). Accessed 13 Mar 2021

  31. Herzenhorn, D.M.: Biden Embraces NATO, but European Allies Are Weak. POLITICO. https://www.politico.eu/article/us-president-joe-biden-embraces-nato-but-european-allies-are-weak/ (2021). Accessed 6 Nov 2021

  32. NBÚ: Obranná stratégia Slovenskej republiky (2021)

    Google Scholar 

  33. NCSI: Slovakia. https://ncsi.ega.ee/country/sk/ (2020). Accessed 24 Apr 2021

  34. Belan, Ľ: Bezpečnostný manažment. Žilinská univerzita, Žilina (2015)

    Google Scholar 

  35. Petrufová, M., Naď, J.: Zodpovednosť manažérov za riadenie organizácií v bezpečnostnom sektore. In: Národná a medzinárodná bezpečnosť 2016. Akadémia ozbrojených síl generála M.R. Štefánika, Liptovský Mikuláš (2016)

    Google Scholar 

  36. Poniszewska-Maranda, D., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H.: A real-time service system in the cloud. J. Ambient Intell. Hum. Comput. 11(3), 961–977 (2020). https://doi.org/10.1007/s12652-019-01203-7

    Article  Google Scholar 

  37. Cisco: What is Cybersecurity? Cisco. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html (2016). Accessed 31 Dec 2020

  38. Veselý, P.: Manažment ochrany informácií, 1st edn. TopSmart Business, Praha (2020)

    Google Scholar 

  39. Fedushko, S., Ustyianovych, T., Gregus, M.: Real-time high-load infrastructure transaction status output prediction using operational intelligence and big data technologies. Electronics 9(4), 668 (2020). https://doi.org/10.3390/electronics9040668

    Article  Google Scholar 

  40. Keller, N.: The Five Functions. NIST. https://www.nist.gov/cyberframework/online-learning/five-functions (2018). Accessed 27 Mar 2021

  41. Botelho, B.: What is Context-Aware Security? SearchSecurity. https://searchsecurity.techtarget.com/definition/context-aware-security (2013). Accessed 27 Mar 2021

  42. CIS: CIA Triad. CIS. https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/ (2020). Accessed 14 Mar 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ondrej Čupka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Čupka, O., Federlova, E., Vesely, P. (2023). Definition of Terminology in Security Sciences. In: Kryvinska, N., Greguš, M., Fedushko, S. (eds) Developments in Information and Knowledge Management Systems for Business Applications. Studies in Systems, Decision and Control, vol 462. Springer, Cham. https://doi.org/10.1007/978-3-031-25695-0_23

Download citation

Publish with us

Policies and ethics