© The Author(s). Licensee Institute for Local Self-Government Maribor.Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license,
which permits use, distribution and reproduction for non-commercial purposes, provided
the original is properly cited.
Title:
The Public Dimension of Cybersecurity
Editors:
prof. dr. habil., Mirosław Karpiuk, Ph.D. (University of Warmia and Mazury in
Olsztyn, Faculty of Law and Administration), assoc. prof. dr. habil., Jaroslaw
Kostrubiec, Ph.D. (Maria Curie-Skłodowska University (Lublin), Faculty of Law and
Administration)
Reviewers: assoc. prof. dr. András Bencsik, Ph.D. (Eötvös Loránd University (Budapest), Faculty
of Law, Hungary), assoc. prof. dr. Pawel Sitek, Ph.D. (University of Economics and
Human Sciences in Warsaw, Poland)
Kataložni zapis o publikaciji (CIP) pripravili v Narodni in univerzitetni
knjižnici v Ljubljani
COBISS.SI-ID 117820931
ISBN 978-961-7124-10-1 (PDF)
First published in 2022 by
Institute for Local Self-Government Maribor
Smetanova ulica 30, 2000 Maribor, Slovenia
www.lex-localis.press,
[email protected]
For Publisher:
assoc. prof. dr. Boštjan Brezovnik, director
Price: free copy
Acknowledgement:
The monograph has been prepared as a result of the research project “The place of cybersecurity in
the public realm. The European dimension” supported by the Institute for Local Self-Government
Maribor, Slovenia.
https://doi.org/10.4335/2022.1
ISBN 978-961-7124-10-1 (PDF)
© 2022 Institute for Local Self-Government Maribor
Available online at http://www.lex-localis.press.
The Public Dimension of Cybersecurity
Editors:
Mirosław Karpiuk
Jarosław Kostrubiec
Maribor, 2022
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
The Public Dimension of Cybersecurity
MIROSŁAW KARPIUK & JAROSŁAW KOSTRUBIEC
1
Abstract The development of new communication technologies also
entails new threats in the form of various cyber crises caused primarily by
external factors that affect both public entities (including states and public
administration authorities) and private entities. These crises are also
political and military in nature, threatening state sovereignty. Therefore,
states must strive to ensure cybersecurity, which cannot be limited to the
administrative boundaries of individual states alone, as cyberthreats are
transnational in nature. Cybersecurity, understood as the resilience of
information systems against actions which compromise the confidentiality,
integrity, availability and authenticity of processed data, or the related
services provided by those information systems, must be a priority for
action in the public sphere to adequately secure the cyberspace against
attacks. It must also be a fundamental component in public policy
implemented at all levels of governance, be they central, regional or local.
Keywords: • cybersecurity • cyberspace • digital competence • information
protection
CORRESPONDENCE ADDRESS: Mirosław Karpiuk, PhD., Prof. Dr. Habil., Full Professor, University of Warmia
and Mazury in Olsztyn, Faculty of Law and Administration, Department of Administrative Law and Security
Sciences, ul. Obitza 1, 10-725 Olsztyn, Poland, ORCID: 0000-0001-7012-8999, e-mail:
[email protected]. Jarosław Kostrubiec, Ph.D., Dr. Habil. University Professor, Maria CurieSkłodowska University (Lublin), Faculty of Law and Administration, Plac Marii Curie-Skłodowskiej 5, 20-031
Lublin, Poland, ORCID: 0000-0003-1379-9846, e-mail:
[email protected].
https://doi.org/10.4335/2022.1
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Table of Content
Introduction
Mirosław Karpiuk & Jarosław Kostrubiec
5
Cybersecurity System in Poland. Selected Legal Issues
Jarosław Kostrubiec
7
The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
Dominik Tyrawa
19
Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
Krzysztof Kaczmarek
29
Activities for Cybersecurity as a Mission of Information Sharing
and Analysis Centres
Katarzyna Chałubińska-Jentkiewicz
39
Information Protection in Cyberspace a Factor in National
Security
Krzysztof Bojarski
47
Challenges for State Security in the Context of Big Data Analysis
Justyna Kurek
61
The Competence of the Internal Security Agency in Protecting the
Security of Communication and Information Systems and
Networks of Public Administration Authorities
Mirosław Karpiuk
69
Protection of Critical Infrastructure in Cyberspace
Monika Nowikowska
79
The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
Kazimierz Pawelec
93
Procedure for the Identification of an Operator of Essential
Services Under the Act on the National Cybersecurity System
Dorota Lebowa
101
Supervision and Inspection in the Field of Cybersecurity
Małgorzata Czuryk
111
Procedural Provisions in the Convention on Cybercrime
Filip Radoniewicz
121
Management in Cyberspace: From Firewall to Zero Trust
Wojciech Pizło
133
Cybersecurity and School-age Young People – Challenges and
Threats
Andrzej Pieczywok
147
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Introduction
Nowadays, cyberspace has become a sphere that significantly influences public, private,
social and professional life. Not only does it allow people from different parts of the world
to communicate quickly, but it also facilitates, and sometimes even enables, business
activities. In connection with its crucial role, it is important to ensure the security of all
entities using it. To safeguard the normal functioning of both the state and society,
cybersecurity must be adequately protected. Here, it must be recognised that
cybersecurity includes not only activities necessary to protect information systems from
cyberthreats, because the scope of such protection also covers the users of these systems,
as well as other entities.
The National Security Strategy of the Republic of Poland clearly indicates the need to
increase the level of resilience to cyberthreats and to enhance the level of information
protection in the public, military and private sectors, as well as the need to promote
knowledge and good practices enabling citizens to better protect their information
(including information concerning them).
Cyberattacks on public sector information systems may undermine the stability of the
state and its institutions, and therefore the state must not only constantly monitor
cyberthreats, but also have appropriate protection measures in place to respond to the
danger. The state must, among other things, secure the fulfilment of tasks for defence,
security and public order, and will therefore aim to protect networks and systems of
strategic importance.
The strategic objectives, as well as the relevant policy and regulatory measures that need
to be implemented to ensure the resilience to cyberthreats of information systems,
operators of essential services, critical infrastructure operators, digital service providers
as well as public administration are set out in the Cybersecurity Strategy of the Republic
of Poland. Its main objective (similarly to the National Security Strategy of the Republic
of Poland) is to increase the level of resilience to cyberthreats and the level of information
protection, including that in public space. Under the specific objectives, it identifies,
among others: developing a national cybersecurity system; raising the level of resilience
of public administration information systems and achieving the ability to effectively
prevent and respond to incidents; increasing the national potential in the field of
cybersecurity technologies; building public awareness and competence in the field of
cybersecurity; achieving a strong international position of the Republic of Poland in the
area of cybersecurity. Therefore, the objectives that the state should pursue in the field of
cyberspace security include, first and foremost, strengthening the ability to counter
cyberthreats (including those in the public sphere), which is linked to the creation of
strategic national networks and systems to limit cyberattacks.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Cybersecurity System in Poland. Selected Legal Issues
JAROSŁAW KOSTRUBIEC
1
Abstract The reliability of information systems currently determines the
effectiveness of the state in the sphere of providing many services. These
systems not only facilitate communication, but are also fundamental to
public, social or economic activity. Therefore, ensuring a high level of
security of information systems must be an important direction of the state
policy. It is the national cybersecurity system that is expected to ensure
cybersecurity in Poland, including the uninterrupted provision of essential
and digital services.
Keywords: • cybersecurity • information systems • essential services
CORRESPONDENCE ADDRESS: Jarosław Kostrubiec, Ph.D., Dr. Habil., University Professor, Maria CurieSklodowska University (Lublin), Faculty of Law and Administration, Plac Marii Curie-Skłodowskiej 5, 20-031
Lublin, Poland, e-mail:
[email protected], ORCID: 0000-0003-1379-9846.
https://doi.org/10.4335/2022.1.1
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
8
1
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
Introduction
In the justification of the government’s draft National Cybersecurity System Act
(Parliamentary Paper No. 2505, https://www.sejm.gov.pl/sejm8.nsf/druk.xsp?nr=2505)
(the Justification), the drafters clearly emphasise that due to the ever-increasing influence
of information and communication technologies on the socio-economic development of
the European Union Member States, as well as the increase in their use, the products and
services offered are now increasingly dependent on ensuring cybersecurity. The extensive
architecture of information and communication systems, including operations on large
data resources, contribute to the development of communications, trade and transport and
constitute the basis for the functioning of essential and digital services, as well as services
provided by public administration. These form the basis for today’s economy and for
modern civil society (Bożek, Karpiuk, Kostrubiec & Walczuk, 2012: 200-203). It should
be stressed, however, that the opportunities offered by modern digital technologies are
also used for the undertaking of undesirable activities – unfair competition practices,
interruptions of the continuity of selected services, committing crimes via the Internet, as
well as undertaking terrorist activities.
The basic regulations on the protection of cybersecurity in the European Union are
provided for in the NIS Directive (Directive (EU) 2016/1148 of the European Parliament
and of the Council of 6 July 2016 concerning measures for a high common level of
security of network and information systems across the Union (OJ EU of 2016 L 194, p.
1). As stated in Article 1 of the NIS Directive, it lays down measures with a view to
achieving a high common level of security of network and information systems within
the Union so as to improve the functioning of the internal market. To that end, the NIS
Directive: 1) lays down obligations for all Member States to adopt a national strategy on
the security of network and information systems; 2) creates a Cooperation Group in order
to support and facilitate strategic cooperation and the exchange of information among
Member States and to develop trust and confidence amongst them; 3) creates a computer
security incident response teams network (hereinafter referred to as “the CSIRTs
network”) in order to contribute to the development of trust and confidence between
Member States and to promote swift and effective operational cooperation; 4) establishes
security and notification requirements for operators of essential services and for digital
service providers; 5) lays down obligations for Member States to designate national
competent authorities, single points of contact and CSIRTs with tasks related to the
security of network and information systems.
Security of network and information systems, as defined in Article 4 (2) of the NIS
Directive, means the ability of network and information systems to resist, at a given level
of confidence, any action that compromises the availability, authenticity, integrity or
confidentiality of stored or transmitted or processed data, or the related services offered
by, or accessible via, those network and information systems. Cybersecurity is a
specialised field in security engaged, among other activity, in protecting information
systems against threats (Czuryk, 2019: 42).
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
9
The Polish lawmakers, meeting the requirements of the NIS Directive, regulated
cybersecurity issues in the Act of 5 July 2018 on the National Cybersecurity System (i.e.
Journal of Laws of 2020, item 1369, as amended.), hereinafter referred to as the NCSA.
In the NCSA, the legislator has regulated: 1) the organisation of the national cybersecurity
system and the tasks and responsibilities of the entities operating within this system; 2)
the exercise of supervision and control within the scope of the compliance with the
provisions of the NCSA; 3) the scope of the Cybersecurity Strategy of the Republic of
Poland.
2
Entities of the National Cybersecurity System
In the subjective aspect, the National Cybersecurity System (Article 4 NCSA) covers: 1)
operators of essential services; 2) providers of digital services; 3) CSIRT MON; 4) CSIRT
NASK; 5) CSIRT GOV; 6) selected sectoral cybersecurity teams; 7) selected publicfinance entities; 8) research institutes; 9) the National Bank of Poland; 10) Bank
Gospodarstwa Krajowego; 11) the Office for Technical Inspection; 12) the Polish Air
Navigation Services Agency; 13) the Polish Centre for Accreditation; 14) the National
Fund for Environmental Protection and Water Management, and regional funds for
environmental protection and water management; 15) commercial companies and
partnerships carrying out tasks of general interest, the aim of which is to satisfy the
collective needs of the population on an ongoing and uninterrupted basis by providing
generally accessible services 16) entities which provide cybersecurity services; 17)
authorities in charge of cybersecurity; 18) the Single Point of Contact for cybersecurity;
19) the Government’s Plenipotentiary for Cybersecurity; 20) the Cybersecurity Board.
The legislators chose entities that they believed played a vital role in the cybersecurity
system – and which are also important from the point of view of the strategic interests of
the country, including in the field of telecommunications (Karpiuk, 2021: 237).
The backbone of the National Cybersecurity System is made up by public entities, since
they set the policy direction in this area. Their status and tasks, however, differ, as does
their place in the public sphere. Their common goal is to ensure security in cyberspace,
construed as the space for processing and exchanging information created by
communication and information systems, along with interconnections and relations with
users. The legal status of public entities in the sphere of cybersecurity in Poland is
determined primarily by the NCSA. It defines the organisation of the national
cybersecurity system, the aim of which is to ensure cybersecurity in Poland. This also
concerns the uninterrupted provision of essential services and digital services, and is
accomplished by achieving an adequate level of security of the information systems used
to provide these services and by ensuring the handling of incidents perceived as events
that have or may have an adverse impact on cybersecurity. The legislator also defines the
tasks and responsibilities of the entities operating within this system, as well as the
exercise of supervision and control within the scope of the compliance with the provisions
of the said act.
10
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
Cybersecurity is one of the tasks of both government administration and local selfgovernment (Kostrubiec, 2021: 115-118), as well as of other entities entrusted with
competences in this area. The lawmakers define cybersecurity as the ability of
information systems to resist any action which compromises the confidentiality, integrity,
availability and authenticity of processed data, or the related services provided by those
information systems. Entities of the National Cybersecurity System have been obliged to
protect against cybersecurity threats, hence, against the potential causes of an incident
perceived as an event which has, or may have, an adverse impact on cybersecurity (K.
Chałubińska-Jentkiewicz, M. Karpiuk, J. Kostrubiec, 2021: 1).
The NIS Directive does not regulate exhaustively the catalogue of entities that are to cocreate national cybersecurity systems. It only defines the functions necessary for the
interoperability of national systems that, together, form a system at a European level.
Consequently, the national legislators had considerable leeway in this regard, within
which it extended the participation of public entities beyond the scope necessary for the
transposition of the Directive. At the same time, it should be emphasised that a simple
enumeration of these entities, as well as the assignment of various powers and duties to
them in subsequent chapters does not satisfy the need for a clear and functional structure
of the system (Szpor, 2019a: LEX/el.).
The legislator has imposed, as part of the National Cybersecurity System, a number of
obligations on public entities to ensure that information systems are resistant to actions
which compromise the confidentiality, integrity, accessibility and authenticity of
processed data, and the related services offered by such systems. These responsibilities
include obligations to report and handle an incident in a public entity, as well as the
obligation to appoint a person responsible for maintaining contact with the national
cybersecurity system entities. The above obligations have not been imposed on all public
entities, but have been explicitly indicated by the legislator. An important spectrum of
activities in this respect concerns incidents occurring in a public entity, i.e. incidents that
cause or may cause a decrease in the quality or interruption of the performance of a public
task carried out by a public entity. A special place within the responsibilities of public
entities is occupied by incident handling – construed as activities enabling the detection,
recording, analysis, classification, prioritisation, taking corrective actions and limiting the
effects of an incident (Karpiuk, 2020: 57).
3
Operators of essential services
Operators of essential services are an important element of the National Cybersecurity
System. According to Article 5 NCSA, an operator of an essential service is an entity,
referred to in Annex 1 to the NCSA, with an organisational unit on the territory of the
Republic of Poland, for which the competent authority for cybersecurity issued a decision
recognising the given entity as an operator of an essential service. The competent
authority for cybersecurity shall issue a decision recognising the entity as an operator of
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
11
an essential service, if: 1) the entity provides an essential service; 2) the provision of this
service depends on information systems; 3) an incident would have significant disruptive
effects on the provision of essential service by that operator. Where the entity provides
an essential service in other Member States of the European Union, the competent
authority for cybersecurity shall, in the course of administrative proceedings, through the
Single Point of Contact, consult with those states to determine whether that entity is
recognised as an operator of an essential service in those states. For the entity that no
longer meets the statutory requirements, the competent authority for cybersecurity shall
issue a decision declaring an expiration of the decision recognising it as an operator of an
essential service. Essential services cover the following sectors: 1) energy (electric
energy, heat, oil and gas); 2) transport (water, land and air transport); 3) banking and
financial markets infrastructure; 4) water treatment and sewage disposal; 5) health care;
6) digital infrastructure. This follows from the Appendix to the Regulation of the Council
of Ministers of 11 September 2018 on the list of essential services and the thresholds of
materiality of disruptive effect of an incident on the provision of essential services
(Journal of Laws 2018, item 1806 as amended).
The minister competent for computerisation shall maintain the list of operators of
essential services that specifies: 1) name (business name) of the operator of an essential
service; 2) sector, sub-sector and type of the entity; 3) registered office and address; 4)
tax identification number (NIP), if assigned; 5) number in the relevant register, if
assigned; 6) name of an essential service, consistent with the list of essential services; 7)
date of commencement of the provision of essential services; 8) information specifying
in which Member States of the European Union the entity has been recognised as an
operator of an essential service; 9) date of termination of the provision of essential
services; 10) date of removal from the list of operators of essential services – Article 7
(1-2) of the NCSA.
Pursuant to Article 7 (7-8) of the NCSA, data from the list of operators of essential
services are made available by the minister competent for computerisation, to CSIRT
MON, CSIRT NASK and CSIRT GOV and to the sectoral cybersecurity team within the
scope of the sector or subsector for which it was appointed, as well as to the operator of
an essential service within the scope concerning that operator. Upon request, the data
from the list of operators of essential services shall be made available by the minister
competent for computerisation, to the extent necessary for the performance of statutory
tasks of such operators, to the following entities: 1) competent authorities for
cybersecurity; 2) the Police; 3) the Military Police; 4) the Border Guard; 5) the Central
Anti-Corruption Bureau; 6) the Internal Security Agency and the Intelligence Agency; 7)
the Military Counterintelligence Service and the Military Intelligence Service; 8) courts;
9) the prosecutor's office; 10) the National Fiscal Administration authorities; 11) the
Director of the Government Centre for Security; 12) the State Protection Service.
An operator of an essential service, pursuant to Article 8 of the NCSA, shall implement
a security management system for the information system used for the provision of an
12
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
essential service, which shall ensure: 1) regular incident-risk assessment and risk
management; 2) the implementation of the appropriate technical and organisational
measures proportionate to the assessed risk, taking into account the latest state of the art,
including: a) the maintenance and safe operation of the information system, b) physical
and environmental security, including access control, c) the security and continuity of
services key to the provision of the essential service, d) the deployment, record-keeping
and maintenance of action plans that allow the continuous and uninterrupted provision of
the essential service, and ensure the confidentiality, integrity, availability and authenticity
of information, e) the implementation of a continuous monitoring system to supervise the
information system used to provide the essential service; 3) the collecting of information
on cybersecurity threats and the vulnerabilities of the information system used to provide
the essential service; 4) incident management; 5) the applying of measures to prevent and
minimise the impact of incidents on the security of the information system used to provide
the essential service, including: a) using mechanisms to ensure the confidentiality,
integrity, availability and authenticity of the data processed in the information system, b)
keeping the software up to date, c) security measures against unauthorised modification
in the information system, d) taking immediate action on identifying a vulnerability or a
cybersecurity threat; 6) using the means of communication which facilitate accurate and
safe communication within the national cybersecurity system.
Pursuant to Article 9 of the NCSA, an operator of an essential service shall: 1) designate
a person responsible for communicating with entities in the National Cybersecurity
System; 2) provide users of essential services with access to the knowledge that allows
them to understand cybersecurity threats and employ effective precautions against such
threats within the scope associated with the essential services provided, in particular, by
publishing relevant information on the operator’s website; 3) provide the competent
authority for cybersecurity with relevant data, no later than within 3 months of changing
the data. An operator of an essential service shall provide the competent authority for
cybersecurity (the relevant CSIRT MON, CSIRT NASK, CSIRT GOV and the sectoral
cybersecurity team) with data including name, phone number and e-mail address, within
14 days of the date of appointment of the person responsible for maintaining contact with
the entities of the National Cybersecurity System, as well as information on changing
these data – within 14 days of the date of the change.
As provided in Article 10 of the NCSA, an operator of an essential service shall develop,
apply and update the cybersecurity documentation of the information system used to
provide the essential service. Such operator is required to establish oversight of the
cybersecurity documentation of the information system employed to provide the essential
service, ensuring that: 1) the documents shall be made available only to authorised
persons, in accordance with the tasks performed by them; 2) the documents shall be
protected against misuse or loss of integrity; 3) subsequent versions of the documents
shall be indicated in a way making it possible to identify the changes made in such
documents. An operator of an essential service shall store the cybersecurity
documentation of the information system used to provide the essential service for a
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
13
minimum period of 2 years of the date of its withdrawal from use or termination of the
provision of the essential service. If such operator is, at the same time, the owner, ownerlike possessor or dependent possessor of facilities, installation, equipment or services
being parts of critical infrastructure and has an approved critical infrastructure protection
plan that includes cybersecurity documentation of the information system used to provide
the essential service, such operator shall not be obliged to develop cybersecurity
documentation of the information system used to provide the essential service.
Critical infrastructure shall be construed as systems and their functionally related
facilities, including civil structures, equipment, installations, services essential to the
security of the state and its citizens required to ensure the smooth functioning of public
administration bodies, as well as institutions and entrepreneurs. Critical infrastructure
covers: 1) the supply of energy, energy-producing raw materials and fuels; 2)
communications systems; 3) ICT networks; 4) financial systems; 5) food supply; 6) water
supply; 7) health care systems; 8) transport systems; 9) rescue systems; 10) systems
ensuring the continuity of public administration; 11) manufacturing, warehousing,
storage and use of chemical and radioactive substances, including pipelines of dangerous
substances. This follows from Article 3(2) of the Act of 26 April 2007 on Crisis
Management (Journal of Laws of 2019, item 1398 as amended).
Cybersecurity documentation of the information system applied to provide an essential
service consists of: 1) normative documentation and 2) operational documentation.
Normative documentation is made up by: 1) documentation relating to the information
security management system produced in accordance with the requirements set out in the
standard PN-EN ISO/IEC 27001; 2) documentation relating to infrastructure protection,
with the use of which the essential service is provided, concerning: (a) characteristics of
the essential service and infrastructure, (b) assessment of the risk for infrastructure
facilities, (c) assessment of the existing infrastructure protection (risk treatment plan), (d)
description of technical protections of infrastructure facilities, (e) principles of
organisation and execution of physical protection of infrastructure, (f) data on specialised
armed security services that protect the infrastructure, if any (specialised armed security
services are internal security services and entrepreneurs who have obtained concessions
for conducting economic activity in the scope of services consisting in protecting persons
and property, possessing weapon on the basis of weapon certificate, Article 2 (7) of the
Act of 22 August 1997 on the Protection of Persons and Property, Journal of Laws of
2017, item 2213 as amended); 3) documentation of the essential service continuity
management system produced in accordance with the requirements set out in the standard
PN-EN ISO 22301; 4) technical documentation of the information system used to provide
the essential service; 5) documentation resulting from the specificity of the essential
service provided in a given sector or sub-sector. Normative documentation is made up
by: 1) documentation relating to procedures and instructions resulting from normative
documentation; 2) descriptions of the ways to document the performance of activities
under the established procedures; 3) documentation certifying each time a procedure is
performed (§ 1-3 of the Regulation of the Council of Ministers of 16 October 2018 on
14
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
Types of Cybersecurity Documentation of the Information System used to provide an
essential service (Journal of Laws of 2018, item 2080).
Pursuant to Article 11 of the NCSA, an operator of an essential service shall: 1) ensure
incident handling; 2) provide access to information on recorded incidents to the relevant
CSIRT MON, CSIRT NASK, or CSIRT GOV, insofar as necessary for the performance
of its tasks; 3) classify a given incident as serious based on the thresholds for recognising
a given incident as serious; 4) promptly report any serious incident, not later than within
24 hours from its detection, to the relevant CSIRT MON, CSIRT NASK or CSIRT GOV;
5) cooperate with the relevant CSIRT MON, CSIRT NASK or CSIRT GOV during the
handling of a serious incident and critical incident, by providing the required data,
including personal data; 6) remove vulnerabilities and notify the competent authority for
cybersecurity of their elimination. A serious incident shall be reported electronically or,
if impossible, with the use of other available means of communication. Where a sectoral
cybersecurity team is appointed, an operator of an essential service shall: 1) concurrently
transmit the report electronically to the team; 2) cooperate with the team at the sector or
sub-sector level during the handling of a serious incident or critical incident, by providing
the necessary data, including personal data; 3) provide the team with access to
information on recorded incidents, insofar as necessary for the performance of its tasks.
The thresholds for considering an incident as serious according to incident type, in
particular, sectors and sub-sectors, are defined by the legislator in the Regulation of the
Council of Ministers of 31 October 2018 on Serious Incidents Thresholds (Journal of
Laws of 2018, item 2180).
Pursuant to Article 13 of the NCSA, an operator of an essential service may provide the
relevant CSIRT MON, CSIRT NASK or CSIRT GOV with information concerning: 1)
other incidents; 2) cybersecurity threats; 3) risk estimation; 4) vulnerabilities; 5) the
technologies used. The said information shall be transmitted electronically and if
impossible - with the use of other available means of communication. Where a sectoral
cybersecurity team is appointed, an operator of an essential service may simultaneously
transmit any such information to the team, in electronic form. An operator of an essential
service shall also classify the information that constitutes legally protected secrets,
including information constituting trade secrets.
A trade secret shall be construed as the technical, technological and organisational
information of a company or other information of economic value, which as a whole or
in a specific configuration and collection of its elements is not generally known to persons
regularly dealing with that type of information, or is not easily accessible to such persons,
provided that the person authorised to use or dispose of such information has undertaken,
with due diligence, actions to maintain its confidentiality – Article 11(2) of the Act of 16
April 1993 on Combating Unfair Competition (i.e. Journal of Laws of 2020, item 1913,
as amended).
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
15
Legally protected secrets also include classified information. Classified information is
information the unauthorised disclosure of which would or could cause damage to the
Republic of Poland or would be detrimental from the point of view of its interests, also
in the course of its preparation and regardless of the form and manner of its expression,
which follows from Article 1 of the Act of 5 August 2010 on the Protection of Classified
Information (consolidated text: Journal of Laws of 2019, item 742 as amended.),
hereinafter referred to as the APCI. According to the judgement of the Supreme
Administrative Court dated 8 March 2017, I OSK 1777/15 (LEX no. 2338895), in order
to recognise a piece of information as classified, it is enough that a substantial component
is involved, therefore, the existence of such quality by which it will constitute
information, the unauthorised disclosure of which, would or could cause damage to the
Republic of Poland or would be detrimental in the context of its interests, also in the
course of its preparation and regardless of the form and manner of its expression. The
substantial component – which stems from the position expressed by the Regional
Administrative Court in the judgement of 8 January 2020, II SA/Wa 1385/19 (LEX no.
3078853) – makes it possible to recognise a given piece of information as classified.
Classified information shall therefore be protected regardless of whether the authorised
person found it appropriate to give it an adequate level of confidentiality. It shall be
classified because of the threats resulting from its content or from the manner in which it
was obtained, and not as a result of its classification and level of confidentiality.
Pursuant to Article 4 of the APCI, classified information can be made available only to a
person who provides a guarantee of confidentiality and only to the extent necessary for
that person to perform work or duty on the position held, or to perform the commissioned
activities. The legislators restrict access to classified information as regards the subject to
persons who provide a guarantee of confidentiality, thus those who meet the requirements
imposed by the Act for the purpose of protection of classified information against
unauthorised disclosure, confirmed as a result of the conducted verification procedure,
and also as regards the object – to classified information required for such persons to
perform their work or service on the position held, or to perform the commissioned
activities. Pursuant to Article 4 of the APCI, a person who, as a result of the verification
procedure conducted towards it, has obtained a security clearance authorising access to
classified information with a specific level of confidentiality, is not authorised to access
all classified information with such a level (or a lower one), but only the information
necessary for the performance of official tasks (Stankowska, 2014: LEX/el.).
4
Conclusion
The objective of the National Cybersecurity System, as defined in Article 3 of the NCSA,
is to ensure cybersecurity at the national level, including the uninterrupted provision of
essential services and digital services by achieving the appropriate level of security of the
information systems used to provide these services, and by ensuring the successful
handling of incidents. This provision sets the general objective of the National
Cybersecurity System as ensuring cybersecurity at the national level. It also points to
16
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
examples of specific objectives: (1) uninterrupted provision of essential services; (2)
uninterrupted provision of digital services (Szpor, 2019b: LEX/el.).
Pursuant to Article 2(4) of the NCSA, cybersecurity is the ability of information systems
to resist any action that compromises the confidentiality, integrity, availability and
authenticity of the data processed or of the related services offered by those systems.
Cybersecurity is a term pertaining to providing protection and preventing the threats that
affect cyberspace itself, as well as functioning in cyberspace, which applies to both the
public and private sectors and their interactions (K. Chałubińska-Jentkiewicz, 2019: 21).
Cyberspace is not only becoming a place where people work, gain knowledge,
communicate with each other and seek entertainment, but it has also become a place
where people are exposed to various threats (Pieczywok, 2019: 227). State security in
cyberspace must be a primary determinant of the activities of relevant services
responsible for the protection of strategic information systems.
Cybersecurity as an element of the state security in the era of the information society and
widespread computerisation of public entities should be treated as a strategic element
taken into account when building the National Security System, as the scale of cyber
threats and their effects may significantly affect the normal functioning of the state.
References:
Bożek, M., Karpiuk, M., Kostrubiec, J. & Walczuk, K. (2012) Zasady ustroju politycznego państwa
(Poznań: Polskie Wydawnictwo Prawnicze IURIS).
Chałubińska-Jentkiewicz, K. (2019) Cyberodpowiedzialność (Toruń: Wydawnictwo Adam
Marszałek).
Chałubińska-Jentkiewicz, K., Karpiuk, M. & Kostrubiec, J. (2021) The Legal Status of Public
Entities in the Field of Cybersecurity in Poland (Maribor: Institute for Local Self-Government),
https://doi.org/10.4335/2021.5.
Czuryk, M. (2019) Supporting the development of telecommunications services and networks
through local and regional government bodies, and cybersecurity, Cybersecurity and Law, 2, pp.
39-50.
Karpiuk, M. (2020) The obligations of public entities within the national cybersecurity system,
Cybersecurity and Law, 2, pp. 57-72.
Karpiuk, M. (2021b) The Organisation of the National System of Cybersecurity: Selected Issues,
Studia Iuridica Lublinensia, 30(2), pp. 233-244, http://dx.doi.org/10.17951/sil.2021.30.2.233244.
Kostrubiec, J. (2021) The Role of Public Order Regulations as Acts of Local Law in the
Performance of Tasks in the Field of Public Security by Local Self-government in Poland, Lex
Localis
–
Journal
of
Local
Self-government,
19(1),
pp.
111-129,
https://doi.org/10.4335/19.1.111-129(2021).
Pieczywok, A. (2019) Cyber threats and challenges targeting man versus his education,
Cybersecurity and Law, 1, pp. 225-236.
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kostrubiec: Cybersecurity System in Poland. Selected Legal Issues
17
Szpor, G. (2019a) Komentarz do art. 4, In: Czaplicki, K., Gryszczyńska, A. & Szpor G. (eds.)
Ustawa o krajowym systemie cyberbezpieczeństwa. Komentarz (Warszawa: Wolters Kluwer),
LEX/el, available at: https://sip.lex.pl/#/commentary/587786646/584086 (May 21, 2022).
Szpor, G. (2019b) Komentarz do art. 3, In: Czaplicki, K., Gryszczyńska, A. & Szpor G. (eds.)
Ustawa o krajowym systemie cyberbezpieczeństwa. Komentarz (Warszawa: Wolters Kluwer),
LEX/el, available at: https://sip.lex.pl/#/commentary/587786645/584085 (May 21, 2022).
Stankowska, I. (2014) Ustawa o ochronie informacji niejawnych. Komentarz (Warszawa: Lexis
Nexis).
18
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
The Axiological and Legal Aspects of the Multi-faceted
Nature of Cybersecurity
DOMINIK TYRAWA
1
Abstract Cybersecurity is one of the types of security that is distinguished
in the field of legal sciences with respect to the legal aspects of security.
This type of security is very extensive and specialised in nature. Apart from
the specialised and precise legal language employed, by using approaches
derived from the field of communication and information sciences, the
sphere of values that underlie this type of security can also be distinguished.
The variety of goods that are protected under cybersecurity leads to the
multi-faceted nature of the applicable solutions in this regard. This multifaceted character refers both to the material scope, namely, the goods that
are protected in this way with the application of optimised tools, and to the
subjective scope, namely, the entities protected by the system and by which
entities it is protected. All these analyses clearly indicate that this involves
a very complex phenomenon which is highly relevant to our daily lives.
Keywords: • axiology • security • cybersecurity • systemic • material and
procedural aspects of cybersecurity • man vs state
CORRESPONDENCE ADDRESS: Dominik Tyrawa, Ph.D., Dr. Habil., University Professor, John Paul II Catholic
University of Lublin, Faculty of Law, Canon Law and Administration, Department of Administrative Law, al.
Racławickie 14, 20-950 Lublin, Poland, e-mail:
[email protected], ORCID: 0000-0001-6385-9726.
https://doi.org/10.4335/2022.1.2
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
20
1
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
Introduction
Security is one of the most important human needs. The literature on the subject, both in
legal sciences, and in other disciplines (psychology, economics, management, sociology,
security sciences), when describing the need for security, usually refers to A. Maslow’s
hierarchy of needs. This is based on the fulfilment of physiological needs, examples of
which include the need for food, housing, clothing and procreation. The nature of these
needs ensures that they have the strongest impact on man, and man first strives to satisfy
them. It is only after fulfilling the primary needs that the will to satisfy other needs appears
in man. Maslow, in creating a hierarchy of these, identified first the need for safety, then
the need for belonging and love, the need for esteem and finally the need for selfactualisation. The need for safety is expressed in the search for safety and constancy, and
then comes down to the pursuit of dependence, the search for protectiveness, the
avoidance of unclear situations, the avoidance of chaos, the pursuit of law and order and
the rule of law (Maslow, 2009: 65-71).
It should be noted that nowadays, even before the outbreak of the global COVID-19
pandemic, the need for security was often overlooked or taken for granted. In developed
societies, human life was rather stable and physiological needs were more or less, met.
For many people, social emphasis was on the “self'” and psychological needs, and
security itself was marginalised Only a threatening situation concerning law, order or
authority could trigger a return to the need for security and treating it not as something
obvious, but as something desirable (Tyrawa, 2018: 37).
The outbreak of the COVID-19 pandemic prompted a return to the source, and increased
research into the multifaceted nature of the need for security, including that in the legal
sciences, met with greater scientific interest. Somewhere in the background of this
research, on its margins, there are activities and research in the field of cybersecurity.
This concept naturally interacts with research related to the pandemic (for example,
through the increased importance of communication and information systems and
networks, in the context of e-learning, home-office, general security of business
transactions, work provision, fulfilment of various types of obligations (mainly civil law
obligations), when supply chains are interrupted or hindered), although it should be
emphasised that research in this field was successfully conducted even before the
outbreak of the pandemic.
The purpose of this paper is to indicate what cybersecurity is, how it should be embedded
in the legal security system, what key values underlie the concept and how, through
strictly defined institutions, the concept should be protected and guaranteed.
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
2
21
The concept of cybersecurity and its place in the legal security system
In the search for a definition of cybersecurity, the normative solutions of a given country
(in this case the Republic of Poland) should be analysed first, followed by the views of
legal commentators and possibly case law. It should be noted, however, that defining
cybersecurity is not the main task of this paper and therefore the definitions referred to
will be of a general nature and certainly not exhaustive.
The basic act on cybersecurity, in force since July 2018, is the National Cybersecurity
System Act of 5 July 2018 (consolidated text, Polish Journal of Laws of 2020, item 1369,
as amended). This normative act primarily organises issues related to cybersecurity at the
national level. First of all, the Act introduces an extensive set of specialised concepts and
specifies more precisely the system of entities covered by this systemic protection.
Furthermore, the legislator points out the problem of identification and registration of
operators of essential services, the duties of operators of essential services, digital service
providers and public entities, and specifies the tasks of specialist entities more precisely,
i.e. CSIRT MON (Computer Security Incident Response Team operating on a national
level, managed by the Minister of National Defence), CSIRT NASK (Computer Security
Incident Response Team operating on a national level, managed by the Research and
Academic Computer Network – National Research Institute) and CSIRT GOV (Computer
Security Incident Response Team operating on a national level, managed by the Head of
the Internal Security Agency). In addition, it clarifies the principles of sharing information
and processing personal data, and introduces and systematises the system of competent
authorities for cybersecurity, the tasks of the minister in charge of computerisation, the
tasks of the Minister of National Defence, as well as the issues of supervision and control
of operators of essential services, digital service providers and entities providing
cybersecurity services. The last relevant regulations of the aforementioned Act refer to
the establishment of competent authorities for cybersecurity, i.e. the Plenipotentiary,
whose task is to coordinate activities and implement the government’s policy on
cybersecurity; and the Committee, i.e. the opinion and advisory body in the field of
cybersecurity, acting at the Council of Ministers. Beyond the aforementioned, it lays out
the Strategy, i.e. the document that defines strategic objectives and relevant policy and
regulatory measures aimed at achieving and maintaining a high level of cybersecurity.
The final section of the Act relates to the provisions on fines.
The very description of the material scope above indicates that the stated Act is
fundamental in the field of cybersecurity. At the same time, it should be noted that the
regulation of such a broad material and subjective spectrum raises the question of whether
this is a regulation that provides an exhaustive coverage of the issues contained in the title
or a regulation that attempts to order these issues. Answering this question goes beyond
the scope of this paper, although according to the Author, a statement about ordering these
issues would be more appropriate.
22
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
In the context of this paper, the most important element is to specify more precisely what
cybersecurity is. In the aforementioned Act, in Article 2(4), cybersecurity is defined as
the resilience of information systems against actions which compromise the
confidentiality, integrity, availability and authenticity of processed data, or the related
services provided by those information systems. This case involves a de facto normative
mental construct denoting the security of IT systems and networks (Banasiński, 2020:
16).
Legal commentaries approach this concept in a slightly different way. The basic policy
paper of the Republic of Poland in this regard defines this concept as “a process of
ensuring the secure functioning in cyberspace of the state as a whole, its structures, natural
persons and legal persons, including entrepreneurs and other entities without legal
personality, as well as the communication and information systems and information
resources at their disposal in global cyberspace” (National Security Bureau, 2015: 7-8).
At the same time, the paper identifies the main objective in terms of cybersecurity as
ensuring the secure functioning of the Republic of Poland in cyberspace, including an
adequate level of security of national communication and information systems, especially
the ICT critical infrastructure of the state, as well as private economic entities that are key
to the functioning of society, in particular, those that are part of the financial, energy and
health care sectors (National Security Bureau, 2015: 9).
It seems that a proper definition of cybersecurity should be linked to the concept of
security in the first place. When defining the concept of “security”, it should be pointed
out that it refers to a number of semantic levels (Potrzeszcz, 2013: 25), and is also related
to the fact that this case involves a common phenomenon in the everyday lives of
individuals and societies, so the concept will be defined more precisely by intuition and
will be difficult to define unambiguously (Potrzeszcz, 2014: 15). In addition, it should be
noted that security is defined in various ways within the methodology of various sciences,
making the concept of security all the more ambiguous. Due to the limited nature of this
paper, it may be assumed that security is a state of peace, a state that gives a feeling of
certainty, and a state that guarantees its maintenance. Security is the opposite of chaos or
uncertainty.
Cybersecurity, then, is a state of constancy, security and peace in cyberspace. Cyberspace
should be understood as a communication space that is created by online connection
systems and allows people to communicate online and establish relationships in real time.
Cyberspace is also an environment in which information is exchanged through networks
and computer systems. This is a dimension of activities in which all actions diverge from
the physical environment. This is a new dimension (in addition to the terrestrial, aquatic,
air, and space environments) in which various actions, including military actions, can be
carried out. This environment differs from those mentioned above primarily in that: 1) it
is man-made; 2) its participants have full control over the nature of this environment; 3)
it has no territorial limitations. In addition, cyberspace has four typical features: 1)
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
23
anonymity; 2) aterritoriality; 3) regularity; 4) global reach (Marczyk, 2018: 59-60). The
concept of cybersecurity, which benefits most from the conceptual framework of the law
of new technologies, situated within administrative law, consists of institutions of
constitutional, substantive and procedural law.
In situating cybersecurity within the national security system, it should first be pointed
out that cybersecurity is a specialised branch of security that includes the protection of
information systems from threats (Czuryk, 2019: 42). It seems that the assumption that
cybersecurity is one of the types of security is most correct. The most commonly
identified types of security include: international security, state security, public security,
legal security, environmental security, energy security, economic (and social) security,
political (and military) security, personal security, aviation security, local security,
cultural security, ICT security and health security (Tyrawa, 2018: 80-109). However, it
should be stressed that these concepts are intertwined. It is impossible to set precise and
fixed boundaries in this respect. In addition, the terminology is imprecise (various ways
of defining a given type of security, in this case, ICT security and technological security
are conceptually similar), which makes it even more difficult to analyse individual types
of security.
The above reasons clearly indicate that in relation to cybersecurity, it is one of the types
of security that is intertwined to varying degrees with other types of security, to the
greatest extent with international security, state security, public security, energy security
and aviation security. In this case, we are faced with a very specialised concept that
primarily refers to an artificial man-made system based on ICT solutions.
3
The multi-faceted nature of cybersecurity
When describing the material scope (the tasks to be fulfilled by a given type of security)
and the subjective scope (both the entities in relation to which a given type of security
applies and the entities that carry out activities in this respect) of cybersecurity, it should
first be noted how multi-faceted this phenomenon is. The material scope and subjective
scope are intertwined. The material scope will be presented in detail in the next part of
this paper, as will be with regard to the subjective scope. The considerations in this
respect, however, must be preceded by general remarks.
When answering the question of what cybersecurity is and what the multi-faceted nature
in this regard is, the analysis should begin with the material scope. The gradation of the
goods that this type of cybersecurity protects can essentially be reduced to the protection
of human life and health. This is expanded into individual protected goods. Their
differentiation is basically an analysis of individual phenomena, where communication
and information systems and networks are used. Due to the limited and introductory
nature of the paper, an attempt to specify all the specific goods protected in this way is
24
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
doomed to fail. Nevertheless, it can be stated that at the end of every cybersecurity activity
there is a human being.
A specific example is the situation involving the ICT protection of a given information
system, i.e. a communication and information system, referred to in Article 3(3) of the
Act of 17 February 2005 on the Computerisation of the Operations of Entities Performing
Public Tasks (consolidated text, Polish Journal of Laws of 2020, item 346, as amended).
First of all, an extensive security system is put in place to protect a specific system (and
thus the information contained in it, partly related to a specific human being). Further
protection concerns the possibility of using the system, at the level of performing tasks
by public administration, as well as in relation to an individual being whose sensitive data
is included in the system. In addition, it should be pointed out that detailed data, first of
all personal data, is protected. To sum up, this case involves multilevel protection of
various goods, and in particular, protection of the organisational structure itself, which
operates on the basis of these systems, and ultimately this protection concerns an
individual who, being part of a given organisational structure, performs tasks on the basis
of this system, as well as an individual whose sensitive data is included in this system.
In terms of the subjective scope, the multi-faceted nature of cybersecurity should be
understood as an extensive system of subjective protection in this respect. It seems that it
can be assumed that, first of all, cybersecurity protects communication and information
systems and the individual who uses them, as well as the individual’s data collected in
the course of operating these communication and information systems. Another definition
of a communication and information system can be mentioned here, according to which
it is a set of cooperating IT devices and software that enables processing and storage, as
well as sending and receiving of data via telecommunications networks by using terminal
equipment that is appropriate for a particular type of network, and this definition is based
on Article 2(3) of the Act of 18 July 2002 on Providing Services by Electronic Means
(consolidated text, Polish Journal of Laws of 2020, item 344, as amended). Terminal
equipment, in accordance with Article 2(43) of the Act of 16 July 2004 –
Telecommunications Law (consolidated text, Polish Journal of Laws of 2021, item 576,
as amended), should be understood as telecommunications equipment intended to be
connected directly or indirectly to network terminations.
Subjective protection in this respect can be described as individual (private), mixed
(private-public) and collective (public, state or supranational) protection. Individual
protection is organised by such an entity, i.e. a person, e.g. by purchasing and installing
antivirus software on the computer they use, or by another private entity, e.g. a company,
organising its own internal communication and information system and securing it in an
appropriate manner. Mixed protection is protection involving the cooperation of private
entities (e.g. ICT companies, both local and global) with entities operating within the state
structure (e.g. local government units or public administration authorities). Private
entities as part of this cooperation provide specific know-how, and state entities are most
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
25
often the entities that order a widely understood service. Cooperation in this respect may
take place within a small organisational unit and a telecommunications or IT company,
but also at the state level (cooperation between the state and a global ICT company) or
even supranational, where the customer is an international organisation, such as the
European Union. The last type of protection is collective protection, which is guaranteed
in its entirety by a local government unit, public administration or an international
organisation. Determining the precise boundaries between these types of protection is in
some cases difficult, as within this issue, various factual phenomena intermingle that are
difficult to fit into a specific security model.
4
Values protected by cybersecurity
As already stated above, the fundamental and main good to be protected by cybersecurity
is man, and, more specifically, their life and health. The presented case involves goods
that can be placed highest in the hierarchy of values important for man. Without
protection of human life or health, other goods recede to the background, and their
protection becomes pointless.
In terms of subject matter, cybersecurity consists primarily of instruments, specialised
computer programs and systems that collect relevant data. Their presentation and precise
specification at this point goes beyond the scope of the paper. However, a general
framework for this issue can be outlined. When indicating the instruments that are
employed, they can generally be defined as the use of the Internet and other networks
(Intranet, Extranet), as well as computers, phones, smartphones, tablets, servers, terminals
or smart TV. These instruments are applied in order to better satisfy human needs,
improve the quality of life, maximise profit (both on the part of public administration and
on the part of citizens) and, above all, guarantee an increase in the efficiency and
effectiveness of administration. These instruments are employed in the development of,
for example, e-business, e-administration, e-health, e-culture or e-tourism.
Public administration, acting in the field of cybersecurity, uses systems involving the
application of satellite telecommunications, including, for example, location,
environmental monitoring and security, in the field of road, sea, air transport, in relation
to the transport of dangerous goods, livestock, in the field of civil defence, crisis
management, humanitarian aid, in relation to agriculture, land measurement, land
surveying and land register. Other areas where communication and information systems
are implemented include the extraction and distribution of fossil fuels (oil and gas), search
and rescue, as well as such areas as logistics, environment, science or law enforcement.
The state is involved in the development of information society (and thus also in the
development of cybersecurity), through the development of information technologies,
within administration itself, in the area of its contacts with citizens, as well as in the state’s
investment in telecommunications infrastructure. Actions in this regard are aimed at
26
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
solving related problems. In this respect, first of all, the following aspects should be
mentioned: eliminating digital exclusion, protecting consumers in electronic commerce,
combating computer crime, developing electronic payment systems, respecting individual
privacy and protecting intellectual property rights.
The scope concerned also includes extremely important communication and information
systems that are used by public administration or individuals on a daily basis, i.e. KRS
(National Court Register), KRK (National Criminal Register), NKW (New Land and
Mortgage Register), PESEL (Universal Electronic System for Registration of the
Population), POLTAX (a distributed system for recording and processing data on
taxpayers used by tax offices), CEPiK (Central Register of Vehicles and Drivers) or
REGON (Register of National Economy – National Official Register of Business
Entities).
It is correct to say that the main task of administrative law is to serve man (Zimmermann,
2013: 77). This extremely general statement can also be related to the tasks that form the
axiological basis of security. Referring to cybersecurity, it can be stated that the systems
used by public administration protect, in the first place, data relating to the status of an
individual in terms of their health status, property status (information on real property
held, its location, vehicles, their mileage), data on marital status and family members,
data on the address of residence (permanent address or actual residence), data on financial
and economic status, data on social benefits received or data on documents used by the
individual (passport, identity card, driving licence, vehicle registration certificate).
Cybersecurity thus protects the part of an individual’s life that can be described as
“privacy”.
5
Entities protecting cybersecurity – general considerations
An element complementing the considerations in the field of cybersecurity is the
indication (emphasis on) of the entities that act for cybersecurity. As already stated, three
types of protection can be distinguished in this regard, i.e. individual, mixed and
collective protection.
Individual protection relates both to natural persons and legal persons, but also to entities
without legal personality. As a rule, state action in this respect is very limited. It is the
individual course of action that can be described as private (also in terms of the financial
resources involved) that is key in this regard. The role of the state in this aspect should be
limited to two problem areas, educational – where the state highlights and educates about
cyberthreats, and training – where the state trains individuals, who then educate the public
about such threats.
The second type of protection is mixed private-public protection. Its importance in the
globalised world is constantly growing. This is a matter of the space that needs to be
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
27
described in detail in order to diagnose the threats and opportunities associated with its
development. It is in this space that we can look for entities that will be described as
hybrids of public-private transnational bodies. It seems that within this area of
cooperation, it is possible to identify in more detail such entities as: formal
intergovernmental regulatory bodies, informal intergovernmental regulatory networks for
cooperation and coordination of arrangements, national regulatory bodies operating with
reference to international intergovernmental regimes, hybrid public-private regulatory
bodies, and some private regulatory bodies exercising transnational governance functions
of particular public significance. The fact of distinguishing these entities is based on the
contemporary needs of the international community, because transgovernmental
administration is also in place, due to global interdependence (Kingsbury, Krisch,
Stewart, 2005: 16).
The third type of subjective protection is collective protection. Protection in this respect
is guaranteed by an entity being part of a national, supranational or international structure.
In the case of supranational or international structures, such entities as the EU, NATO or
the UN can be mentioned, for example. State protection is much more extensive. Entities
that can be classified in this group include local government units and entities dependent
on them (e.g. budget enterprises, municipal companies, but also schools or kindergartens,
cultural institutions or others), central or local public administration, courts, prosecutor’s
offices, court enforcement officers supervised by courts with territorial jurisdiction. The
secret services play very important roles in this respect. The gradation of public
administration activities in the field of cybersecurity can be linked to the gradation, not
only of the entities established for this purpose, but, above all, to the development
(gradation) of the manner of operation of a particular entity. In this regard, traditional
government (which includes the administration itself), which is based on paper
documents, and higher organisational forms can be identified. The latter include egovernment (including e-administration), based on static ICT tools and Internet 1.0,
Government 2.0, based on Internet 2.0 and social media, and M-government (mobile
government), which is built on mobile information technologies (Khan, 2015: 135-149).
A large number of entities performing cybersecurity tasks are specified in Article 4 of the
Act on the National Cybersecurity System. Such agencies are components of a system
identical to the specification that was made in the text in terms of classification as actors
involved in state protection. As already brought forward, subjective protection is
multifaceted in nature. The values protected by these entities are part of the system of
values that underlie cybersecurity as a type of security.
6
Conclusion
As stated in the text, the phenomenon of the multi-faceted nature of cybersecurity can be
readily identified. This nature is both material and subjective. The values that
cybersecurity should protect are crucial in this case. The most important good protected
28
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Tyrawa: The Axiological and Legal Aspects of the Multi-faceted Nature of
Cybersecurity
in this way is the protection of individual privacy, but also the protection of health and
life. Both private and public entities should tailor protective measures to the good to be
protected and the threats that may affect it. Building a proper system in this respect, based
on the tools available, is a challenge in times of growing threats to electronic security,
especially in terms of the extensive digitalisation of social life.
References:
Banasiński, C. (2020) Prawne i pozaprawne źródła wymagań dla systemów cyberbezpieczeństwa,
In: Banasiński, C. & Rojszczak, M. (eds.) Cyberbezpieczeństwo (Warszawa: LEX a Wolters
Kluwer business), pp. 15-38.
Biuro Bezpieczeństwa Narodowego (2015) Doktryna cyberbezpieczeństwa Rzeczypospolitej
Polskiej (Warszawa: Centrum Poligrafii Sp. z o.o.).
Czuryk, M. (2019) Supporting the development of telecommunications services and networks
through local and regional government bodies, and cybersecurity, Cybersecurity and Law, 2, pp.
39-50.
Khan, G.F (2015) The Government 2.0 utilization model and implementation scenarios,
Information Development, 2, pp. 135-149.
Kingsbury, B., Krisch, N. & Stewart, R.B. (2005) The Emergence of Global Administrative Law,
Law and Contemporary Problems, 68, pp. 15-61.
Marczyk, M. (2018) Cyberprzestrzeń jako nowy wymiar aktywności człowieka – analiza pojęciowa
obszaru, Przegląd Teleinformatyczny, 1-2, pp. 59-72.
Maslow, A. (2009) Motywacja i osobowość (Warszawa: Wydawnictwo naukowe PWN).
Potrzeszcz, J. (2013) Bezpieczeństwo prawne z perspektywy filozofii prawa (Lublin: Wydawnictwo
KUL).
Potrzeszcz, J. (2014) Bezpieczeństwo i porządek publiczny w ujęciu filozofii prawa, In: Lis, W. (ed.)
Bezpieczeństwo państwa. Zagadnienia podstawowe (Lublin: Wydawnictwo KUL), pp. 15-34.
Tyrawa, D. (2018) Gwarancje bezpieczeństwa osobistego w polskim administracyjnym prawie
drogowym (Lublin: Wydawnictwo KUL).
Zimmermann, J. (2013) Aksjomaty prawa administracyjnego (Warszawa: LEX a Wolters Kluwer
business).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
KRZYSZTOF KACZMAREK
1
Abstract False, fast-spreading information can mould public sentiment,
influence the outcomes of democratic elections, cause tensions in the
international arena, and even spark armed conflicts. The degree to which a
state is vulnerable to such threats depends largely on the digital competence
of that state’s general public. Digital competency includes information
competencies, which involve the ability to obtain, evaluate and apply
information. Deficits in the public’s information competencies make the
state more vulnerable to be targeted by disinformation – an element of
hybrid warfare. This is especially important because there are no technical
measures which could be used to counter disinformation online. It seems
that the only way to make the state more resilient against cybersecurity
threats is by improving the digital competencies, including, in particular,
information competencies, of the general public. This, however, requires
strong educational outcomes across all educational stages.
Keywords: • digital competencies • information competencies •
manipulation • disinformation • cybersecurity • hybrid warfare
CORRESPONDENCE ADDRESS: Krzysztof Kaczmarek, Ph.D., Koszalin University of Technology, Faculty of
Humanities, Department of Regional and European Studies, Śniadeckich 2, 75-900 Koszalin, Poland, e-mail:
[email protected], ORCID: 0000-0001-8519-1667.
https://doi.org/10.4335/2022.1.3
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
30
1
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s Vulnerability
to Cyberspace Threats
Introduction
Information manipulation is not a new phenomenon. From time immemorial, people have
tried to influence and mislead others to achieve their specific ends. The influence patterns
used in the past – tied so strongly to human nature and taking advantage of the perceptual
weaknesses of humans – continue to be deployed successfully to influence societies and
international relations, among others. Initiated by individuals, pressure groups, and
entities, deception and misleading are popular means by which to elicit a desirable
reaction from the general public. The emergence of new technologies facilitating
information flow has greatly expanded the possibilities of influencing members of the
public – for instance, through provocations, spreading false information and falsifying
data. An enormous leap has been made away from traditional media – press, radio, and
television – and towards the Internet, making it possible to send any information, true or
false, into the world in a matter of seconds. Cyberspace has become the primary channel
for information flow, allowing almost anonymous interferences with information flows
(e.g. distorting messages or discrediting certain groups). The Internet can also be used to
generate essentially false information, addressed to any target group – locally, regionally
and globally – to produce specific effects that are intentional and often harmful to the
general public. Moreover, we should not forget about the ever-growing risk of
cyberattacks, which are increasingly having impact on public safety. Also of concern is
the employment of advanced computer programs to modify source materials (deepfakes),
making it easy to discredit public figures, such as politicians and celebrities, or even
neighbours.
The more the public is aware about the potential threats, and the more knowledge it has
of the cyberspace, the less prone it is to being manipulated. Clearly, one important
measure to tackle cyberthreats (such as deepfakes) is to provide younger generations with
proper education by devising curricula that teach them to search for and double-check
information, as well as to instil the principles of communication. This is where digital
competencies of the general public come to the fore – their improvement now seems to
be the key objective of security, educational and social policies.
2
Digital competencies vs. information competencies
Technological advancements in access to information have made digital competencies
one of the key determinants of the quality of life. Social activity now largely relies on the
Internet. Digital artefacts and access to the Internet influence almost all aspects of social
and private lives. Yet, cyberspace is not the natural environment of humanity.
Consequently, no tradition exists of passing knowledge about the phenomena and
processes occurring in cyberspace to future generations. However, in order to analyse
how the digital competencies of the general public influence the state’s vulnerability to
cyberthreats, these competencies need to be defined. It can be assumed that digital
competencies include: 1) browsing, searching for, and filtering digital data, information
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
31
and content; 2) evaluating digital data, information and content; 3) managing digital data,
information and content; 4) interacting through digital technologies; 5) sharing through
digital technologies; 6) civic engagement through digital technologies; 7) cooperating
through digital technologies; 8) netiquette; 9) digital identity management; 10) creating
digital content; 11) copyrights and licensing; 12) computer programming; 13) security
technologies; 14) personal data and privacy protection; and 15) the ability to solve
technical problems.
According to information provided on the Chancellery of the Prime Minister’s website
(KPRM), digital competencies include: 1) IT competencies – the ability to use devices
and software; 2) information competencies – the ability to use online information
critically; and 3) functional competencies – the ability to apply the aforementioned
competencies in everyday private and professional life (KPRM, 2020).
Contemporary digital devices and the systems that manage them do not require the
average user to have extensive knowledge of IT systems and advanced technical skills.
Nevertheless, as modern technology continues to evolve, there is a continuing need to
stay up-to-date. This particularly concerns the ability to double-check information,
especially since fast-spreading false information can cause social unrest and spark armed
conflicts. Researchers concerned with this area have stressed that the growing scale of
disinformation poses one of the greatest challenges for global security (Aronhime,
Cocron, 2021). Also, it is worth emphasising that technology is not the only factor
involved in the susceptibility of the general public (or certain sections thereof) to
disinformation. Other factors come into play as well, and they are psychological, cultural,
economic and political in nature (Tomala, 2021).
A low level of information competency can make the public more susceptible to fake
news, whose primary aim is to undermine the authority of the state and trust in its
institutions, as well as to shape public opinion by perpetuating a state of apprehension.
Fighting disinformation represents a challenge for both public institutions and private
businesses. It seems, however, that institutionally implemented legal solutions cannot
counter this phenomenon. What is fundamentally important is that there is common
awareness among the public that each piece of information found online should be
approached critically. This is particularly pertinent to emotionally charged information,
such as that involving religion, ethnicity - and vaccination against COVID-19.
According to some researchers, in the context of cybersecurity, the threats posed by
information manipulation seem to be more serious than those associated with malware.
Indeed, no technical measures exist to protect against such manipulation (Kangasniemi,
2020).
32
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s Vulnerability
to Cyberspace Threats
3
Digital competencies of European societies
Digital competencies are becoming increasingly important in today’s world. However,
there has been little progress in the European Union in recent years as far as improving
the basic digital competencies of adult Europeans is concerned. Even though the
European Commission has supported Member States and provided them with guidance,
there are relatively few EU-funded projects focusing on the basic social skills of adults.
In 2019, a total of more than 75 million working-age adults in Europe did not have at
least basic digital skills. This mostly included the elderly, the undereducated and the
unemployed. Meanwhile, more than 90% of jobs already require at least basic digital
skills.
The European Commission has implemented a number of measures since 2015 to
improve the digital skills of European citizens. Between 2016 and 2018, national projects
as part of the “Digital Skills and Jobs Coalition” provided almost 11 million Europeans
with the opportunity to improve their digital skills. Almost half of them were primary and
secondary school students. However, no data exists as to how these measures ultimately
influenced the objectives of this initiative.
Efforts in specific areas of basic digital skills for adults are often part of broader
initiatives. This makes it impossible to determine the total amount of EU funds spent
exclusively for this purpose. Nevertheless, existing data suggest that the resources
available specifically for efforts to improve digital skills among adults are relatively
scarce – for instance, projects that specifically involved teaching digital skills in Member
States represented only about 2% of the European Social Fund’s overall budget for 20142020, even though they enjoy a priority status.
Table 1:
The percentage of European residents with at least basic digital skills in 2019
Country
Percentage of individuals who have basic or above basic
overall digital skills
European Union – 27 countries
(from 2020)
56
Belgium
61
Bulgaria
29
Czechia
62
Denmark
70
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
Germany
70
Estonia
62
Ireland
53
Greece
51
Spain
57
France
57
Croatia
53
Italy
42
Cyprus
45
Latvia
43
Lithuania
56
Luxembourg
65
Hungary
49
Malta
56
Netherlands
79
Austria
66
Poland
44
Portugal
52
Romania
31
Slovenia
55
Slovakia
54
Finland
76
Sweden
72
Iceland
85
Norway
83
Switzerland
77
United Kingdom
74
33
34
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s Vulnerability
to Cyberspace Threats
North Macedonia
32
Albania
21
Serbia
46
Turkey
36
Bosnia and Herzegovina
24
Kosovo
28
Source: (Eurostat, 2021).
In all these countries, the biggest deficits in digital skills were associated with searching
for and verifying information online, as well as familiarity with the basic safety rules and
measures (Techrush, 2021). The deficits varied, however, between states.
Despite the Member State’s investments made in recent years to develop digital
infrastructure for educational and training purposes, significant differences continue to
exist both between and within the Member States. Contrary to popular belief that young
people are the digital generation, study results have shown that a large part of this
population have underdeveloped digital skills. Indeed, in all the studied countries, more
than 15% of all students did not have adequate digital skills (European Commission,
2020). Moreover, according to OECD data, secondary school teachers in Europe rarely
receive training in the use of ICT for educational purposes, and teachers themselves have
voiced their need to develop professionally in terms of ICT skills (Europa Nu, 2021).
These data suggest that there is no significant correlation between the age group and
digital competence. Each group includes people with different levels of knowledge and
skills.
4
Threats associated with deficient digital competencies of the general public,
with special focus on information competencies
Cyberspace threats to the functioning of societies and states stem not from the existence
of ICT infrastructure per se, but from the possibilities it affords. In the literature on this
subject, the seven most-mentioned sources of cyberattacks include: 1) states – cybernetic
attacks launched by a state against another state can disrupt communications, operations
of state services and everyday lives of citizens. Here, an attack may be part of hybrid
warfare; 2) criminal groups – these aim to infiltrate systems or networks for financial
benefits. They deploy phishing, spamming, spyware and malware techniques to steal
identity, commit online fraud and engage in extortion; 3) hackers – they explore various
cybernetic techniques to break through security defences and to take advantage of security
gaps in computer systems and networks. They are motivated by private gain, retribution,
persecution, financial benefits or political activism. Hackers devise new types of threats
to enjoy recognition in their community; 4) terrorist groups – terrorists mount
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
35
cyberattacks to destroy, infiltrate, or take advantage of critical infrastructure to pose a
threat to national security, take control over military equipment, disrupt the economy and
cause mass casualties; 5) hacktivists – they launch cyberattacks for political reasons, not
for financial benefit. They target industries, organisations, or individuals that disagree
with their political ideas; 6) “malicious insiders” – these may include employees, external
suppliers, contractors, or other business partners that have legal access to business assets
and use it for fraudulent purposes to steal or destroy information for financial or personal
gain. Malicious insiders usually target businesses, but they also attack state institutions;
7) corporate espionage – corporate spies engage in industrial or business espionage to
either gain profit or disrupt the operations of a competitive business by attacking critical
infrastructures, stealing company secrets, and gaining unauthorised access. Attacks
coming from these individuals may also compromise state security when targeting critical
sectors of the economy (StealthLabs, 2020).
Each of these cyberattack sources may employ techniques devised to influence social
behaviour and sentiment. With the combination of big data and communication
automation through bots and artificial intelligence, it is now possible to distribute
information that is both personalised and intended for mass audiences. Data and
information theft or extortion, takeover of control over websites and news portals, identity
theft, deep fakes – all these can be used to mislead the public, and in extreme cases, to
cause social unrest and even armed conflicts. The only effective way to tackle these
phenomena is by raising public awareness about their existence.
Reasonable decision-making depends on the individual's ability to analyse available
information and to make decisions based on it. In extreme cases, decisions made on the
basis of false or incomplete data might cause threats not only for the individual making
the decision, but also for the general public and the state.
Researchers from the Max Planck Society have identified four primary challenges facing
those responsible for tackling manipulation in the public: 1) user behaviour is often
influenced by manipulative website architectures, so-called dark patterns (often leading
to undesirable behaviour) – advertisements that appear as website content or navigation
guides designed such that a click redirects the user to a website extorting data. These may
also include misleading privacy settings, causing the user to provide access to more
information than they agreed; 2) AI-operated information architectures do not present
information neutrally, but in a personalised manner based on data they gather. This means
that two people who enter the same search query in a search engine will probably obtain
different results. Such outcome could be helpful when the user is looking for a product or
service close to their current location. However, the display of news and political contents
based on user preferences can lead to information bubbles, where it is impossible to
become familiar with alternative opinions; 3) false and misleading information. Videos
and posts with conspiracy theories and unsubstantiated rumours can quickly spread
through social media and cause harm ‒ for instance, by discouraging people from
36
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s Vulnerability
to Cyberspace Threats
vaccinating through disinformation about vaccines, putting them and other around them
at risk of infection; 4) distracting online environments are constantly trying to draw the
attention of users. This equally involves push notifications, displays, pop-up
advertisements and streams of ever-changing content. The goal is to draw attention from
users and make sure to keep them engaged as long as possible. It is a business model and
services utilise it, and it is often the case that users spend much more time online than
planned without any actual benefits and at the cost of losing time. At the same time,
researchers stress that there are no tools to ensure that online manipulations and spread
of disinformation are prevented. However, they claim that a combination of intelligent
cognitive tools and education in information use with the adoption of anti-manipulation
policies by online platforms could significantly reduce the impact of false information on
public opinion and human behaviour (Max-Planck-Gesellschaft, 2021).
5
Conclusion
With the widespread access of the Internet and the digitisation of social activities,
cyberspace has become the arena for conflicts between states and blocs of states, as well
as intelligence wars. One aspect of such conflicts is the so-called information warfare.
The deeper the digital skills deficit of the targeted state, the more effective such warfare
is. This includes both the public’s susceptibility to various types of disinformation and its
ability to follow safety rules.
While cyberspace threats cannot be eliminated, it seems that the only non-technical way
to reduce vulnerability to them is to educate and raise popular awareness of them. This
applies to the general public and all types of cyberspace activities – private, social,
professional and political. However, in order for such education to deliver the expected
outcomes, it is necessary to improve the digital competencies of the people in charge of
it. The reason this is so important is that with the widespread access to the Internet and
with rapid technological advancements, existing threats might evolve, or new, unknown
ones might emerge. It is likely that in the near future, we will not be able to tell if we are
talking to a machine or a human when using instant messaging applications ‒ and this
includes not only voice, but also video communication.
The ability to search for and double-check information should be one of the educational
outcomes across all educational stages. The public can become more resilient against
information warfare once it has a more critical approach to, and can distance itself from,
information (especially that which arouses emotions), thus effectively making the state
less vulnerable to cyberthreats.
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Kaczmarek: Digital Competencies of the General Public and the State’s
Vulnerability to Cyberspace Threats
37
References:
Aronhime, L. & Cocron, A. (2021) Przeciwdziałanie dezinformacji – wzmocnienie cyfrowej
Odporności
Sojuszu,
available
at:
https://www.nato.int/docu/review/pl/articles/2021/08/12/przeciwdzialanie-dezinformacjiwzmocnienie-cyfrowej-odpornosci-sojuszu/index.html (April 20, 2022).
Europa Nu (2021) Onderwijs en opleiding: basisvaardigheden en digitale vaardigheden essentieel
voor
onderwijs,
werk
en
leven,
available
at:
https://www.europanu.nl/id/vldphhf4ak7y/nieuws/onderwijs_en_opleiding_basisvaardigheden?ctx=vj5cj4qyvkgm
&tab=0 (April 20, 2022).
European Commission (2020) Education and Training Monitor 2020, available at:
https://op.europa.eu/webpub/eac/education-and-training-monitor-2020/countries/countries.html
(April 20, 2022).
Eurostat
(2021)
Individuals'
level
of
digital
skills,
available
at:
https://ec.europa.eu/eurostat/databrowser/view/isoc_sk_dskl_i/default/table?lang=enidw (April
20, 2022).
(2021) Mensch versus Internet: Was können wir tun, um uns vor Manipulation, Fake News und Co.
zu schützen?, available at: https://nachrichten.idw-online.de/2021/02/12/mensch-versus-internetwas-koennen-wir-tun-um-uns-vor-manipulation-fake-news-und-co-zu-schuetzen/ (April 20,
2022).
Kangasniemi, H. (2020) Sosiaalisen manipuloinnin avulla yritetään saada ihminen
huomaamattaan luovuttamaan arvokkaita tietoja tai rahaa. Kyberrikolliset ovat ottaneet keinon
tehokäyttöön ja se koskee meitä kaikkia, available at: https://elisa.fi/ideat/tunnista-ja-torjusosiaalinen-manipulointi/ (April 20, 2022).
KPRM
(2020)
Kompetencje
cyfrowe,
available
at:
https://www.gov.pl/web/cyfryzacja/kompetencje-cyfrowe (April 20, 2022).
Max-Planck-Gesellschaft (2021) Selbsthilfe gegen Manipulation im Internet, available at:
https://www.mpg.de/16406549/0211-bild-mensch-versus-internet-was-koennen-wir-tun-umuns-vor-manipulation-fake-news-und-co-149835-x (April 20, 2022).
Spiegel (2021) EU muss mehr digitale Kompetenzen fördern, available at:
https://www.bildungsspiegel.de/news/weiterbildung-bildungspolitik/4749-eu-muss-mehrdigitale-kompetenzen-foerdern (April 20, 2022).
StealthLabs (2020) Cyber Security Threats and Attacks: All You Need to Know, available at:
https://www.stealthlabs.com/blog/cyber-security-threats-all-you-need-to-know/
(April
20,
2022).
Techrush (2021) Analyse in Europa: Vielen Erwachsenen fehlt es an Digital-Kompetenz, available
at:
https://techrush.de/analyse-in-europa-vielen-erwachsenen-fehlt-es-an-digitalkompetenz/?cookie-state-change=1631368316921 (April 20, 2022).
Tomala, L. (2021) Kto wierzy w fake newsy? Badacze chcą zwalczać szkodliwe informacje jak
epidemie, available at: https://naukawpolsce.pap.pl/aktualnosci/news%2C86178%2Ckto-wierzyw-fake-newsy-badacze-chca-zwalczac-szkodliwe-informacje-jak (April 20, 2022).
38
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
KATARZYNA CHAŁUBIŃSKA-JENTKIEWICZ
1
Abstract Today’s environment of cybersecurity threats poses a challenge
that has never been greater before, and the need to ensure cybersecurity is
particularly notable amidst the COVID-19 pandemic. The increase in the
number of sophisticated cyber attacks directed against governments and
enterprises – in particular, public entities – has revealed the need to build
cybersecurity strategies practically in every sphere of our lives.
Organisations therefore need to protect themselves against cyber attacks in
which the collected information is at the same time their primary source
and target. Due to the increasing need for ensuring cybersecurity, the
benefits that can be derived from joint actions seem obvious. However, the
key element of such coordinated measures is information sharing and
prompt response. Organisations operate better in a situation where threats
are identified and described, if they are better informed about the
perpetrators and the methods of attacks. Information Sharing and Analysis
Centres are one of several tools used with a view to ensuring cybersecurity.
Keywords: • cybersecurity • cyber attack • threat • information
CORRESPONDENCE ADDRESS: Katarzyna Chałubińska-Jentkiewicz, Ph.D., Dr. Habil., University Professor,
Head of the Media Law, War Studies University, Faculty of National Security, Intellectual Property and New
Technology Department Institute of Law, Aleja Generała Antoniego Chruściela „Montera” 103, 00-910
Warsaw, Poland, e-mail:
[email protected], ORCID: 0000-0003-0188-5704.
https://doi.org/10.4335/2022.1.4
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
40
1
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
Introduction
By design, the Information Sharing and Analysis Centre (ISAC) is a trusted sectoral unit
which may provide 24/7 secure operational capability and which sets out the requirements
concerning coordination, information sharing and analyses in the event of cybernetic
incidents, threats and vulnerabilities in ICT networks. On the one hand, ISAC may serve
as a sectoral resource, thanks to which it is possible to collect key information about
incidents and issues related to cybersecurity in a given industry, and to identify,
communicate, and analyse the potential outcomes of such problems for a given sector.
On the other hand, the establishment of ISAC does not necessarily need to entail measures
taken only in a given sector. Coordination may refer to joint undertakings or to the
achievement of joint objectives related to the need to ensure system-based protection. The
common denominator for the activities of partners in the sphere of cybersecurity is often
the strategic nature of their services, constituting a crucial point on the map of a critical
state infrastructure.
ISAC's mission is first and foremost to increase the sectoral capacity to undertake
measures for cybersecurity, respond to threats in the cyberspace, search for vulnerabilities
and mitigate the effects of incidents by providing a centralised organisation dealing with
the monitoring and dissemination of information. The primary objective is to obtain
accurate, useful and relevant critical information whose scope is as useful for
cybersecurity as possible. A secondary, but equally important, objective is to maintain
the confidentiality of such information, which is deemed significant for cybersecurity by
ISAC members. Accordingly, it can be said the ISAC itself constitutes a platform where
members can exchange information within their sector, with other organisations, and the
government, which means that it is a communication tool and serves as the main
communication channel in the sphere of security for a given industry. It ensures the
analysis of proper threats, vulnerabilities and incidents. Moreover, it provides access to
alerts concerning threats, warnings, guidance, notices and vulnerability analyses to ISAC
members.
2
ISACs and critical infrastructure (CI) – the American organisation model
In 1998 B. Clinton's administration issued Presidential Decision Directive 63 (PDD-63)
in which the U.S. Government requested that each critical infrastructure sector (in the
USA, critical infrastructure sectors include: the chemical sector, commercial facilities
sector, critical manufacturing, dams, defence industrial base sector, emergency services,
energy sector, financial services, food and agriculture, government facilities, healthcare
& public health, Information Technology sector, nuclear reactors, materials and waste
sector, transportation systems, and the water and wastewater systems sector) identify
sector-specific information to assess a given sector's vulnerability to cyber-attacks or
physical attacks, recommend a plan to eliminate significant vulnerabilities, propose a
system for identifying and preventing attempted major attacks, and develop a plan for
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
41
alerting, containing and rebuffing an attack in progress and reconstitute minimum
essential capabilities in the aftermath of an attack. In response to these needs, the owners
and operators of key resources of critical infrastructure established ISACs. In 2003,
Homeland Security Presidential Directive (HSPD-7) expanded the scope of PDD-63,
ordering that the public and private sectors share information about physical and cyber
threats, and vulnerabilities with a view to ensuring the protection of critical infrastructure
in the USA. Ten years later, in 2013, Presidential Policy Directive 21 (PPD-21) updated
the federal approach to critical infrastructure security and resilience by establishing closer
links between physical security and cyber security and by strengthening critical
infrastructure resilience with three strategic imperatives: 1) to refine and clarify
functional relationships across the Federal Government to advance the national unity of
effort to strengthen critical infrastructure security and resilience; 2) enable effective
information exchange by identifying baseline data and systems requirements for the
Federal Government; and 3) implement an integration and analysis function to support
planning and operations decisions regarding critical infrastructure.
On the same day, President B. Obama issued Executive Order (EO) No. 13636. The
document was aimed at improving critical infrastructure cybersecurity by streamlining
information sharing between governmental agencies and between the public and the
private sector entities, thus increasing the volume, timeliness and quality of cyber threat
information. ISACs were established for specific sectors to ensure national security in the
protection of critical infrastructure.
ISACs in the USA are used in multiple CI sectors in order to join the efforts of industries
and the government, and to ensure measures for quick access to persons affected by cyberattacks. A lot of these are “inter-sectoral” ISACs (e.g. communications, IT sectors, interstate ISACs, etc.) that bring together owners of CI or service providers, and operators
representing numerous sectors. The key ISACs in the USA include: 1) Financial Services
ISAC: The centre has over 4,600 members and 39 partner associations, with an outreach
to 99 percent of all banks and credit unions, and covers 85 percent of the securities sector
and nearly 50 percent of all insurance firms; 2) Information Technology ISAC: through
its members, it reaches 90 percent of all PCs and operational systems, covers 85 percent
of all data bases, 85 percent of all routers, and 65 percent of all software safeguards; 3)
Communications ISAC: the DHS National Coordinating Center for Communications
cooperates with the private sector, including ISACs, in order to ensure 24/7 operational
support. Its members include communications equipment and software providers, and it
covers 95 percent of all cable lines of communications service providers, 90 percent of
all wireless communications service providers, including satellite communications
services, and 90 percent of the backbone network of online service providers; 4) Water
ISAC: currently provides information about the security of water supply and wastewater
companies, and serves over 65 percent of the American population; 5) Multi-State ISAC:
covers all 50 states, the District of Columbia, four USA territories and numerous local
government authorities. Moreover, MS-ISAC is continuously extending its operations,
42
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
and they currently cover all 39,000 municipalities; 6) transport was identified as one of
the key sectors, with four existing transport ISACs: a) the Surface Transportation ISAC:
In 2002, at the request of the Secretary of Transport, the Association for American
Railroads established ST-ISAC. ST-ISAC serves 95 percent of the total North American
rail infrastructure; b) Over the Road Bus ISAC: supported by ST-ISAC, the American
Bus Association initiated the operations of the OTRB ISAC in 2013. ABA provides
security alerts and password-protected information in the relevant section of their
website; c) Public Transportation ISAC (PT-ISAC): The American Public Transportation
Association was appointed by the U.S. Department of Transportation as the sector
coordinator for the public transport industry in the United States. To this end, APTA
established PT-ISAC. APTA members provide services to over 90 percent of all public
transport users in the USA and Canada; d) Maritime ISAC: This ISAC is a non-profit
organisation sponsored and managed by the Maritime Security Council. The Maritime
ISAC cooperates with the U.S. and international maritime shipping, seaport and
government regulatory oversight communities. It deals with collecting and analysing
proprietary data (e.g., stowaway rates and locations, drug seizures overseas, terrorist
threats etc.), which it then disseminates to participating industry and government
constituents; 7) Retail ISAC: The Retail Cyber Intelligence Sharing Center acts as a
platform for retailers where they can exchange information on threats and leading
practices, at the same time improving the security of retail networks and protecting
consumer data. The analysts of the Retail ISAC process and collect real-time information
on cyber threats (including new types of malware, the operations of underground criminal
forums or potential software vulnerabilities). It also provides anonymised information to
the federal government and law enforcement bodies, such as the DHS, Secret Service or
the Federal Bureau of Investigation (Goodwin, Nicholas, 2015).
3
The cooperation of ISACs with other entities
The analysis of American ISACs reveals close links between government agencies and
ISACs in the sphere of counteracting cyber-attacks. The transportation sector is one
example of this. Along with the update of the national approach to the security and
resilience of critical infrastructure, 16 critical infrastructure sectors were identified, and
the related sector-specific federal agencies were appointed. The Department of
Transportation is responsible for providing technical support to CI owners and operators,
and for facilitating access to, and exchange of, information necessary to enhance and
protect transportation security. DHS manages the National Cybersecurity and
Communications Integration Center, which is a centre responsible for coordinating
emergency information about cyberspace and communications across the country,
operating 24/7, engaging in cooperation state and local authorities, intelligence
communities, law enforcement bodies and the private sector. The Operational Control
and Emergency Communications Center is a centralised institution whose objectives are
to ensure cybersecurity and to raise the awareness of threats in the sphere of
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
43
communications, vulnerabilities, hacking, incidents, as well as mitigating and recovery
measures.
In 2011 DHS launched an information sharing and cooperation programme in respect of
the cyberspace in order to raise awareness within all critical infrastructure sectors through
a close and timely exchange of information about cybernetic threats and direct analytical
exchange. The programme covers governmental organisations, ISACs and other CI
owners and operators through the development of a mechanism by which private sector
partners would be able to share data directly with the government via an inter-sectoral
portal. Fully integrated divisions allow a holistic approach to cybersecurity and
communications issues at the operational level. The sectoral partnership model is set out
in the National Infrastructure Protection Plan (NIPP). The model encourages CI owners
and operators to establish Coordinating Councils which are to: 1) represent principal entry
points for the government to collaborate with the sector with a view to solving problems;
2) serve as a strategic communication and coordination mechanism between owners,
operators and suppliers of IC, and, as appropriate, with the government during emerging
threats or response and recovery operations; 3) identify, implement and support
appropriate information-sharing capabilities and mechanisms in sectors; 4) facilitate
inclusive organisation and coordination of the sector’s policy development regarding
critical infrastructure security and resilience planning and preparedness, exercises and
training, public awareness and associated implementation activities and requirements; 5)
advise on the integration of federal, state local and regional planning with private sector
initiatives; and 6) provide input to the government on sector R&D efforts.
Government Coordinating Councils cooperate with ISACs. Their tasks include: 1) the
provision of inter-agency strategic communications and coordination at the sectoral level
through partnership with DHS, Sector-Specific Agency and other supporting agencies
across various levels of government; 2) participation in planning efforts related to the
revision of the National Plan and the development, implementation and revision of
Sectoral Plans; 3) coordination of strategic communications and discussion and resolution
of issues among government entities within the sector; and 4) coordination of, and support
for, the efforts to plan, implement and execute the Nation’s critical infrastructure security
and resilience mission.
One of the strengths of the ISAC “system” is the exchange of data and experience with
other related ISACs. The National Council of ISACs (NCI) is one of several such
information sharing mechanisms. Formerly known as the ISAC Council, the NCI is a
group of volunteer representatives of ISACs who meet to develop trusted relationships
between sectors and to address common issues. Each ISAC appoints four representatives
to the Council. The mission of NCI is to increase physical security and cybersecurity of
national critical infrastructure through establishing and maintaining a framework for
valuable interaction between the ISACs and the government. The NCI holds monthly
meetings via teleconference and quarterly on-site meetings to discuss current issues. The
44
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
NCI also sponsors the annual Critical Infrastructure Protection Congress to bring together
the critical infrastructure community for networking, learning and addressing issues of
concern to stakeholders. The mission of the Partnership for Critical Infrastructure
Security (PCIS) is to coordinate common CI cross-sector initiatives that promote public
and private efforts to help ensure secure, safe, reliable, and resilient critical infrastructure
services.
Some information sharing programmes, in particular in the private sector, operate via
local companies, universities and experts who discuss common threats and
vulnerabilities.
In the United States, non-profit programmes, such as the Bay Area Chief Security Office
Council, and the Massachusetts Advanced Cyber Security Center, are examples of
regional information exchange organisations. The Federal Bureau of Investigation (FBI)
also has developed the InfraGard, a regional public-private information-sharing hub.
Numerous information exchange schemes at the national level, both voluntary and
mandatory, include all information-sharing participants and influence them. The inherent
role of national governments in the sphere of legal regulations and security suggests the
need for national information exchange programmes. In the United States, most proposals
from the Congress and the executive branch are centred around participation in new
national-level information sharing programmes.
Cyberthreats usually have an international reach, so information sharing participants
might wish to communicate within the international agenda. For governments, such
disclosure may be problematic, as the provision of sensitive or even confidential
information can only occur between close allies. As a result, the efforts aimed at the
establishment of international information sharing schemes in which governments
participate have not been successful.
The analysis of the American ISAC model shows that mitigating cybersecurity risks
increasingly depends on information sharing and cooperation between a wide range of
entities, with the use of numerous diverse collaboration models, methods and instruments.
The design of successful information-exchange mechanisms is not an easy endeavour, as
it requires continuous engagement, trust and a clear sense of values shared by entities
participating in a given project. The key element of ensuring support related to
information sharing is the coordination of activities, in particular, those taken by public
and private organisations. Nonetheless, it is crucial to build such information-sharing and
cooperation tools among entities of substantial strategic importance for the state in the
public-sector area.
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
4
45
ISAC – the European model
European ISACs differ from their American counterparts in terms of dynamics and
characteristics. First of all, European ISACs build on the experience of older
organisations from across the Atlantic. Secondly, European ISACs are very much distinct
from the American ones, which results from cultural differences – in the USA, businesses
are expected to take care of themselves, while in Europe it is expected that the state
ensures cybersecurity in each sector, while the majority of key public tasks are performed
in full by the public sector.
European ISACs focus on building partnerships and trust between their members. They
are very industry-oriented, but there are also high expectations about governmental
support – not in terms of financing, but rather in the substantive area through sharing
specialist knowledge (combating cybercrime, sharing industry-relevant information). The
participation of public administration increases the effectiveness of ISACs. Moreover, it
proves the respect and support for market needs on the part of the public sector, in political
and strategic terms (for example, such need is indicated in the Directive on security of
network and information systems and in the GDPR).
The development of the ISAC ecosystem in Europe depends on the cultural conditions of
individual members and the general level of trust between public and private entities – if
a public-private partnership (PPP) is involved. Therefore, in countries where the trust is
insufficient, it is worth starting from developing appropriate PPP structures, and then
transforming them into an ISAC. This is owing to the fact that the exchange of
information about incidents is very demanding, and the level of trust between
participating entities is of great importance here. As key services require the
establishment of this type of organisations to enhance cybersecurity, ISACs bringing
together only public sector partners are also needed, if not indispensable.
It is worth noting here that international or large enterprises operating in the cybersecurity
sector (in Europe) are usually not involved in ISACs. This is mainly due to the insufficient
trust of ISAC members in such companies, which is based on the belief that they might
use the provided information and knowledge to advance their own business. That is why
the benefits that might be derived from such participation should be explored beforehand.
There are three roles in an ISAC – moderator, member and partner. The moderator
(leader) is an entity which defines the logistics of the group (it assumes the function of a
secretariat); a member is an organisation which actively discloses or receives information;
and a partner is an entity which may take part in dedicated sessions, usually aimed at
providing specified information (research data) or discussing a specific topic (e.g.
transposition of a directive to national law).
46
5
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Chałubińska-Jentkiewicz: Activities for Cybersecurity as a Mission of Information
Sharing and Analysis Centres
Conclusions
Cyberthreats and cyber attacks are not only a technological risk, but also a business risk.
Therefore, the cybersecurity function should have sufficient independence and
significance. This might help ensure the proper consideration of decisions related to risk
management that are not affected by other issues and IT limitations, or overshadowed by
them. If cybersecurity is part of IT, it might lack sufficient visibility and links with the
actual services. Enterprises should therefore consider specific measures with a view to
establishing links between services, risk partners and cybersecurity. This could be
achieved through the creation of steering committees within the framework of ISACs.
Such measures could also facilitate the alignment of cybersecurity measures with future
business plans.
The COVID-19 pandemic has significantly disrupted the operations of institutions and
their functioning worldwide. Remote work has gained popularity, and as a result, the
number of videoconferences and team collaboration applications have rapidly increased.
In a recent report prepared by Deloitte, it was found that many financial institutions were
evaluating permanent remote work for at least part of their workforce. Indeed, based on
conversations with industry leaders, some companies are considering remote work for
30% or more of their employees on a more permanent basis. Cybersecurity organisations
will need to quickly adapt to this new operating environment by implementing enhanced
controls and endpoint protection technologies so as to exert greater control over end-user
devices. Companies should, hence, consider increasing training and awareness activities,
focusing on remote etiquette for work-from-home environments. Such experience should
be the subject of information exchange as part of ISACs (Bernard, Nicholson, 2020).
References:
Bernard, J. & Nicholson, M. (2020) Reshaping the cybersecurity landscape How digitization and
the COVID-19 pandemic are accelerating cybersecurity needs at many large financial
institutions,
available
at:
https://www2.deloitte.com/us/en/insights/industry/financialservices/cybersecurity-maturity-financial-institutions-cyber-risk.html (March 15, 2022).
Goodwin, C. & Nicholas, J.P. (2015) A framework for cybersecurity information sharing and risk
reduction,
available
at:
C:/Users/48692/Downloads/Framework_for_Cybersecurity_Info_Sharing%20(1).pdf
(March
15, 2022).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Information Protection in Cyberspace a Factor in National
Security
KRZYSZTOF BOJARSKI
1
Abstract National security is a very broad issue and includes a number of
factors that may affect the security situation. In addition to the traditionally
considered, especially of a military nature, nowadays attention is also
drawn to other elements, among which those related to national security in
cyberspace are of particular importance, and in this respect, especially the
security of information, in particular, of classified information. Ensuring
national security in this regard is currently becoming a key challenge for
the state’s functioning and development. Therefore, mechanisms,
procedures and structures are being put in place to safeguard this security
at different levels of state function.
Keywords: • national security • cyberspace • cybersecurity • classified
information
CORRESPONDENCE ADDRESS: Krzysztof Bojarski, Ph.D., Faculty of Security, Marshall Józef Piłsudski Higher
School of Safety and Security in Warsaw, Zakroczymska Street 13, 00-225 Warsaw, Poland, e-mail:
[email protected], ORCID: 0000-0002-0729-5759.
https://doi.org/10.4335/2022.1.5
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
48
1
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
Introduction
Security, in its broad sense, is nowadays a ubiquitous notion, considered in various scopes
and in relation to various values. One of the key issues of security is national security.
This is because in any country, its national security affects the security of every citizen
of that state, their lives and development. Hence it must be taken seriously. Indeed, Article
5 of the Constitution of the Republic of Poland of 2 April 1997 (consolidated text, Polish
Journal of Laws 1997, No. 78, item 483, as amended) states that “the Republic of Poland
shall safeguard the independence and integrity of its territory and ensure the freedoms
and rights of persons and citizens, the security of the citizens (...).”
Thus, in one of the first articles of the Constitution, the legislators emphasise issues
relating to territorial independence and integrity, and the security of citizens.
Independence means, of course, the separate state existence of the Republic, as well as
the existence of the Polish state within its present boundaries, while sovereignty is
understood as the ability of the state to decide and act independently about all matters
concerning it. However, national security is not only about independence and the
associated aspect of defending that independence alone, as the concept of national
security has evolved considerably over the years. It is true that the traditional approach
pays particular attention to the military aspect, and to the absence of threats in this respect.
Therefore, in this sense, the fundamental values to be protected include territorial
integrity, political independence or even the survival of the state or nation. Of course,
these are extremely important aspects of national security, but they are not of sole
significance. Today, many other factors are also indicated which influence this security,
and at the same time often pose a serious threat to it. These factors include, for example,
the destabilisation of the state system, poorly functioning economic and social
mechanisms, social conflicts, natural disasters, illegal migration, organised crime,
terrorism, and, in recent times in particular, special attention should be paid to threats to
the state occurring in cyberspace and the related information domain. Thus, national
security is shaped by a number of often interrelated factors that can lead, when
significantly intensified, to the destabilisation of the state and, consequently, to the
collapse of the state understood as the inability of the central government to perform its
basic functions over the entire territory of the state (Bojarski, 2017: 26-27).
2
Cyberspace and cybersecurity – definitional attempt
The starting point for further consideration of the subject in question is cyberspace and
its definition, which is provided in Article 2(1b) of the Act of 29 August 2002 on Martial
Law and the Competences of the Commander-in-Chief of the Army and the Rules of the
Commander-in-Chief's Subordination to the Constitutional Authorities of the Republic of
Poland (consolidated text, Polish Journal of Laws of 2017, item 1932) in the wording
which determines that cyberspace is understood as space for the processing and
exchanging of information created by ICT systems, as defined in Article 3(3) of the Act
of 17 February 2005 on the Computerisation of the Operations of Entities Performing
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
49
Public Tasks (consolidated text, Polish Journal of Laws of 2021, item 670), including the
links between them and relations with the users. Thus, cyberspace is the information space
where the processing and distributing of information and messages is carried out. It
consists of both ICT networks and systems, and the relationships between them and users
(Kowalewski, 2014: 24). Cyberspace can be at the same time identified as an area – an
electronic domain – used for the distribution of information, which has an interstate form
and consists of the sum of activities carried out by the user (Wasilewski, 2013: 231).
Analysing the term itself in even more detail, it should be noted that the prefix “cyber”
refers to the use of new information and communication technologies, as well as to the
development of e.g. economy, culture or knowledge based on these technologies in a
broad sense. The basic element of the term indicates a space that is constantly expanding
and evolving as a result of continuous changes based on the ingenuity and participation
of users themselves. Therefore, cyberspace obviously requires hardware, software and
information systems, but it is also co-created by human behaviour captured through
digital networks. All these interactions are a rich set reflecting the positive as well as the
negative sides of human nature, ranging from cyberautocreation to criminal activities,
also leading to terrorist acts and possible cyber conflicts. It can therefore be concluded
that the main characteristics of cyberspace are the absence of borders, dynamic processes
and phenomena and the anonymity of users. This situation makes public institutions with
their domain in cyberspace vulnerable to intrusion, whether by individuals, organised
groups or hostile states (Górka, 2018: 33-34).
This therefore raises the question of cybersecurity – what it is and how it is understood.
The definition of cybersecurity is contained in the Act on the National Cybersecurity
System of 5 July 2018 (consolidated text, Polish Journal of Laws of 2020, item 1369) –
the Act is hereinafter referred to as the NCSA – according to which cybersecurity is the
resilience of information systems against actions which compromise the confidentiality,
integrity, availability and authenticity of processed data, or the related services provided
by those information systems (Article 2(4) of the NCSA). This definition is linked to the
definition of the concept of an incident and its various types, which are also defined in
the NCSA (Article 2(5-9) and according to which: incident – means an event which has,
or may have, an adverse impact on cybersecurity; critical incident – means an incident
resulting in significant damage to public security or order, international interests,
economic interests, operation of public institutions, civil rights and freedoms or human
life and health, classified by the competent CSIRT MON (Computer Security Incident
Response Team operating on a national level, managed by the Minister of National
Defence), CSIRT NASK (Computer Security Incident Response Team operating on a
national level, managed by the Research and Academic Computer Network – National
Research Institute) or CSIRT GOV (Computer Security Incident Response Team
operating on a national level, managed by the Head of the Internal Security Agency);
serious incident – is defined as an incident which causes, or may cause, a serious reduction
in the quality, or an interruption of the continuity, of a critical service; significant incident
– means an incident which has a significant impact on the provision of a digital service
within the meaning of Article 4 of Commission Implementing Regulation (EU) 2018/151
50
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
of 30 January 2018 laying down rules for application of Directive (EU) 2016/1148 of the
European Parliament and of the Council as regards further specification of the elements
to be taken into account by digital service providers for managing the risks posed to the
security of network and information systems and of the parameters for determining
whether an incident has a substantial impact (OJ EU L 26, p. 48); incident in a public
entity – is an incident which causes, or may cause, a reduction in the quality of, or an
interruption to, the performance of a public task carried out by a public entity, as referred
to in Article 4(7) to (15) of the NCSA.
Cybersecurity is also addressed by the Cybersecurity Strategy for 2019-2024 (Official
Gazette of 2019, item 1037), hereinafter referred to as the Cybersecurity Strategy. First
of all, it is worth mentioning a few words about the document itself – namely, that it
replaced the National Framework of Cybersecurity Policy of the Republic of Poland for
2017-2022, and was introduced by a resolution of the Council of Ministers. Moreover, it
directly affects government administration bodies, and indirectly, after the adoption of
generally applicable laws on the initiative of the Council of Ministers, other public
authority bodies, as well as entrepreneurs and citizens. The main motive of this document
is to define strategic objectives and appropriate political and regulatory measures aimed
at achieving a high level of cybersecurity, i.e. primarily to ensure the resilience of the
information systems of operators of essential services, critical infrastructure operators,
digital service providers and public administration to cyberthreats, as well as to increase
the level of information protection in information systems through standardisation of
security features. As a result, the implementation of the strategic objectives is expected
to influence the improvement of national security, increase the effectiveness of law
enforcement agencies and judicial authorities in detecting and combating cybercrimes, as
well as hybrid (including terrorist activities) and espionage activities in cyberspace.
Therefore, we can conclude that the main objective of this strategy is to increase the level
of resilience to cyberthreats and to enhance the level of information protection in the
public, military and private sectors, as well as to promote knowledge and good practices
to enable citizens to better protect their information (Cybersecurity Strategy: 8-10).
It must be stressed that cyberspace has been shaped primarily by the process of integration
of basic forms of information transmission and interpretation (Marczyk, 2018: 60), which
emphasizes the importance of user behaviour from a cybersecurity perspective.
Therefore, it seems that activities related to the promotion of knowledge and education in
the field of cybersecurity are a prerequisite for the success of information protection in
cyberspace, because it is well-known that humans are the weakest link here. For this
reason, according to this strategy, education about cybersecurity should be available at
the earliest possible stage of access to digital services – preferably before entering the
digital world. In practice it is often required at the stage of early childhood education. In
this respect, it is advisable that, in cooperation with non-governmental organisations, the
private sector and academic centres, the public administration carry out systemic actions
to sensitise society to the risks of cyberspace, as well as educational actions in the field
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
51
of rights and freedoms in the digital environment and the rights of persons who are victims
of cyberattacks and suffer damage as a result of violations of network security.
In the context of the growing number of threats aimed at exerting a specific influence on
society, as well as bearing in mind the consequences of the deliberate use of social
engineering tools for manipulative activities in the form of, among others, disinformation
campaigns or inspiration or disintegration activities, it is necessary to implement systemic
actions enabling the development of citizens’ awareness in the context of verifying the
authenticity of information and responding to attempts to disrupt it (Cybersecurity
Strategy, 2019: 26). Indeed, it is not without a reason that the 21st century is called the
century of the information society, which emphasises the important role of information
and communication systems existing within a given society and determining its specific
features as compared to other types of societies. Such a society consists not only of
information and ICT means, but also of humans and their needs, the economy, the state
and the environment. It is the development of ICT means in processing and collecting
information, as well as communication means in sending and receiving information that
is responsible for the establishment of the information society (Krztoń, 2015: 101-102)
and the related key role of information and its protection.
3
Information and information security
Information is a term which is ambiguous and difficult to define. Although many different
definitions can be found in the literature on the subject, it can be assumed, according to
the Polish language dictionary, that information is, among other notions, what has been
said or written about someone or something, also the communication of something, as
well as data processed by a computer (https://sjp.pwn.pl/sjp/informacja;2466189.html).
Information is a key factor influencing decision-making in all areas of life. The basis of
information is data, which must be understandable and, moreover, should contain an
element of novelty for the recipient. However, when defining information in the context
of an information system, it is emphasised that information is what changes and supports
understanding, while data is the input of the communication channel, as data is tangible
and consists of numbers, words, phone calls, etc. Data becomes information when people
use it to better understand specific issues. As a result, information systems should provide
information rather than data. Information in any organisation, including the state, is the
basis for building the knowledge of all people involved in the process of acquiring and
using it. By shaping the awareness of the phenomena occurring in the organisation itself
and in its environment, information makes it possible to adapt to the changing reality, as
well as to transform it to facilitate the more efficient functioning, for example, of the state
as the most universal organisation. Furthermore, it is due to information that it is possible
to become aware of existing problems and then to begin the search for solutions
(Grabowski, Zając, 2009: 104).
52
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
Nowadays, information in the virtual world is of particular importance. This is because it
is the most important element of cyberspace, being generated from data which, when
processed, commented and disseminated, creates a new dimension of reality.
Today more than ever, a new facet of information is revealed – namely, in the modern
world information it is treated as a commodity, which, like any other good, can be bought
and sold. As a result, the growing importance and significance of information in both the
economic and national security fields is gradually but continuously increasing its price.
It is already a truism today to say that those who have information have power. Therefore,
it is not surprising that adequate cybersecurity has become a priority for many
governments in recent years (Cyfrowa Polska, 2019: 3), since thanks to the global
Internet, all who are interested have access to almost the entire world. In addition to the
obvious benefits, however, this also has its dark side, because it entails a new threat to
national security, which takes the form of uncontrolled leakage of information of not only
economic, political, but even strategic importance.
Such a threat requires effective action to eliminate or minimise it. Therefore, there is a
need for constant monitoring of the situation, and thus for the establishment of services,
institutions or organisations which, on the basis of appropriate legal regulations, will
ensure the security of the state in this field of its functioning. Similarly to other countries,
Poland is also susceptible to the threat of information leakage, which may be the result of
improper management of information resources or deliberate action by intelligence and
special services of other countries, or even terrorist organisations hostile to Poland and
its domestic and foreign policy. Particularly important and sought-after is not only
military and national defence data, but also data relating to business activity, technology
and scientific research, and in fact any information that may contribute to the competitive
advantage of another country or organisation. Therefore, in response to a new threat, in
order to ensure the security of information that is particularly important to the state, all
countries establish properly prepared and trained services whose task is to constantly
monitor information security and eliminate or limit its leakage. In the functioning of the
state, the efficiency of governing bodies is of utmost importance, which is mainly related
to the speed and accuracy of decisions, and this in turn depends on the availability of a
large amount of reliable and detailed information in a given area, so security management
must be organised in such a way that information is easily accessible to authorised persons
and at the same time protected from unauthorised use by outsiders who may act to the
detriment of the state (Machura, 2013: 156-157). This, of course, also, and perhaps above
all, requires appropriate legal regulations.
The principal legal act relating to this issue is the Act of 5 August 2010 on the Protection
of Classified Information (Polish Journal of Laws of 2019, item 742) – the Act is
hereinafter referred to as the APCI. The provisions set out in this Act govern the standards
for the protection of classified information, the classification of classified information,
the preparation of its protection, as well as the standards for the use of physical, personnel
and ICT security measures (Wojciechowska-Filipek, Ciekanowski, 2019: 195).
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
53
According to this legal act, classified information is considered to be information, the
unauthorised disclosure of which would or could cause damage to the Republic of Poland,
or would be detrimental from the point of view of its interests, also in the course of its
preparation and regardless of the form and manner of its expression (Article 1(1) of the
APCI). Classified information may be made available only to a person providing a
guarantee of confidentiality and only to the extent necessary for the performance of their
work or service at the position held or for the performance of commissioned activities
(Article 4(1) of the APCI).
Proper management of access to classified information requires its appropriate
classification, and in accordance with the APCI, it may be assigned one of four secrecy
clauses, the common denominator of which is the fact that its disclosure may have
negative consequences for national security. Therefore, according to Article 5(1) of the
APCI, classified information shall be marked as “top secret” if its unauthorised disclosure
causes exceptionally serious damage to the Republic of Poland by: 1) threatening the
independence, sovereignty or territorial integrity of the Republic of Poland; 2) posing a
threat to the internal security or constitutional order of the Republic of Poland; 3) posing
a threat to the alliances or the international position of the Republic of Poland; 4)
weakening the defence readiness of the Republic of Poland; 5) that fact that it will or may
lead to the identification of officers, soldiers or employees of the services responsible for
the performance of intelligence or counterintelligence tasks, and who perform operational
and exploratory activities, if this endangers the security of the activities performed or may
lead to the identification of persons assisting them in this respect; 6) the fact that it will
or may endanger the life or health of officers, soldiers or employees who perform
operational and exploratory activities, or persons assisting them in this respect; 7) the fact
that it will or may endanger the life or health of crown witnesses or persons closest to
them, persons who have been granted protection and assistance measures provided for in
the Act of 28 November 2014 on the protection and assistance for the victim and the
witness (Polish Journal of Laws of 2015, item 21), or witnesses referred to in Article 184
of the Act of 6 June 1997 of the Code of Criminal Proceedings, (consolidated text, Polish
Journal of Laws of 2021, item 534), or persons closest to them.
In turn, classified information is classified as “secret” if its unauthorised disclosure causes
serious damage to the Republic of Poland by: 1) making it impossible to perform tasks
related to the protection of the sovereignty or constitutional order of the Republic of
Poland; 2) deteriorating the relations of the Republic of Poland with other states or
international organisations; 3) disrupting the defence preparations of the state or the
functioning of the Armed Forces of the Republic of Poland; 4) hindering the performance
of operational and exploratory activities carried out in order to ensure the security of the
state or the pursuit of perpetrators of crimes by services or institutions authorised to do
so; 5) significantly disrupting the functioning of law enforcement agencies and judicial
authorities; 6) bringing about a considerable loss to the economic interests of the Republic
of Poland.
54
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
Classified information may also be classified as “confidential” if its unauthorised
disclosure causes damage to the Republic of Poland by: 1) hindering the current foreign
policy of the Republic of Poland; 2) hindering the implementation of defence
undertakings or adversely affecting the combat capability of the Armed Forces of the
Republic of Poland; 3) disrupting public order or endangering the security of citizens; 4)
hindering the performance of tasks by services or institutions responsible for protecting
the security or fundamental interests of the Republic of Poland; 5) hindering the
performance of tasks by services or institutions responsible for the protection of public
order, security of citizens or prosecution of perpetrators of crimes and fiscal offences, as
well as judicial authorities; 6) threatening the stability of the financial system of the
Republic of Poland; 7) adversely affecting the functioning of the national economy.
Finally, classified information is classified as “proprietary” if it has not been assigned a
higher security classification, and its unauthorised disclosure may have a harmful effect
on the performance of tasks in the field of national defence, foreign policy, public
security, observance of citizens’ rights and freedoms, judicial authorities or the economic
interests of the Republic of Poland by public authorities or other organisational units.
Classified information assigned a specific security classification should be protected in
accordance with the criteria specified in a given classification. The security classification
of documents should be assigned by the person authorised to sign them. Classified
information with a security classification may be disclosed only to an authorised person
holding an appropriate security clearance, and who had undergone training on the
protection of classified information. Information is made available only to the extent
necessary for the performance of duties on a given position. The processing of classified
information obligatorily takes place in conditions that prevent its unlawful disclosure, e.g.
in classified registry offices or other places that can meet the requirements set out in the
Act, as well as in secondary legislation, related to the physical protection and security of
ICT systems (Wojciechowska-Filipek, Ciekanowski, 2019: 200). The issue of security of
ICT systems, which is key from the point of view of information security in cyberspace,
will be discussed further below.
At this point, however, it is worth presenting the conditions for marking materials with
specific classifications, which are set out in the Regulation of the Prime Minister of 22
December 2011 on the manner of marking materials and affixing security classifications
on them (Polish Journal of Laws of 2011, No. 288, item 1692) – the Regulation is
hereinafter referred to as the RMMCL. Without going into too much detail, it is necessary
to mention several basic principles related to marking materials with security
classifications. First of all, in accordance with § 3 of the RMMCL, the material must be
marked clearly and in full with the security classification. Where different parts of the
material have been given different security classifications, or where some parts are
unclassified, the separate parts must be marked with the relevant security classification
indicated in full or with the word “unclassified”. The parts of the material containing text
or images shall be separated by appropriate marking before and after the text or images.
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
55
If different parts of the material have been given different security classifications, the
material shall be marked with a security classification at least equal to the highest security
classification given to that part of the material.
Regarding the symbols used for the individual security classifications, in accordance with
§ 4 of the RMMCL, the following symbols for security classifications apply: 1) “00” –
for “top secret” classification; 2) “0” – for “secret” classification; 3) “C” – for
“confidential” classification; 4) “P” – for “proprietary” classification. From a
cybersecurity point of view, the handling of electronic documents is particularly
important, so, for example, according to § 6 (1) of the RMMCL, an electronic document
must be marked in such a way that its specification contains the following information:
1) the security classification; 2) the letter and number reference; 3) the name of the unit
or organisational unit; 4) the document registration date; 5) in the case of a document
processed as correspondence, the indication of the addressees by stating their full names
or the names of their positions; 6) the security classifications of any annexes, together
with their registration numbers; 7) the position, full name or other indication of the person
authorised to sign the document; 8) the full name or other indication of the person
preparing the document; 9) the name given to the document or the indication of what the
document relates to.
In addition, in relation to threats to the security of classified information in cyberspace,
ICT security is extremely important. The basic requirements in this respect are set out in
the Regulation of the Prime Minister of 20 July 2011 on basic requirements for ICT
security (Polish Journal of Laws of 2011, No. 159, item 948) – the Regulation is
hereinafter referred to as the RRIS. § 5 of the RRIS states that the security of classified
information processed in an ICT system shall be ensured by implementing a consistent
set of safeguards to ensure the confidentiality, integrity and availability of that
information. This objective shall be achieved by: 1) subjecting an ICT system to the risk
management process for the security of classified information processed in the ICT
system; 2) limiting trust, consisting in treating other ICT systems as potential sources of
threats and implementing in the ICT system safeguards controlling the exchange of
information with those ICT systems; 3) implementing multi-level protection within the
ICT system, consisting in the application of safeguards on as many different levels of
organisation of protection of the ICT system as possible - in order to limit the occurrence
of cases in which a breach of a single safeguard results in a violation of the
aforementioned objective; 4) performing periodic security tests; 5) limiting
authorisations, by way of giving users of an ICT system only the authorisations necessary
to perform their work; 6) minimising functionality by way of installing, activating and
using in an ICT system only the functions, communication protocols and services
necessary for the correct performance of tasks for which the ICT system is intended.
Moreover, § 6 of the RRIS stipulates that in order to ensure protection against
unauthorised access to an ICT system: 1) the conditions and manner of assigning users
authorisations to work in an ICT system shall be determined; 2) information and materials
56
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
enabling access to an ICT system shall be protected; 3) elements of an ICT system which
are important for its security shall be protected and implemented in a manner ensuring
the possibility of detecting unauthorised changes or attempts to introduce them. Also,
according to § 7 of the RRIS, before allowing persons to work in an ICT system, the head
of an organisational unit shall ensure that they have been trained in the field of ICT
security and have been familiarised with procedures for secure operation within the scope
applicable to them. In order to prevent the loss of confidentiality of classified information
due to electromagnetic compromising emanation from system components,
electromagnetic protection measures must be applied in an ICT system processing
classified information with the “confidential” classification or above, based on the results
of a risk assessment for the security of classified information, taking into account the
recommendations.
Beyond the aforementioned, a similar approach is taken in relation to preventing the loss
of availability of classified information processed in ICT equipment as a result of
interference with its operation by means of emanation or high-power electromagnetic
pulses, by employing electromagnetic protection measures selected on the basis of the
results of a risk assessment for the security of classified information (§ 8(1) of the RRIS).
However, in order to ensure availability of resources in an ICT system, the following shall
be established: 1) principles of creating and storing backup copies; 2) procedures for
handling crisis situations, including cases of failure of ICT system components; 3)
procedures for monitoring the technical condition of an ICT system. Depending on the
needs and results of a risk assessment for the security of classified information, alternative
telecommunication links, alternative equipment or emergency power supply shall be used
in particular to ensure the availability of the resources of an ICT system (§ 9(1) of the
RRIS). Depending on the needs and the results of a risk assessment for the security of
classified information, data transmissions between ICT system components shall be
protected against detection, interception or interference.
Furthermore, the confidentiality of classified information communicated in the form of
transmission outside protection zones shall be ensured by the use of encryption devices
or tools certified in accordance with Article 50(2) of the APCI or approved under Article
50(7) of the APCI, appropriate to the security classification of the information
communicated. In particularly justified cases, taking into account the results of a risk
assessment for the security of classified information, the encryption protection measures
referred to above may be supplemented or replaced by safeguards other than encryption
(§ 10 of the RRIS). To the extent necessary to ensure review, analysis and provision of
evidence of actions violating the security of classified information, records of events shall
be created and stored for an ICT system processing classified information, and their
confidentiality, integrity and availability shall be ensured (§ 11of the RRIS). In addition,
an ICT system shall be provided with mechanisms or procedures preventing ICT security
incidents, including protection against malicious software, as well as enabling the
quickest possible detection of ICT security incidents and ensuring that appropriate
persons are immediately informed of a detected incident (§ 12 of the RRIS).
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
57
The head of the organisational unit in which classified information is processed is
responsible for the protection of classified information. He/she is charged with, in
particular, organising and ensuring the functioning of such protection. Therefore, a
classified information security officer employed by the head of the organisational unit
reports directly to the head of the organisational unit and is tasked with ensuring
compliance with the provisions on the protection of classified information. Such officers
are required to have: 1) Polish citizenship; 2) higher education; 3) an appropriate security
clearance issued by the Internal Security Agency (ISA) or the Military
Counterintelligence Service (MCS), as well as by the former Office for State Protection
or the former Military Information Services; 4) a certificate of classified information
protection training conducted by the ISA or the MCS, as well as by the former Military
Information Services. The head of the organisational unit may also employ a deputy or
deputies of the security officer, provided that such persons fulfil the conditions referred
to above (Article 14(1) to (4) of the APCI).
On the national level, the ISA and the MCS perform a special role in the protection of
classified information. As provided for in Article 10(1) of the APCI, the ISA and the MCS
supervising the functioning of the classified information protection system in
organisational units within their competence set out in the aforementioned act: 1) control
the protection of classified information and the observance of the provisions in force in
this respect; 2) perform tasks in the field of security of ICT systems; 3) conduct verifying
proceedings, control verifying proceedings and industrial security proceedings; 4) ensure
the protection of classified information exchanged between the Republic of Poland and
other states or international organisations; 5) provide advisory services and conduct
training in the protection of classified information. The Head of the ISA performs the
function of a national security authority and, to the extent necessary for the performance
of this function, the Head of the ISA or officers of the ISA authorised by him, and the
Head of the MCS or soldiers or officers of the MCS authorised by him have the right to:
1) inspect documents relating to the protection of international classified information; 2)
enter premises and facilities intended for the processing of international classified
information; 3) access ICT systems intended for the processing of international classified
information; 4) obtain explanations and information relating to the protection of
international classified information (Article 11(1) to (4) of the APCI).
4
Conclusion
Cybersecurity, and the security of classified information, becomes all the more important,
the more we realise that today actions below the threshold of war are and will continue to
be an important policy measure, enabling both state and non-state actors to achieve their
objectives. Therefore, information security in cyberspace is now becoming one of the key
areas of national security, both in relation to the structures of the state, its citizens and
their activities. This is, of course, among others, a consequence of the rapid progress in
digital technologies, which is at the same time a challenge for the state, which is forced
58
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
to join the technological race in this area (National Security Strategy of the Republic of
Poland, 2020: 7-8). Accordingly, the importance of cyberspace for the functioning of the
state needs to be constantly emphasised, as actions taken in cyberspace have a direct
impact on all key components of the state, and threats to the security of classified
information are particularly serious in this respect and should be given increased attention
(Biernacik, 2018: 13). It seems that awareness of these threats and of the damage that
may be caused as a result of the unauthorised disclosure of classified information is
growing, among those in power and among public administration employees, but also
among average citizens. However, without appropriate knowledge in this area, strict
observance of procedures, as well as adequate ICT infrastructure, we will continue to be
exposed to a real danger resulting from activities taking place in cyberspace, because
nowadays, and probably even more so in the future, both dimensions, the real and the
virtual, are and will remain in an even greater and closer relationship.
References:
Biernacik, B. (2018) Nauka i najnowsze narzędzia informatyczne w służbie bezpieczeństwa
cyberprzestrzeni – piątego wymiaru walki zbrojnej, In: Roman, Ł., Krassowski, K., Sagan, S. &
Wróblewski, D. (eds) Wykorzystanie nowoczesnych narzędzi informatycznych w identyfikacji
zagrożeń (Józefów: Wydawnictwo Wyższej Szkoły Gospodarki Euroregionalnej im. Alcide De
Gasperi w Józefowie), pp. 9-39.
Bojarski, K. (2017) Współdziałanie administracji publicznej z organizacjami pozarządowymi w
sferze bezpieczeństwa wewnętrznego w ujęciu administracyjno-prawnym (Warszawa-Nisko:
Wydawnictwo Wyższej Szkoły Bezpieczeństwa i Ochrony im. Marszałka Józefa Piłsudskiego w
Warszawie).
Cyfrowa Polska (2019) Cyberbezpieczeństwo w Polsce: ochrona urządzeń końcowych przed
cyberatakami. Analiza sytuacji i rekomendacje działań (Warszawa), available at:
https://cyfrowapolska.org/wpcontent/uploads/2019/01/Raport_cyberbezpiecze%C5%84stwo_2019.pdf (April 12, 2022).
Górka, M. (2018) Cyberbezpieczeństwo jako wyzwania dla państwa i społeczeństwa, In:
Dębowski, T. (ed.) Cyberbezpieczeństwo wyzwaniem XXI wieku (Łódź-Wrocław: ArchaeAgraph
Wydawnictwo Naukowe), pp. 31-50.
Grabowski, M. & Zając, A. (2009) Dane, informacja, wiedza – próba definicji, Zeszyty Naukowe
Uniwersytetu Ekonomicznego w Krakowie, 798, pp. 99-116.
Kowalewski, J. & Kowalewski, M. (2014) Cyberterroryzm szczególnym zagrożeniem
bezpieczeństwa państwa, Telekomunikacja i Techniki Informacyjne, 1-2, pp. 24-32.
Krztoń, W. (2015) XXI wiek – wiekiem społeczeństwa informacyjnego, Modern Management
Review, 3, pp. 101-112.
Machura, E. (2013) Informacja i jej znaczenie we współczesnym świecie w kontekście ochrony
informacji niejawnych w Polsce, Obronność – Zeszyty Naukowe Wydziału Zarządzania i
Dowodzenia Akademii Obrony Narodowej, 1, pp. 155-167.
Marczyk, M. (2018) Cyberprzestrzeń jako nowy wymiar aktywności człowieka – analiza pojęciowa
obszaru, Przegląd Teleinformatyczny, 1-2, pp. 59-72.
Słownik języka polskiego, available at: https://sjp.pwn.pl/sjp/informacja;2466189.html (April 12,
2022).
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Bojarski: Information Protection in Cyberspace a Factor in National Security
59
Strategia Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej (2020), available at:
https://www.bbn.gov.pl/ftp/dokumenty/Strategia_Bezpieczenstwa_Narodowego_RP_2020.pdf
(April 12, 2022).
Cybersecurity Strategy for 2019-2024 (Official Gazette of 2019, item 1037).
Wasilewski, J. (2013) Zarys definicji cyberprzestrzeni, Przegląd Bezpieczeństwa Wewnętrznego, 5,
pp. 225-234.
Wojciechowska-Filipek, S. & Ciekanowski, Z. (2019) Bepieczeństwo funkcjonowania w
cyberprzestrzeni: jednostki-organizacji-państwa (Warszawa: CeDeWu).
60
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Challenges for State Security in the Context of Big Data
Analysis
JUSTYNA KUREK
1
Abstract The information society is based on constant access to
information. The state also performs its tasks with the use of various
information databases and information resources of unstructured nature.
These resources include information of personal nature, although, notably,
personal data is often only a supplementary element, not constituting the
main resource being the focus of attention of the state. New tools, such as
big data analysis tools, generate additional obligations in the sphere of
information security and protection. The author of this paper makes an
attempt to identify the potential threats and problems related to the use of
big data tools for the processing of information resources of the state,
notably, in the context of "incidental" processing of personal data using big
data methods. The objective is primarily to draw attention to the specific
risks posed by the loss of control over data by the state and the related
security implications.
Keywords: • big data • state security • public registers
CORRESPONDENCE ADDRESS: Justyna Kurek, Ph.D., dr. habil., Associate Professor, War Studies University,
Faculty of National Security, Department of Political Security, Aleja Generała Antoniego Chruściela „Montera”
103, 00-910 Warsaw, Poland, e-mail:
[email protected], ORCID: 0000-0002-8754-5243.
https://doi.org/10.4335/2022.1.6
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
62
1
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
Introduction
Today’s information society is built upon having constant, secure access to the
information that is necessary both in professional and private life (Yukins, 2004:668).
Beyond the search for information, the ability to cope with its overflow and the need to
select useful connections becomes a challenge (Vertinsky, Rice, 2002). The state
performs its tasks with the use of various information databases and information resources
of unstructured nature. These resources contain information of personal nature, although,
notably, personal data is often only a supplementary element, not constituting the main
resource being the focus of attention of the state. This situation is well illustrated by the
examples found within certain national registers run by Polish authorities, e.g. the
Register of Entrepreneurs of the National Court Register and the register gathering
information about real properties – the centralised Land and Mortgage Register. There is
also a noticeable trend in the evolution of the information resources being managed by
public institutions towards broadening them by tapping into unstructured resources,
which, more and more often, are created through Internet communication. These
resources contain personal data processed by the state and its authorities that are often of
sensitive nature.
Under these conditions, which are necessitated by de facto continuous data analysis,
information management mechanisms and technologies, including big data analysis, are
of particular importance. These new tools provide effective support in the implementation
of tasks in the area of state and national security, generating, however, additional
obligations in the sphere of security and protection of information (Kurek, 2021: 122).
The author of this paper makes an attempt to identify the potential threats and problems
related to the use of big data tools for the processing of the information resources of the
state, in particular, in the context of "incidental" processing of personal data using big
data methods. The assumption is primarily to draw attention to the specific risks posed
by the loss of control over data by the state and the related security implications.
2
Big data phenomenon and big data analysis methods
The big data phenomenon is often described as the adoption of new technologies or the
application of a set of new technical tools that facilitate data collection and mathematical
analysis using traditional statistical methods, as well as more innovative analytical
approaches. However, the source literature notes that this view may not fully capture the
nature of the phenomenon, especially its power and uniqueness (Mayer-Schönberger,
Padovao, 2016: 318). Big data opens up a new perspective on reality. V. MayerSchönberger and K. Cukier figuratively define big data processes as "enabling data to
speak" (Mayer-Schönberger, Cukier, 2014: 9), while I.S. Rubinstein perceives the big
data phenomenon in terms of "steroidally" stimulated data mining processes (Rubinstein,
2013: 76). There is no consensus among legal commentators on the definition and key
characteristics of this phenomenon. Certainly, it should be evaluated dynamically
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
63
because technological development and new applications significantly affect its
understanding and distinguish it from other forms of data analysis (Broeders, Schrijvers,
Sloot, Brakel, Hoog, Hirsch, 2017: 310).
It is common to draw attention to three defining qualities figuratively referred to by
English language legal commentators as the 3Vs – Volume, Variety and Velocity (Klous,
Sustainable, 2016: 27-47). Big data volumes are thus characterised by three basic
qualities. The first one is mass availability of data – collected not only from online
sources, but also through mobile devices equipped with localisation services and
numerous data distribution applications, as well as information from objects equipped
with artificial intelligence (Internet of Things) (Hildebrandt 2012: 45-46). The second
quality is the use of high speed processing devices and data transfer to achieve cheap and
efficient data processing. This analysis more and more often additionally uses the cloud
computing model. The third quality is the use of new computing frameworks to collect
and analyse massive volumes of data (Rubinstein: 2013: 74). This model can be further
complemented by a fourth V (Value) referring to data value (Szafranski, 2015: 11).
Big data processes have undoubtedly changed the face of data analysis, certainly
representing a new model of information management in both business and organisational
aspects. Indeed, data can be reused for purposes other than the purpose of its original
collection. Moreover, data value can be increased not only through new collection and
analysis processes, but also by linking data with data from other sources (Kurek, 2021:
126). Data mining also facilitates discovery or inference of previously unknown facts and
patterns from the database.
While in the traditional view, data value was manifested in its collection and single use
for a specific purpose, big data processes have introduced a revolution, according to
which the informational value of data is unclear at the time of their collection (MayerSchönberger, Padovao, 2016: 319).
3
Databases in the service of state security
The state and its authorities are the keepers of numerous databases, and most public
registers are kept in this form. As M. Kiedrowicz noted in his research, in 2015, according
to various sources, the number of registers and records kept in Poland, ranged from 600
to 3000. The scope of information that is collected, stored, processed and further made
available by them is vast (Kiedrowicz, 2015: 30). However, this is mostly structured data.
It is noted, however, that only 15% of all information produced by humanity is structured
and suitable for processing using relational database methods and tools. The remaining
85% constitutes a large 'reservoir of data', whose informational content is undoubtedly
invaluable, but due to its unstructured nature, is unsuitable for processing in an organised
manner (Dygaszewicz, 2015: 49). Its re-analysis and use by public authorities is only
possible due to the potential of big data technology, which facilitates re-organisation and
64
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
re-analysis of resources for the purpose of obtaining information, the potential of which
was not originally envisaged.
The use of big data analysis for the performance of the tasks in the area of state and
national security is a major challenge currently faced by state authorities. These
challenges are of both organisational and legal nature. Having regard to the principle of
legalism, the state authorities may act only within and under the law, therefore, without
an appropriate legal basis; they may not process data for purposes other than those for
which they were collected. Moreover, the very process of data collection requires an
adequate legal basis. Taking into account the fact that in the case of big data processes,
the purpose of data use is de facto not known at the moment the data comes into
possession, the processing of big data may pose particular challenges for public
authorities (Kurek, 2021: 138).
It is, therefore, difficult to organise the protection of information in a preventive manner
if the way it will be used and linked to other data is not fully known. A key element of
data and information management policy at the initial stage of the legislator's decision to
create a relevant resource and database (in particular, one that contains personal
information) should be proper risk analysis. Such analysis should include both an in-depth
reflection on the processes connected with processing, safety of collection and sharing of
data, but also on the security of data sets, so that in case of losing control over given data,
it cannot be easily used or manipulated.
Structured data aggregated into a relational database pose a huge challenge in the sphere
of security. It is insufficient from the security point of view to concentrate only on the
external layer and on securing only entry to the system. Breaching the external security
protecting against all forms of unauthorised access may be just a matter of proper
combination of queries to the database and de facto be a security bypass, not a security
breach. A perfect example is the bypass of security protecting the land and mortgage
register resource, which took place several years ago. The only real security of this system
protecting against an automatic takeover of the resource by means of automatic queries
is the CAPTCHA mechanism, which de facto does not generate protection against
automated access (Ahn, Blum, Langfords, 2004: 57-60).
4
The casus of re-use of land and mortgage register data
The risks for state security and privacy are perfectly illustrated by the example of re-use
of the data in the Land and Mortgage Register. An entity having its registered office in
the Seychelles collected and indexed information from over twenty million land and
mortgage registers (Gryszczyńska, 2017: 298). This procedure was possible even though,
theoretically, public access to land and mortgage registers is possible only through one
search criterion – the land and mortgage register number. The collection of the specified
resource was not the outcome of obtaining the unique numbers of over twenty million
land and mortgage registers, nor of breaking the security measures and obtaining data in
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
65
an illegal manner. The entity that collected the specified information did so by working
out how the land and mortgage register numbers were constructed.
It should be noted that the register number consists of three predefined elements: a court
district code (to be selected from a list), a specific number consisting solely of digits and
a checksum between 0 and 9. Taking into account the limited number of specific numbers
and knowledge of the two additional elements of the register number, created for the
purpose of database queries and obtaining information, a list of potential numbers of land
and mortgage registers was easy to generate. It was therefore relatively easy to extract the
structured data and re-enter it into databases managed by another entity and to apply
additional search criteria (e.g. real property address, plot registration number, owner's
name, existence or not of mortgage encumbrances). This way, through the re-use of public
information, it was possible to build a system facilitating extraction of information about
owners of specific real properties or to simply obtain information about mortgage
encumbrances and the amount of loans with which a given real property has been
financed. This information could be easily used for criminal purposes and might be an
excellent source of information for criminals, as noted in available studies on this subject
(https://www.rp.pl/artykul/988227-Ksiegi-wieczyste--wyciekly-dane-o--16-milionachhipotek-w-Polsce.html).
This generates not only the risk for the privacy and security of specific individuals, but
also for the state and its authorities, which, as one of their key objectives, ensure security
to its citizens, as well as all persons and property on their territory. Land and mortgage
registers contain information on the property and possessions of key people in the state.
The address data provided in the system also facilitate a potential identification of the
place of residence of the key persons in the state.
Extracting the information in question was not the outcome of a criminal offence or a
breach of security, nor was it the outcome of unlawful entry into possession of statemanaged information. It was the outcome of security bypass and re-use of public
information in accordance with the law in force. The structuring of the data only
facilitated the reprocessing. One could wonder whether in this situation it is possible to
speak of an abuse of right in the meaning of Article 5 of the Civil Code, i.e. the use of a
subjective right (the right to re-use public information) contrary to its socio-economic
purpose or principles of community life. In my opinion, such interpretation is too farreaching and de facto annihilates the political objective of the institution of re-use of
public information.
Of course, the question should be asked whether meeting the objective of openness of
land and mortgage registers required such a form of access to data and their full
centralisation, as it was done by the Polish legislator, who decided to fully digitalise and
centralise public registers. It is worth mentioning the examples from, for instance,
Germany, where obtaining an extract from the land and mortgage register is done through
the portal of justice (www.justiz-portal.de). In Germany, data sets were not centralised
66
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
and there is not just one database. The website, referred to above, only contains links to
the portals maintained in individual states (Länder). Access groups and gradation of
access rights have also been introduced. For example, unconditional and full access is
granted to notaries and real estate institutions (insurers, banking institutions,
administrative offices, courts). For others, access is possible but only upon fulfilment of
access conditions and, in some cases, upon payment of a symbolic fee.
Perhaps in Poland we should also think of decentralisation of registered data sets, by way
of consolidation of the same through common links. It is also worth considering whether
the information should not be managed in the form of a database system or if it would be
sufficient to make it available in a form aggregated to a closed pdf format with protection
against copying. One could also set a question if, from a security point of view, the
procedure for numbering of the register should not be re-established, so that they are
numbered at random rather than according to a template. Perhaps the difficulty of working
with such a system and managing such data would not outweigh the gain in information
security.
It is also worth asking if at least some of the personal data included in the public resource
should not be anonymised or hidden. From the point of view of security of the conduct of
legal transactions, information that is truly important is the mortgage collateral, but the
information about the value of the collateral could be available only to entities having
legal interest in obtaining such information. Indeed, from the point of view of state
security, security measures and access levels may play two functions: on the one hand,
they facilitate the control of information managed by the state, on the other hand, they
introduce the control of access and make it possible to record the recipients of
information.
Public access to data in the land and mortgage register also implies the use, in the conduct
of legal transactions (with the legislator’s consent), of extracts from the register made
individually in an unauthorised manner. The practice is that extracts from the register are
made personally by the parties to a legal transaction and attached to the documentation.
When unauthorised sets of information are created using reprocessed public information,
there is also a risk that extracts from such private databases will be made and submitted
instead of extracts from public registers. In the case of such private database systems, the
consolidation of information and its accuracy is not covered by the public quality
guarantee in the form of, in the case at hand, the warranty of public credibility of land
registers.
5
Conclusion
As perfectly illustrated by the example of the processing of land and mortgage register
data in the Seychelles, unauthorised re-use of personal data by a data controller reveals a
completely new potential of data abuse. This often implies a serious security risk for
persons whose data is – even incidentally – processed. Therefore, one should ask if the
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
67
potential of using big data tools outweighs the threats and challenges for state security
posed by consolidation and integration of data of various provenance in terms of big data.
In practice, loss of control over data and security threats do not necessarily result from
illegal access to information. They are often the result of lawful use of public information
in the mode of re-use of public information for a purpose other than the purpose of its
extraction. Hence, when it comes to information management, particularly in the era of
big data analysis, risk analysis is crucial. This applies across the board to those processes
where the data potential is unknown to the data controller at the outset. Effective
information security management requires preventive measures, and, just as in war, the
greatest success is to defeat the enemy without a fight, so in the case of information
security the most important issue is to effectively predict and counteract the risks. The
revealed loopholes in the system, which result from legal regulations, on the one hand,
and from the possibility to implement them, on the other hand, indicate that the lack of
risk analysis and adequate data and information processing security may result in the risk
of losing control over data exceeding the advantages related to the potential of big data
and data consolidation from various resources.
References:
Ahn, L., Blum, M. & Langfords, J. (2004) Telling Humans and Computers Apart Automatically,
Communications of the ACM, 47(2), pp. 56-60.
Broeders, D., Schrijvers, E., Sloot, B., Brakel, R., Hoog, J. & Hirsch, E. (2017) Big Data and
Security Policies: Towards a Framework for Regulating the Phases of Analytics and Use of Big
Data, Computer Law & Security Review, 33(3), pp. 308-323.
Dygaszewicz, J. (2015) Big data w statystyce publicznej, In: Szpor, G. (ed.) Internet. Publiczne
bazy danych i Big Data (Warszawa: C.H.Beck), pp. 49-63.
Gryszczyńska, A. (2017) Nowe zagrożenia rejestru ksiąg wieczystych, In: Szpor, G. &
Gryszczyńska, A. (eds.) Internet. Strategie bezpieczeństwa (Warsaw: C.H.Beck), pp. 293-310.
Hildebrandt, M. (2012) The Dawn of a Critical Transparency Right for the Profiling Era, In: Bus,
J., Crompton, M., Hildebrandt, M. & Metakides, G. (eds.) Digital Enlightenment Yearbook
(Amsterdam: IOS Press), pp. 41-56.
Kiedrowicz, M. (2015) Dostęp do publicznych zasobów danych. Big data czy big brother, In: Szpor,
G. (ed.) Internet. Publiczne bazy danych i Big Data (Warszawa: C.H.Beck), pp. 15-41.
Kurek, J. (2021) Bezpieczeństwo państwa w warunkach hybrydowej regulacji danych osobowych
w dobie analizy Big data. Aspekty prawne, organizacyjne i systemowe (Warszawa: ASzWoj).
Mayer-Schönberger, V. & Cukier, K. (2014) Learning with big data (Boston-NewYork: Houghton
Mifflin Harcourt Publishing Company).
Mayer-Schönberger, V. & Padovao, Y. (2016) Regime Change? Enabling Big Data through
Europe's New Data Protection Regulation, The Columbia Science and Technology Law Review,
17(2), pp. 317-334.
Rubinstein, I.S. (2013) Big Data: The End of Privacy or a New Beginning?, International Data
Privacy Law, 3(2), pp. 74-87.
Szafrański, B. (2015) Realizacja zadań publicznych a Big data, In: Szpor, G. (ed.) Internet. Public
databases and Big Data (Warszawa: C.H.Beck), pp. 3-15.
68
THE PUBLIC DIMENSION OF CYBERSECURITY
J. Kurek: Challenges for State Security in the Context of Big Data Analysis
Vertinsky, L. & Rice, T.M.. (2002) Thinking about Thinking Machines: Implications of Machine
Inventors for Patent Law, Boston University Journal of Science and Technology Law, 2, pp. 574613.
Yukins, C.R. (2004) Making Federal Information Technology Accessible: A Case Study in Social
Policy and Procurement, Public Contract Law Journal, 33(4), pp. 667-725.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
The Competence of the Internal Security Agency in
Protecting the Security of Communication and
Information Systems and Networks of Public
Administration Authorities
MIROSŁAW KARPIUK
1
Abstract The Internal Security Agency (ISA), which is one of Poland’s
special services, has competence over matters entailing the protection of
the state's internal security and its constitutional order. Its tasks include the
identification, prevention and combating of threats to the internal security
of the state and its constitutional order, in particular those affecting the
sovereignty and international status of the state, its independence and
inviolability of state borders, as well as the state defence capabilities. The
ISA is also obligated to protect the security of communication and
information systems of public administration authorities that are significant
for the continuity of state functioning, and/or the system of ICT networks
which are included in the uniform list of facilities, installations, devices and
services which comprise critical infrastructure. Cyberspace is one of the
areas of operations pursued by this civil intelligence service, where its task
is to protect communication and information systems of primary
significance to the functioning of public administration within the
framework of state structures.
Keywords: • special services • cybersecurity • communication and
information systems • ICT networks • public administration
CORRESPONDENCE ADDRESS: Mirosław Karpiuk, PhD., Prof. Dr. Habil., Full Professor, University of Warmia
and Mazury in Olsztyn, Faculty of Law and Administration, Department of Administrative Law and Security
Sciences, ul. Obitza 1, 10-725 Olsztyn, Poland, e-mail:
[email protected], ORCID: 0000-00017012-8999.
https://doi.org/10.4335/2022.1.7
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
70
1
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the Security
of Communication and Information Systems and Networks of Public Administration
Authorities
Introduction
Communication and information systems and networks are exposed to cyber-attacks, so
the telecommunications infrastructure should be continuously protected in order to
prevent such threats. The Internal Security Agency (ISA) has the obligation to provide
such protection. The competence of the ISA in respect of identifying, preventing and
combating threats to the security of communication and information systems of public
administration authorities is falls within the domain of cybersecurity. The tasks of this
special service include the provision of security in cyberspace. Cyberspace is understood
as a space for the processing and exchange of information, comprised of communication
and information systems, including the links between them and their relations with users
(Chałubińska-Jentkiewicz, Karpiuk, Kostrubiec, 2021: 1).
The challenges posed by the new digital era have compelled public administration
authorities to introduce changes (Hoffman, Cseh, 2020: 210). Contemporary public
administration acts on the basis of communication and information systems and networks
that need to be properly protected against cyber-attacks. The role of the state is to ensure
cybersecurity within public institutions. The National Cybersecurity System Act of 5 July
2018 (consolidated text, Polish Journal of Laws of 2020, item 1369, as amended), as per
Article 2(4), defines cybersecurity as the resilience of information systems against
operations that compromise the availability, authenticity, integrity and confidentiality of
processed data, or the related services offered by those information systems.
Cybersecurity constitutes a specialised security system component that covers the
protection of information systems against threats (Czuryk, 2019: 42).
2
The competence of the Internal Security Agency in cybersecurity
The Internal Security Agency (ISA) is a civil special service which has, like other special
forces, competence over security affairs (Bożek, Czuryk, Karpiuk, Kostrubiec, 2014: 43).
It was established to protect the internal security of the state and its constitutional order.
This competence arises from the provisions of Article 1 of the Act of 24 May 2002 on the
Internal Security Agency and the Foreign Intelligence Agency (consolidated text, Polish
Journal of Laws of 2020, item 27, as amended) – further referred to as “the AISA”. This
general competence of the ISA also encompasses the provision of cybersecurity in public
administration through the protection of communication and information systems and
networks operated by public administration. The statutory responsibilities of the ISA
include the identification, prevention and investigation of threats to the security of
communication and information systems of public administration authorities that are
significant for the continuity of state functioning, and/or ICT networks that are included
in the uniform list of facilities, installations, devices and services which comprise critical
infrastructure, as well as the communication and information systems belonging to the
owners or holders of critical infrastructure facilities, installations and devices, as
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the
Security of Communication and Information Systems and Networks of Public
Administration Authorities
71
expressly laid down in Article 5(1)(2a) of the AISA. In line with the definition set out in
Article 2(3) of the Act of 18 July 2002 on the Provision of Services by Electronic Means
(consolidated text, Polish Journal of Laws of 2020, item 344, as amended), a
communication and information system is a set of cooperating IT hardware and software
providing the capability to process and store, as well as send and receive, data via ICT
networks with the use of telecommunications terminal equipment suitable for a given
network type. Under Article 2(43) of the Telecommunications Law of 16 July 2004
(consolidated text, Polish Journal of Laws of 2021, item 576, as amended)
telecommunications terminal equipment is understood as telecommunications devices
intended for direct or indirect connection with network termination points. An ICT
network includes software operated by the devices that have access to it, allowing users
to browse, create, disseminate and exchange data and information (digital content) as part
of network access (Chałubińska-Jentkiewicz, 2019: 132). Critical infrastructure is
understood as systems and functionally linked facilities forming part of the systems,
including buildings, devices, installations, essential services of key importance to the
security of the state and its citizens, and services intended to provide efficient operations
of public administration authorities, institutions and enterprises - Article 3(2) of the Crisis
Management Act of 26 April 2007 (consolidated text, Polish Journal of Laws of 2020,
item 1856, as amended), hereinafter “the CMA”.
3
The assessment of the security of communication and information systems
of public administration authorities that are significant for the continuity of state
functioning
Due to the need to ensure cybersecurity in public administration, as per Article 32a(1) of
the AISA, the ISA is obliged to assess the security of communication and information
systems and networks. This is undertaken with a view to preventing, counteracting and
combating terrorist incidents that may affect the communication and information systems
of public administration authorities that are significant for the continuity of state
functioning, and/or ICT networks which are included in the uniform list of facilities,
installations, devices, and services that comprise critical infrastructure, as well as the
communication and information systems belonging to the owners, owner-like possessors
or lessees of critical infrastructure facilities, installations and devices, or of the data
processed in the said systems. The ISA is also compelled to prevent and investigate
terrorist offences affecting this sphere, and to prosecute the perpetrators of such offences.
To these ends, the ISA may assess the security of these communication and information
systems. This last is not an obligation on the part of this special service, but a power that
it should, nonetheless, exercise where a terrorist threat occurs. As stipulated in Article
5b(7)(1) of the CMA, the Head of the Government Centre for Security, in collaboration
with competent ministers, prepares a uniform list of facilities, installations, devices and
services which comprise critical infrastructure, divided by systems, and classified. It also
includes European critical infrastructure located on the territory of the Republic of
72
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the Security
of Communication and Information Systems and Networks of Public Administration
Authorities
Poland, and European critical infrastructure located on the territories of other EU Member
States that might have a significant impact on Poland. The list is classified.
The objectives of the assessment of communication and information systems of public
administration authorities are to prevent, counteract and combat terrorist incidents, and to
prevent and investigate terrorist offences affecting this sphere, and prosecute their
perpetrators. Under Article 2(7) of the Act of 10 June 2016 on Counter-Terrorism
Measures (consolidated text, Polish Journal of Laws of 2019, item 796, as amended) a
terrorist incident is understood as a situation where there is a suspicion that such incident
has occurred as a result of a terrorist offence, or where a threat of such offence has been
identified. In turn, a terrorist offence is a prohibited act subject to imprisonment with the
upper sentence limit of at least 5 years, committed with the aim of seriously intimidating
a population, unduly compelling a public authority of the Republic of Poland or another
state Government or international organisation to perform or abstain from performing an
act, or seriously destabilising or destroying the structures or the economy of the Republic
of Poland, another state or an international organisation, or a threat of committing such
act, as stipulated in Article 115 § 20 of the Act of 6 June 1997 – the Penal Code
(consolidated text, Polish Journal of Laws of 2020, item 1444, as amended), hereinafter
“the PC”.
Pursuant to Article 32a(2) of the AISA, the assessment of the security of communication
information systems and networks is performed in line with the annual security
assessment plan, prepared by 30 September in the preceding year by the Head of ISA, in
consultation with the minister in charge of computerisation. Where justifiable, the
security assessment may be performed even if it has not been included in the plan.
Planning, including with regard to cyberspace, facilitates coordinated measures allowing
a proper, timely and balanced performance of tasks assigned to public administration in
a well-organised and uninterrupted manner (Karpiuk, 2021: 46). As a rule, the annual
plan is the basis for performing the assessment of the security of communication and
information systems. The plan is the outcome of cooperation between the Head of ISA
(as a central government administration body) and the minister in charge of
computerisation (responsible for managing an administration department which entails
matters related to communication and information systems and networks of public
administration). The cooperation assumes a specific form, i.e., consultation.
The ISA informs the entity managing a given communication and information system that
the system is to be included in the annual security assessment plan. This information
obligation is imposed under Article 32a(3) of the AISA. The information concerning the
date and range of security tests to be performed allows a proper preparation for
assessment, including certain restrictions on the performance of public tasks by the
administration body whose communication and information system is to be tested.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the
Security of Communication and Information Systems and Networks of Public
Administration Authorities
73
As per § 4(1) of the Regulation of the Council of Ministers of 19 July 2016 on the
performance of security assessment in relation to preventing terrorist incidents (Polish
Journal of Laws of 2016, item 1076), hereinafter “the SAR”, prior to security assessment,
the ISA requests the entity which manages the system concerned to provide information
about the system, which may include: 1) system architecture (system architecture is a
description of the components of a communication and information system or an ICT
network, and their links and relationships to each other), including information on the
hardware forming part of the system infrastructure; 2) IP addressing of the system's
network infrastructure; 3) information on the current backup copy and the rules of its
update, 4) definition of the required system recovery time based on the backup copy; 5)
information on the test environment and its range, 6) ICT security features, 7) system
security procedures, 8) details of the person appointed by the system managing entity to
contact the ISA during the security assessment on an ongoing basis, and 9) details of the
person authorised to represent the system managing entity. Given the objective to be
achieved by the assessment of the security of communication and information systems of
public administration authorities, i.e. counteracting terrorism, the information requested
by the ISA should be provided. The information about communication and information
systems disclosed to the ISA allow it to perform a full security assessment.
Pursuant to Article 32a(4) of the AISA, security assessment involves security tests on a
communication and information system with a view to identifying vulnerabilities,
understood as weak points of resources or a security features in a communication and
information system which may be used by a threat source and affect the integrity,
confidentiality, accountability, and accessibility of the system. Improper security of a
communication and information system of a public administration authority might result
in its disrupted operations. Cyberthreats can lead to disruptions in the functioning of
public institutions, which directly affects their security.
Security assessments are performed in line with the minimisation principle. Pursuant to
the provisions of Article 32a(5) of the AISA, the ISA should perform the assessment
subject to the principle of minimising the interruptions in system operations, or its
restricted availability, and may not result in irreparable damage to data processed in the
communication and information system undergoing assessment. In turn, as per Article
32a(6) of the AISA, in order to minimise the adverse effects of security assessments, the
ISA consults the framework conditions for conducting such assessment with a relevant
public administration authority, in particular, the commencement date, the schedule, as
well as the range and type of security tests performed as part of the assessment. The
performance of security assessment may not hinder, or significantly restrict the operations
of the public administration authority that is obliged to ensure the continued performance
of its tasks. Public affairs must be arranged in an uninterrupted manner, and therefore
security assessment cannot be a reason for closing a given office (or its individual
organisational units), being a subsidiary entity of a public administration body, if it
74
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the Security
of Communication and Information Systems and Networks of Public Administration
Authorities
becomes impossible to use its communication and information system for an extended
period of time. Interference with the operations of a communication and information
system of a public administration authority cannot be excessive. It should not result in
permanent damage to the data processed in the system, which is required for the tasks
performed by such authority.
Under Article 32a(7) of the AISA, the legislators provided the ISA with a possibility to
develop or acquire computer hardware or software, and use it to determine the
vulnerability of the system being assessed to the risk of the commission of an offence
which: 1) results in the endangerment to the lives and health of a large population or
property of a significant size, by blocking, or otherwise affecting automatic processing,
collection or transmission of IT data (Article 165 § 1(4) of the PC; 2) includes the fixture
and/or use of an eavesdropping device, visual device or other type of device or software
with a view to obtaining unauthorised access to information (Article 237 § 3 of the PC).
This provision penalises the interception of computer data during transmission
(Radoniewicz, 2019: 203); 3) includes unauthorised destruction, damage, deletion,
change and/or obstructed access to IT data, or significant disruption or prevention of the
automatic processing, storage and/or transmission of such data - including activities
causing significant damage (Article 268a § 1-2 of the PC; 4) includes the destruction,
damage, deletion and/or change of IT data of significant importance to the state defence
capabilities, security in communication, the functioning of public administration, other
state bodies or local government institutions, or the disruption or prevention of the
automatic processing, storage and/or transmission of such data – by destroying or
replacing a computer storage medium, or by destroying or damaging a device used for
the automated processing, storage and/or transmission of IT data (Article 269 § 2 of the
PC); 5) includes a significant disruption of the operation of an IT system, a
communication and information system and/or an ICT network, through the transmission,
destruction, deletion, damage, obstructed access and/or change of IT data, without being
authorised to do so (Article 269a of the PC). The analysed provision (Article 32a(7) of
the AISA) constitutes a justification (Opaliński, Rogalski, Szustakiewicz, 2017: 150).
The activities performed as part of security assessment are defined in § 3(1) of the SAR
and they include: 1) passive data collection – collecting online information related to the
functioning of the system with impact on its security, 2) semi-passive data collection –
collecting information in the system to identify data related to the functioning of the
system with impact on its security, in line with the rules applicable to system users,
excluding actions which require authentication in the system. These activities may be
supplemented by collecting information arising from system architecture analysis; 3)
active data collection – collecting information in the system to identify data related to the
functioning of the system with impact on its security, using a method which goes beyond
the authorisations of a system user, including actions which require authentication in the
system, in particular, actions consisting in the enumeration of services, ports, detection
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the
Security of Communication and Information Systems and Networks of Public
Administration Authorities
75
of intermediate devices, the detection of IDS/IPS and firewalls; 4) the identification of
vulnerabilities in system architecture and web services – undertaking measures aimed at
identifying vulnerabilities to threats based on the collected information about system
architecture, provided by the system managing entity.
The information obtained by the ISA in the course of security assessment constitute
confidential information protected by law and as such may not be used for the
performance of other statutory tasks entrusted to the ISA, and it is subject to immediate
destruction in the presence of a committee which draws up minutes of the said action.
This obligation is imposed under Article 32a(9) of the AISA. The Head of ISA orders
that the materials be destroyed immediately upon the completion of security assessment.
He/she appoints three committee members taking part in the destruction of materials. The
committee is composed only of officers who are members of the ISA organisational unit
that performs the security assessment. The materials must be destroyed through: 1)
permanent removal of information recorded on computer storage media or their copies on
which the information has been saved, in a way which makes it impossible to recover the
contents of the recorded data; 2) physical destruction of materials and documents drawn
up on their basis, with the use of a shredding device, in a way which makes it impossible
to read the contents. The above rules are stipulated in §§ 2 and 3 of the Regulation of the
Prime Minister of 18 July 2016 on the methods of destroying materials containing
information obtained in the course of security assessment performed by the Internal
Security Agency, and on the templates of the required documentation (Polish Journal of
Laws of 2016, Item 1055).
If it is found that a terrorist incident has occurred in respect of communication and
information systems of public administration authorities that are significant for the
continuity of state functioning, The Head of ISA, under Article 32b(1) of the AISA, may
request the system managing entity to provide information about the design, functioning,
and operating principles of the communication and information systems in their
possession, including information on computer passwords, access codes and other data
enabling access to the system and its use, with a view to preventing and responding to
terrorist incidents affecting such systems, and to preventing and investigating terrorist
offences in this sphere, and prosecuting their perpetrators. The information is required for
the ISA’s performance of its statutory tasks. Pursuant to Article 32b(1) of the AISA, the
information is subject to protection as stipulated in the provisions governing the
protection of classified information, and may only be disclosed to ISA officers who run
investigative operations as part of the given proceedings, and to their superiors who are
authorised to supervise the said activities. As per Article 1(1) of the Act of 5 August 2010
on the protection of classified information (consolidated text, Polish Journal of Laws of
2019, item 742, as amended), classified information means those pieces of information
whose unauthorised disclosure would or potentially might result in damage suffered by
76
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the Security
of Communication and Information Systems and Networks of Public Administration
Authorities
the Republic of Poland, or would be detrimental to its interests, also in the course of the
development of such information, notwithstanding its form and means of expression.
4
An early warning system for threats on the Internet
With a view to preventing, counteracting and combating terrorist incidents which affect
communication and information systems of public administration authorities that are
significant for the continuity of state functioning and/or ICT networks which are included
in the uniform list of facilities, installations, devices, and services which comprise critical
infrastructure, as well as the communication and information systems belonging to the
owners, owner-like possessors or lessees of critical infrastructure facilities, installations
and devices, or of the data processed in the said systems, as well as to prevent and
investigate terrorist offences affecting this sphere, and to prosecute the perpetrators of
such offences, under Article 32aa (1) of the AISA, the ISA is obliged to implement in the
said entities an early warning system for threats on the Internet, as well as to manage and
coordinate its operations. The implementation of an early warning system for threats on
the Internet is aimed at combating terrorism. Given the above, public administration
authorities are obliged to join the early warning system and provide the ISA with required
information allowing the implementation of the early warning system in these entities.
This obligation is imposed under Article 32aa(4) of the AISA.
As a rule, the early warning system within the infrastructure of a given public
administration authority is implemented on the basis of the annual plan. As stipulated in
§ 2 of the Regulation of the Prime Minister of 2 January 2020 on the conditions and
procedure for managing, coordinating and implementing an early warning system for
threats on the Internet (Polish Journal of Laws of 2020, item 54), hereinafter “the REWS”,
the ISA provides a public administration authority where the early warning system is to
be implemented in line with the annual implementation plan with information about: 1)
the technical aspects of participating in the early warning systems, which are required for
its implementation, in particular, start up; 2) the proposed time limit for the
implementation of the early warning system.
By way of an understanding, the ISA consults and agrees upon, with a given public
administration authority, the technical aspects of participating in the early warning system
and the system configuration model. The ISA does not impose its vision of this body's
participation in the early warning system, but enters into negotiations with a view to
establishing a common position in this respect. Nonetheless, where it is impossible to
reach an understanding for reasons attributable to the public administration authority,
pursuant to Article 32aa (8) of the AISA, the ISA must notify a supervisory authority or
the minister in charge of computerisation.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the
Security of Communication and Information Systems and Networks of Public
Administration Authorities
77
Participation in the early warning system is subject to the fulfilment of obligations arising
from § 5(1) of the REWS, namely: 1) the obligation to immediately remove any
malfunctions of network infrastructure powering the early warning system, to maintain
its full working order; 2) to monitor and analyse, using own resources, the information
generated by the early warning system in order to undertake remedial and safeguarding
measures covering the said system; 3) to refrain from providing information to other
entities: a) information about the early warning system, b) the whole or part of the
software and hardware platform provided by the ISA, c) information about the hardware
platform forming part of the early warning system, and about the technical aspects related
to the design and operation of the system.
5
Conclusions
Counteracting threats in the cyberspace, including cyberterrorism, will be possible if a
high level of security is maintained in communication and information systems of public
administration authorities which are significant for the continuity of state functioning
and/or ICT networks that are included in the uniform list of facilities, installations,
devices, and services which comprise critical infrastructure, as well as the communication
and information systems belonging to the owners, owner-like possessors or lessees of
critical infrastructure facilities, installations and devices, or of the data processed in the
said systems.
In Article 32e of the AISA, the legislators have introduced the recommendation
institution, whose aim is to increase the level of security of communication and
information systems. The Head of ISA carries out the analysis of incidents that
compromise the security of communication and information systems, and issues
recommendations to public administration authorities in order to increase the level of
security of communication and information systems with a view to ensuring their
integrity, confidentiality, accountability and accessibility. The public administration body
concerned may submit its reservations to the recommended methods for increasing the
level of security of its communication and information systems due to the adverse effects
of the recommended measures on the functionality of the system or the occurrence of new
vulnerabilities, though no later than within 7 days of the date it receives the
recommendations. The Head of ISA expresses his/her position on the reservations, and
upholds the recommendations in question, or provides amended recommendations. The
body that has received the recommendations must notify the Head of ISA on the method
and range of their implementation within a month of their receipt. The failure to
implement the recommendations constitutes grounds for the Head of ISA to notify the
authority supervising the operations of the public administration authority concerned that
the recommendations are not taken into account, or to request that action be taken to
implement the recommendations.
78
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk: The Competence of the Internal Security Agency in Protecting the Security
of Communication and Information Systems and Networks of Public Administration
Authorities
References:
Bożek, M., Czuryk, M., Karpiuk, M. & Kostrubiec, J. (2014) Służby specjalne w strukturze władz
publicznych. Zagadnienia prawnoustrojowe (Warszawa: LEX a Wolters Kluwer business).
Chałubińska-Jentkiewicz, K. (2019) Cyberodpowiedzialność (Toruń: Wydawnictwo Adam
Marszałek).
Chałubińska-Jentkiewicz, K., Karpiuk, M. & Kostrubiec, J. (2021) The Legal Status of Public
Entities in the Field of Cybersecurity in Poland (Maribor: Lex Localis),
https://doi.org/10.4335/2021.5.
Czuryk, M. (2019) Supporting the development of telecommunications services and networks
through local and regional government bodies, and cybersecurity, Cybersecurity and Law, 2, pp.
39-50.
Hoffman, I. & Cseh, K. (2020) E-administration, cybersecurity and municipalities – the challenges
of cybersecurity issues for the municipalities in Hungary, Cybersecurity and Law, 2, pp. 199-211.
Karpiuk, M. (2021) Cybersecurity as an element in the planning activities of public administration,
Cybersecurity and Law, 1, pp. 45-52.
Opaliński, B., Rogalski, M. & Szustakiewicz, P. (2017) Ustawa o Agencji Bezpieczeństwa
Wewnętrznego oraz Agencji Wywiadu. Komentarz (Warszawa: C.H.Beck).
Radoniewicz, F. (2019) Przestępstwa komputerowe w polskim Kodeksie karnym, Cybersecurity
and Law, 1, pp. 193-212.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Protection of Critical Infrastructure in Cyberspace
MONIKA NOWIKOWSKA
1
Abstract Critical infrastructure plays a key role in the functioning of any
modern state. One of the primary tasks of the state is to ensure adequate
protection, not only for the critical infrastructure itself but also for relevant
information on how to ensure its security. Critical infrastructure consists of
physical and cybernetic systems, such as facilities, equipment or
installations. The responsibility for proper functioning of critical
infrastructure rests with state authorities and with the administrators of
selected facilities, installations or equipment or services. As a result of
events being the consequence of human activity or natural forces, critical
infrastructure may be destroyed, damaged or disrupted, thus putting at risk
the life and property of citizens. Such events have a negative impact on the
economic development of the state. Hence, the protection of critical
infrastructure is one of the priorities of every state. The essence of the tasks
associated with critical infrastructure lies not only in ensuring its protection
against risks, but also in ensuring that any possible damage or disruption to
its functioning is as short-lived as possible, easy to eliminate, and does not
cause additional losses to the citizens and the economy.
Keywords: • critical infrastructure • cybersecurity • public administration
• critical services • critical service operator
CORRESPONDENCE ADDRESS: Monika Nowikowska, Ph.D., War Studies University, Department of New
Technologies Law and Cybersecurity, Institute of Law, Aleja Generała Antoniego Chruściela „Montera” 103,
00-910 Warsaw, Poland, e-mail:
[email protected], ORCID: 0000-0001-5166-8375.
https://doi.org/10.4335/2022.1.8
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
80
1
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
Introduction
Critical infrastructure – which provides fundamental services such as the supply of
energy, energy resources and fuels, communications, ICT networks, food and water –
plays a key role in the functioning of a modern state. Hence, one of the primary tasks of
the state is to ensure adequate protection, not only for the critical infrastructure itself but
also for relevant information on how to guarantee its security (Kowalska, 2021: 645). It
should be emphasised that the basic constitutional values include the internal security of
the state and its citizens, which is considered an element of public order in the state.
Threats to state security can be both of an external and internal nature. This means that
among the tasks that state authorities undertake is to maintain the relations and processes
within the state that ensure that the interests of the state and its citizens are pursued
effectively and harmoniously, while simultaneously diagnosing and responding to
emerging threats against these interests (Długosz, 2019: 108). This is especially relevant
with regard to the smooth functioning of critical infrastructure. The responsibility for
proper functioning of critical infrastructure rests with the cooperation between state
authorities and the administrators of selected facilities, installations or equipment or
services.
The subject matter of this paper is the protection of critical infrastructure in cyberspace.
These issues raised herein required an analysis of the content and assessment of the source
literature (the use of desk research) and of the selected Polish legal acts, covering three
major questions: the term ‘critical infrastructure’, the term ‘cyberspace’ and the ratio legis
of establishing special protection for critical infrastructure in cyberspace. An in-depth
study of the source literature allowed the formulation of a general research problem in the
form of the question: What impact does the protection have on the status of equipment,
facilities and services classified as critical infrastructure? Providing an answer to this
question was intended to facilitate the achievement of the research objective, i.e. the
broadening and systematisation of knowledge on critical infrastructure protection in
cyberspace. Due to the complexity of the general problem, it was deemed advisable to
indicate in detail research problems such as: 1) types of critical infrastructure protection
in cyberspace; 2) the role of the cooperation of critical infrastructure operators with each
other and with the public administration in the undisturbed functioning of critical
infrastructure; and 3) the functioning of the National Critical Infrastructure Protection
Programme.
2
The terms ‘critical infrastructure’ and ‘cyberspace’
The term ‘critical infrastructure’ has been defined in the Act of 26 April 2007 on Crisis
Management (consolidated text, Polish Journal of Laws of 2020, item 1856, as amended)
-hereinafter referred to as the ACM. Pursuant to Article 3(2) of the ACM, critical
infrastructure shall be construed as systems and their functionally related facilities,
including civil structures, equipment, installations, services essential to the security of the
state and its citizens, that are required to ensure the smooth functioning of public
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
81
administration bodies, as well as institutions and entrepreneurs. Critical infrastructure
applies to the supply of energy, energy raw materials and fuels, communications, ICT
networks, financial services, the provision of food and potable water, the protection of
health, movement of goods and people, rescue, ensuring continual effective functioning
of the public administration, production, storage, warehousing and safe use and
movement of chemicals and radioactive materials, including pipelines containing
hazardous substances. The source literature aptly indicates that critical infrastructure
consists of “those physical and cyber-based systems essential to the minimum operations
of the economy and government” (Nowak, 2018: 173). The statutory definition of critical
infrastructure implies that facilities, equipment, installations and services are within the
framework of the aforementioned technical and social infrastructure systems, which are
of high importance for the state and the society.
Systems
facilities
equipment
installations
services
In Article 3 (2a) of the ACM, the legislator has also defined the term ‘European Critical
Infrastructure’. European Critical Infrastructure means systems and their functionally
connected facilities, including civil structures, equipment and installations essential for
the security of the state and its citizens and serving to ensure the smooth functioning of
public administration bodies, as well as institutions and entrepreneurs, in the context of
electricity, oil and natural gas, as well as road, rail, air, inland waterways transport and
ocean and short-sea shipping and ports that are located in Member states, the disruption
or destruction of which would have a significant impact on at least two Member states.
In analysing the term ‘critical infrastructure’, it is important to bear in mind that the
infrastructure in question does not function in a closed space and is not isolated from the
environment, but is closely interconnected with the overall ICT environment. This makes
the administration and business interdependent. There is, hence, a common infrastructure
that implements processes for both sectors. This leads to such degree of dependence that
a malfunction of this infrastructure may produce effects beyond the borders of the
organisation that manages it. It is therefore necessary to consider critical infrastructure
protection as a process aimed at protecting the continuity of a particular service and its
restoration if needed. Thus, critical infrastructure protection consists in undertaking all
activities aimed at ensuring the functionality, continuity and integrity of critical
infrastructures in order to deter and mitigate all possible threats, risks or vulnerabilities.
It should be emphasised that in accordance with the disposition of Article 5b(7) of the
ACM, the Director of the Government Centre for Security shall draw up, in cooperation
with the relevant ministers, a uniform list of facilities, installations, equipment, and
services forming critical infrastructure that is broken down by systems, whereby the list
also distinguishes European Critical Infrastructure located in the Republic of Poland and
82
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
European Critical Infrastructure located in other Member States of the European Union
which may have a significant impact on the Republic of Poland. The distinction of
European Critical Infrastructure is related to the fact that there are facilities within the
European Union which, when disrupted or destroyed, would lead to significant crossborder impacts (Długosz, 2019: 109).
Behind the term ‘critical infrastructure’ there is, in fact, a state policy which applies to
ensuring national security and which consists in ensuring the functionality, continuity of
operations and integrity of critical infrastructure in order to deter threats, risks or
vulnerabilities and their effects, and to rapidly restore critical infrastructure in the event
of failures, attacks or other events that disrupt its proper functioning. This policy
translates into tasks of state authorities and, specifically, administrators (operators) of
critical infrastructure. It is a policy of ensuring the resilience of critical infrastructure to:
failures, terrorist attacks, acts of nature and other events, and so a policy of protecting
against various threats. Simultaneously, it is a policy of improving the security of critical
infrastructure facilities, equipment and services.
The concept of cyberspace is inextricably linked with the revolution in access to
information being an effect of the IT revolution. In Polish law, the term appears in various
acts that give an autonomous meaning to the term ‘cyberspace’. For example, in Article
2(1a) of the Act of 18 April 2002 on the state of Natural Disaster (consolidated text, Polish
Journal of Laws of 2017, item 1897), cyberspace is construed as the space for processing
and exchanging information created by ICT systems, as defined in Article 3(3) of the Act
of 17 February 2005 on Digitalisation of Operations of Entities Performing Public Tasks
(consolidated text, Polish Journal of Laws of 2021, item 670), with the links between
them and relations with users. The term ‘cyberspace’, construed as defined above, has
also been repeated in the Act of 29 August 2002 on the Martial Law and on the
Competences of the Commander-in-Chief of the Armed Forces and the Rules for his
Subordination to the Constitutional Authorities of the Republic of Poland (consolidated
text, Polish Journal of Laws of 2017, item 1932) in Article 2(1b) and the Act of 21 June
2002 on the State of Emergency (consolidated text, Polish Journal of Laws of 2017, item
1928) in Article 2(1a). Thus, as it stems from this relatively broad definition, the legislator
construes cyberspace not only as ICT systems, i.e. the equipment (hardware) they consist
of, together with the programs (software) ensuring the performance of functions by these
systems (processing, storage and transmission of computer data), but also as computer
data (information) and interactions between devices and their users.
The term ‘cyberspace’ is also defined in the source literature. C. Banasinski points out
that cyberspace is a conceptual hybrid that is an abbreviation of the phrase ‘cybernetic(s)
space’ (Banasinski, 2018: 23). M. Lakomy emphasises that cyberspace is a global
information infrastructure, an interconnectivity between people through computers and
telecommunications (Lakomy, 2015: 67). Similarly, P. Levy notes that cyberspace is an
information domain, a space for open communication via computers around the world
(Levy, 2002: 380).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
83
The analysis of definitions of cyberspace provided by legal commentators allows us to
formulate certain elements characteristic for the cyberspace environment. They include:
1) unlimited reach; 2) the combination of information resources into huge databases; 3)
no possibility to refer cyberspace to the physical dimensions of the real world
(Wasilewski, 2013: 226); 4) the complexity of the phenomenon, by basing cyberspace on
technical, technological and social elements (Dobrzeniecki, 2004: 21).
The need to take action to determine the standard norms, principles and values in
cyberspace was indicated by the European Commission in its Joint Communication to the
European Parliament, the Council, the European Economic and Social Committee and
the Committee of the Regions entitled “Cybersecurity Strategy of the European Union:
an Open, Safe and Secure Cyberspace” (EU Commission Communication of 7 February
2013, JOIN, 2013), hereinafter, the ‘Communication’. In this Communication, the
Commission stressed that fundamental rights, democracy and the rule of law need to be
protected in cyberspace.
Freedom in the online environment requires safety and security. Cyberspace should,
hence, be protected from incidents, malicious activities and misuse; and governments
have a significant role in ensuring a free and safe cyberspace, the mission of which should
be to respect and protect fundamental rights online and to maintain the reliability and
interoperability of the Internet. However, the private sector owns and operates significant
parts of cyberspace, and so any initiative in this area has to recognise its leading role.
As a result of the digitisation process and the expansion of electronic communication
services, new regulatory policy has become necessary. We are currently witnessing
dramatic changes in the functioning of the global society and economy. The report
“Proposed directions of development of the information society in Poland until 2020”
indicates that the key area of changes in this regard, besides the political and economic
aspects of economic competitiveness, will be the role of public authorities. The state will
be forced to limit the scope of exercise of the governance function in favour of shaping
development strategies and mechanisms, standardisation and mediation.
These revolutionary changes result primarily from the fact that, “the existing methods of
exercising power and governing the state will simply be ineffective in a society in which
information will become the main product”. Digitalisation has become the reason for the
convergence of administration, i.e. a process consisting in the creation of new, common
administrative solutions in place of traditional administrative separateness. Such areas are
subject to definition at the European Union level and their division is determined by new
threats to national security (Chałubińska-Jentkiewicz, Nowikowska, 2020: 21).
One of the key regulatory objectives is to ensure cybersecurity, which requires actions
related to maintaining the availability and integrity of networks and infrastructure, as well
as the confidentiality of the information contained therein, subject to the right to privacy
84
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
and with respect for identity. Ensuring cybersecurity becomes one of the fundamental
objectives of the state, and the determinant of these principles is the protection of
fundamental values, which should have the same degree of protection in cyberspace as in
the real world. An open and free cyberspace removes social and international barriers,
allows the exchange of cultures and experiences between states, communities and
individuals, enables interactions and the exchange of information, and consequently
makes possible the exchange of knowledge, experience and technology.
To summarise this part of the discussion, it may be said that the general definition of
security as a state of peace, harmony and undisturbed functioning has been broadened in
recent years by cyberspace. In the past, having an army of thousands of people, the most
advanced weapons and other military infrastructure was considered an element of
ensuring state security. With the advent of computers, security has evolved into
information security (Kitler, 2017: 19). It is widely believed that if a country cannot
control its cyber assets, it is not secure. Attacks in cyberspace happen every day. If a
country does not have secure systems in place, not only the country as a whole, but also
its citizens are at risk of having their fundamental rights violated. Moreover, financial
institutions that support the economy are vulnerable to data theft due to insecure cyber
systems, and the infrastructure of a country may also be at risk as a result of cyber-attacks.
Attacks on information stored in a computer system may be twofold. Their purpose may
be to undermine the credibility of the system or to steal information. In the first case,
cyberterrorists enter their own data in the network or manipulate data records in the
system. These attacks aim to disorganise the activities of the state, which is to the
detriment of the whole society. These actions can target critical infrastructure, water and
energy supply, telecommunications infrastructure, etc. Manipulating these systems can
also lead to material damage or casualties, for example, if a train collision is caused. A
cyberattack, by undermining the credibility of a system or stealing information, can,
therefore, affect both national resources and information owned by the individual – the
citizen (Holyst, 2011: 961).
W. Kitler points out that the information security of the state is a trans-sectoral field of
national security, being a process of striving to ensure an undisrupted functioning and
development of the state, including the society, in the information space, by providing
free access to information and protecting, at the same time, against its adverse effects
(tangible and intangible), by protecting information resources and systems against the
hostile activities of other entities or the effects of natural forces and equipment
malfunction, while maintaining the ability to informatively influence the behaviour and
attitudes of international and national entities (Kitler, 2017: 19).
Security always applies to various manifestations of human activity. The basic attributes
of security that apply to communication processes include confidentiality, which means
that only authorised persons have access to certain data and information. The second
element is integrity of digital content, which means that the data and information
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
85
contained therein are correct, intact and have not been manipulated. Another
characteristic is availability – a rule related to the functioning of an information system,
including the availability of data, processes and applications in accordance with user
requirements.
3
National Critical Infrastructure Protection Programme
Critical Infrastructure Protection is defined in Article 3(3) of the ACM as all activities
aimed at ensuring the functionality, continuity and integrity of critical infrastructures in
order to deter threats, risks or vulnerabilities, as well as to limit and neutralise their effects
and to ensure their rapid restoration in case of breakdowns, attacks or other events which
disrupt their proper functioning. Security in this sense can be divided into mandatory and
special protection. Mandatory protection means the protection of areas, facilities,
equipment and transportation systems important for the defence, economic interests of
the state, public security and other important concerns of the state that is provided by
specialised armed security formations or through appropriate technical safeguards, in
accordance with the provisions of the Act of 22 August 1997 on the Protection of Persons
and Property (Polish Journal of Laws of 2020, item 838).
Special protection, on the other hand, means the protection of facilities of particular
importance for national security and defence, provided by militarised units created
especially for this purpose on the basis of separate provisions. Special protection is
prepared and provided under the Act of 21 November 1967 on Universal Duty to Defend
the Republic of Poland (consolidated text, Polish Journal of Laws of 2021, item 372) and
the Regulation of the Council of Ministers of 24 June 2003 on Facilities Particularly
Important for State Security and Defence and their Special Protection (Polish Journal of
Laws of 2003, No. 116, item 1090).
Critical infrastructure protection
mandatory protection
special protection
The principles for ensuring the security of critical infrastructure are described in the 2020
National Critical Infrastructure Protection Programme (Resolution No. 210/2015 of the
Council of Ministers of 2 November 2015 on the adoption of the National Critical
Infrastructure Protection Programme subject to Resolution No. 116/2020 of the Council
of Ministers of 13 August 2020 amending the resolution on the adoption of the National
Critical Infrastructure Protection Programme) – hereinafter referred to as the NCIPP,
adopted by way of resolution of the Council of Ministers. The National Critical
Infrastructure Protection Programme was initiated pursuant to Article 5b(1) of the ACM.
In accordance with this regulation, the Council of Ministers adopted, by way of
resolution, the National Critical Infrastructure Protection Programme, the purpose of
which is to create conditions for improving the security of critical infrastructure, in
86
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
particular, with regard to: 1) preventing disruptions to the functioning of critical
infrastructure; 2) preparing for crisis situations that may adversely affect critical
infrastructure; 3) responding to situations of destruction of infrastructure or disruption of
its functioning.
Access to critical infrastructure services is crucial for the smooth functioning and
development of a modern state, society and economy. This means that a critical
infrastructure that functions smoothly and without disruptions has a major impact on
citizens, administrative structures and the economy. Therefore, the issue of ensuring
security (protection) of critical infrastructure is very important.
The purpose of the NCIPP is to create conditions for enhancing the security of critical
infrastructure. The said purpose constitutes a paramount goal of increasing the security
of the Republic of Poland. In order to meet this goal it is necessary to meet a number of
indirect goals, which include gaining a certain level of awareness, knowledge and
competence among all actors involved in the protection process with regard to the
importance of critical infrastructure for the smooth functioning of the state, as well as the
ways and methods of protecting that infrastructure. Other indirect goals include:
introducing a coherent risk assessment methodology that considers the whole gamut of
threats, including those with very low probability and catastrophic impact; introducing a
coordinated and risk assessment-based approach to performing critical infrastructure
protection tasks; building a partnership between critical infrastructure protection
participants; and finally, implementing the mechanisms for the exchange and protection
of information shared between critical infrastructure protection participants.
According to the NCIPP, security of critical infrastructure is ensured at several levels.
The tasks of critical infrastructure operators include the execution of procedures and
measures to ensure physical, technical, personal and ICT security, as well as legal
security. Pursuant to Article 6(1) of the ACM, the tasks of critical infrastructure protection
include: 1) collecting and processing information on threats to critical infrastructure; 2)
developing and enforcing procedures in the event of threats to critical infrastructure; 3)
restoring critical infrastructure; 4) cooperating between public administration and owners,
owner-like possessors and dependent possessors of critical infrastructure facilities,
installations or equipment with respect to their protection.
The starting point for critical infrastructure protection is Article 6(5) and (5b) of the ACM,
which states that owners, owner-like possessors and dependent possessors of critical
infrastructure facilities, installations or equipment are obliged to protect them, in
particular, by preparing and implementing, adequately to the foreseen threats, critical
infrastructure protection plans and by maintaining their own backup systems, as well as
ensuring security and sustaining the functioning of this infrastructure until its complete
restoration.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
87
This regulation implies a general obligation to protect critical infrastructure components
regardless of the legal title to the facilities, installations or equipment that make up critical
infrastructure, and so by all entities which may actually and legally affect the functioning
of critical infrastructure (Długosz, 2019: 111). The Court of Appeal in Warsaw in its
judgement of 10 October 2013, I ACa 767/13, emphasised that the mere fact that the Act
on Crisis Management does not include any provisions imposing sanctions on those
critical infrastructure managers who fail to comply with the dispositions contained in the
provisions of the Act and refuse to cooperate with the public administration does not,
however, indicate that actions contrary to these provisions should be considered lawful,
i.e. devoid of legal sanctions under the provisions of other acts. In addition, section 5a of
the ACM provides that owners, owner-like possessors and dependent possessors are
obliged to designate, within 30 days of receiving information on inclusion of facilities,
installations or equipment in the "list of critical infrastructure facilities, installations,
equipment and services split into systems” - a person responsible for maintaining contact
with competent entities within the scope of critical infrastructure protection.
Article 6(5b) of the ACM provides that operators of essential services are obliged to
include, in critical infrastructure protection plans, documentation concerning the
cybersecurity of the information systems used to provide essential services. Pursuant to
the said regulation, owners, owner-like possessors and dependent possessors being the
operators of essential services within the meaning of the Act of 5 July 2018 on the
National Cybersecurity System (consolidated text, Polish Journal of Laws of 2020, item
1369 as amended), hereinafter referred to as the ANCS, shall include in critical
infrastructure protection plans the documentation regarding the cybersecurity of the
information systems used to provide essential services, in accordance with the scope of
information set out in the regulations issued pursuant to the Act on the National
Cybersecurity System.
4
Cooperation of critical infrastructure operators
In the Act on Crisis Management, the legislator adopted a sanction-free approach to the
protection of critical infrastructure. This is based on the assumption that the effectiveness
of critical infrastructure protection can be increased only through the actions of its
operators when supported by the capabilities and potential of the public administration.
Critical infrastructure operators have the best knowledge and tools to mitigate threats to
their activities. They are also in a position to make the most appropriate choice of
strategies to minimise the impact of these threats.
The term ‘operator of essential service’ has been defined in the ANCS. Article 2(16) of
the ANCS also defines the term ‘essential service’. An essential service is a service that
is essential for the maintenance of critical societal and/or economic activities that are
included in the list of essential services. This means that it is a necessary condition that it
is a service included by the legislator in the list of essential services that constitutes Annex
1 to the Act (Czarnecka, 2019: 64). The status of an operator of essential services may be
88
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
obtained only by an entity that provides services included in this list. Another prerequisite
is to have an organisational unit in the Republic of Poland. Neither the actual nature of
the conducted activity nor its size is decisive. For an entity to be recognised as an operator
of essential service, it is necessary for the authority responsible for cybersecurity to issue
a decision recognising the given entity as an operator of essential service.
The list of essential services is annexed to the ANCS. Essential services have been
specified for each sector (or sub-sector, if any). For example, within the energy sector,
seven subsectors have been distinguished and listed, with the essential services relating
to them: 1) mineral extraction (extraction of natural gas, oil, brown coal, hard coal,
copper); 2) electric energy (generation, transmission, distribution of electric energy,
trading in electric energy, storage of electric energy, systemic and quality services,
management of energy infrastructure); 3) heat (generation of heat, trading in heat,
transmission and distribution of heat); 4) oil (production of liquid fuels, transmission of
oil, transmission of liquid fuels, storage of oil, transhipment of oil, storage of liquid fuels,
transhipment of liquid fuels, trading in liquid fuels or trading in liquid fuels with foreign
countries, production of synthetic fuels) 5) gas (production and transmission of fuel gases,
trading in fuel gases and trading in natural gas with foreign countries, transmission,
distribution, storage of fuel gases, liquefaction and regasification of LNG, as well as
importing and unloading); 6) supplies and services for the energy sector (supply of
systems, machinery, equipment, materials, raw materials and provision of services to the
energy sector); 7) units subordinated or supervised (production of radiopharmaceuticals,
management of radioactive waste, maintenance of strategic reserves and stocks of oil,
petroleum products and natural gas, research and development or implementation or
technological research for the energy sector) (Kitler, Taczkowska-Olszewska,
Radoniewicz, 2019: 28).
In an attempt to maintain balance between the sovereign influence of the state and the
expenditure necessary to improve the security of critical infrastructure, the legislator did
not provide in the ACM sanctions for failure to comply with the obligations set out
therein, nor for budget support for critical infrastructure operators. Therefore, in order to
achieve the assumed objectives, it was necessary to adopt the rules to be followed by its
participants. Namely, the pillars of cooperation are: 1) joint responsibility, construed as a
collective drive to improve the security of critical infrastructure, arising from awareness
of its importance for the functioning of both public administration bodies and critical
infrastructure operators, society, the economy and the state; 2) cooperation, which means
that participants in critical infrastructure protection perform together specific, convergent
and complementary tasks in order to achieve a common goal, which results from the
principle of joint responsibility; 3) trust, construed as the conviction that the motivation
of the critical infrastructure protection participants is the pursuit of a common goal –
improving the security of critical infrastructure.
This means that the basic method of critical infrastructure protection is the cooperation
of the administrators of that infrastructure with each other and with the public
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
89
administration. It should be emphasised that in Article 6 of the ACM, the legislator did
not exhaustively define the methods of critical infrastructure protection, while the
disposition of Article 5b(9) of the ACM implies the obligation of public administration
bodies and services responsible for national security to cooperate with owners,
autonomous possessors and dependant possessors of critical infrastructure facilities,
installations, equipment and services, as well as with other public authorities and services.
Hence, the point is that operators should be governed by the protection of critical
infrastructure insofar as their legal and factual capabilities allow. They should implement,
as far as possible, measures to ensure functionality, continuity and integrity of critical
infrastructure in order to deter, mitigate and neutralise threats, risks or vulnerabilities, and
to recover that infrastructure rapidly in case of failures, attacks or other events that disrupt
its proper functioning.
Thus, critical infrastructure protection integrates measures drawn from various areas, and
mobilises critical infrastructure administrators to make best use of their capabilities in
order to prepare for threats to, or to improve the security of, critical infrastructure. These
capabilities also include the cooperation of critical infrastructure operators and the
cooperation of these operators with public administration, which is related to this
“systemic” view of critical infrastructure (Długosz, 2019: 11). This conclusion is
confirmed by the content of the NCIPP, where cooperation on the protection of critical
infrastructure is considered one of the most important principles to become a key element
in ensuring coherence of decisions made and effectiveness of the actions taken, both in
the course of day-to-day work and in situations of threats.
The main addressees of the NCIPP in the government administration are the ministers
responsible for critical infrastructure systems and the heads of particular provinces, while
the operators of critical infrastructure, pursuant to Article 6 of the ACM, are obliged to
protect it.
5
Obligations of operators of essential services
It should be emphasised that in the ANCS, the legislator has imposed on operators of
essential services (Articles 8-15 of the ANCS) over a dozen obligations relating to
ensuring the smooth operation of the security management system in the information
system. In the case of operators of essential services, only serious incidents are to be
reported to the relevant CSIRT (Besiekierska, 2019: 65). When handling an incident, an
operator of essential service is obliged to classify the incident based on the thresholds
indicated in the Regulation of the Council of Ministers of 31 October 2018 on the
thresholds for considering an incident as serious (Polish Journal of Laws of 2018, item
2180).
The nature of the incident may depend on the number of users affected by the disruption
to the provision of the essential service, the duration of the impact of the incident on the
essential service provided, the geographical extent of the area affected by the incident and
90
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
other factors specific to the sector or sub-sector concerned. The criteria for considering
an incident as serious are defined separately for each of the essential services. For
example, in the case of water supply, a serious incident will be an incident that led to the
unavailability of the service to at least 100,000 users for more than 8 hours. In the case of
an incident concerning the provision of healthcare services, it will be an incident that led
to the non-availability of the service for more than 24 hours or to one or more of the
following: human death; serious injury; other than serious injury to more than one person;
lack of confidentiality of data processed in the service; lack of integrity of data processed
by the service.
Another obligation under the ANCS is the obligation imposed on operators of essential
services to establish internal structures responsible for cybersecurity. An alternative is to
conclude an agreement with a provider of cybersecurity services, as provided for in the
ANCS, who meets the criteria indicated in the Regulation of the Minister of Digitalisation
of 10 September 2018 on Organisational and Technical Conditions for providers of
cybersecurity services and internal organisational structures of operators of essential
services responsible for cybersecurity (Polish Journal of Laws 2018, item 1780).
It needs to be emphasised that in the ANCS, the legislator provided for sanctions for
failure to fulfil obligations. Article 73 (1) and (2) of the ANCS contains a catalogue of
infringements of obligations which are subject to financial penalties. The Act does not
provide for penalties in the case of public bodies. The operator of essential service may
be fined up to PLN 200,000 (or up to PLN 1,000,000, if, as a result of an inspection, it
turns out that there is a persistent violation of the provisions of the Act). In addition, the
competent authority responsible for cybersecurity may impose a penalty payment on the
manager of the essential service operator in the amount corresponding to 200% of his/her
monthly salary at the maximum. This applies to the case where such a manager has failed
to exercise due diligence to fulfil some of the obligations indicated in the ANCS.
6
Conclusion
Critical infrastructure protection is an ongoing and dynamic phenomenon. This is due to
the fact that the perception of threats, the scope of available resources and the possibilities
to protect critical infrastructure are changing. Simultaneously, critical infrastructure
protection addresses various aspects of the critical infrastructure operation and integrates
the means of protection from various areas, such as the provision of physical security.
Protection of critical infrastructure in cyberspace has been additionally regulated in the
ANCS. Prior to the entry into force of the ANCS, the issues of securing information and
communication systems were regulated by sector or in a fragmentary way. Insufficient
protection of information and communication systems is related to the issue of
cyberterrorism as a source of threats to critical infrastructure. The provisions of the ANCS
significantly affect the identification of critical infrastructure and threats to its
functioning, as well as introduce new means of protection in the cybernetic area. Among
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
91
other issues, the Act defines cybersecurity as the required functionality of critical
infrastructure, and identifies operators of essential services among the most important
entities conducting business in Poland.
According to the act, essential services are those which are crucial for the maintenance of
critical societal and/or economic activities, and so we deal with a term that is convergent
with the term ‘critical infrastructure’, whereby essential services explicitly include
services in the following sectors: energy, transport, banking and financial market
infrastructure, health care, drinking water supply and distribution, as well as what is
known as digital infrastructure. The selected operators of essential services are subject to
the obligation to implement information system security management systems in order to
provide an essential service, which consist of a number of components, e.g. the means of
communication enabling proper and secure communication within the national
cybersecurity system.
These information system security management systems can be seen as a new means of
critical infrastructure protection to be used by those critical infrastructure administrators
or providers of the services classified as critical infrastructure, who have been considered
as operators of essential services within the meaning of the ANCS. Similarly, the
documentation developed by the operators of essential services on the cybersecurity of
the information systems used to provide essential services will translate into the content
of the critical infrastructure protection plans, thus becoming the means of critical
infrastructure protection.
Various actions are taken as part of critical infrastructure protection, which aim to ensure
the critical infrastructure functionality, continuity and integrity in order to deter threats,
risks or vulnerabilities and to mitigate and neutralise their impact, and to recover that
infrastructure rapidly in case of failures, attacks or other events that disrupt its proper
functioning. Cooperation between operators within critical infrastructure systems, as well
as between critical infrastructure systems plays an important role in this protection. The
links between individual critical infrastructure components or facilities and the need for
a comprehensive (holistic) approach necessitates the far-reaching cooperation of all the
entities responsible for the undisturbed functioning of critical infrastructure. This
cooperation takes place during the planning phase of critical infrastructure protection and
later during its implementation. It takes the form of fairly concrete legal obligations that
come with participation in the National Critical Infrastructure Protection Programme and
the development of critical infrastructure protection plans.
Critical infrastructure protection is a complex task, and the way this task is carried out
changes over time, among other things, due to the fact that the legal environment for the
functioning of the critical infrastructure operators is changing. A good example is the
ANCS, which has undoubtedly strengthened critical infrastructure protection in the
cybernetic dimension.
92
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Nowikowska: Protection of Critical Infrastructure in Cyberspace
References:
Banasiński, C. (2018) Podstawowe pojęcia i podstawy prawne bezpieczeństwa w cyberprzestrzeni,
In: Banasiński, C. (ed.) Cyberbezpieczeństwo. Zarys wykładu (Warsaw: Wolters Kluwer), pp. 2165.
Besiekierska, A. (2019) Ustawa o krajowym systemie cyberbezpieczeństwa. Wybrane obowiązki
jednostek sektora finansów publicznych i spółek prawa handlowego wykonujących zadania o
charakterze użyteczności publicznej, Informacja w administracji publicznej, 1, pp. 65-69.
Chałubińska-Jentkiewicz, K. & Nowikowska, M. (2020) Bezpieczeństwo, tożsamość, prywatność –
aspekty prawne (Warszawa: C.H. Beck).
Czarnecka, A. (2019) Wybrane obowiązki operatorów usług kluczowych na gruncie ustawy o
krajowym systemie cyberbezpieczeństwa, Informacja w administracji publicznej, 2, pp. 64-69.
Długosz, T. (2019) Ochrona infrastruktury krytycznej przez przedsiębiorców, In: Pawłowski, A. &
Wolska, K. (eds.) Przedsiębiorcy i ich działalność (Warszawa: C.H. Beck), pp. 108-111.
Dobrzeniecki, K. (2004) Prawo a etos cyberprzestrzeni (Toruń: Wydawnictwo Adam Marszałek).
Hołyst, B. (2011) Terroryzm (Warszawa: LexisNexis).
Kitler, W. (2017) Pojęcie i zakres bezpieczeństwa informacyjnego państwa, ustalenia systemowe i
definicyjne, In: Kitler, W. & Taczkowska-Olszewska, J. (eds.) Bezpieczeństwo informacyjne.
Aspekty prawno-administracyjne (Warszawa: Wydawnictwo Towarzystwo Wiedzy Obronnej),
pp. 19-28.
Kitler, W., Taczkowska-Olszewska, J. & Radoniewicz, F. (eds.) (2019) Ustawa o krajowym
systemie cyberbezpieczeństwa. Komentarz (Warszawa: C.H. Beck).
Kowalska, K. (2021) Przetwarzanie danych o karalności pracowników i kandydatów na
pracowników w kontekście dostępu do informacji o bezpieczeństwie infrastruktury krytycznej,
Monitor Prawniczy, 12, p. 645-651.
Lakomy, M. (2015) Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państwa
(Katowice: Wydawnictwo Uniwersytetu Śląskiego).
Levy, P. (2002) Drugi potop, In: Hopfinger, M. (ed.) Nowe media w komunikacji społecznej XX w.
Antologia (Warszawa: Wydawnictwo Oficyna Naukowa), pp. 380-389.
Nowak, W. (2018) Ochrona infrastruktury krytycznej w cyberprzestrzeni, In: Banasiński, C. (ed.)
Cyberbezpieczeństwo. Zarys wykładu (Warszawa: Wolters Kluwer), pp. 173-194.
Wasilewski, J. (2013) Zarys definicyjny „cyberprzestrzeni”, Przegląd Bezpieczeństwa
Wewnętrznego, 9, pp. 226-231.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
The Use of Cybersecurity-specific Research Methods to
Identify Behaviours Preceding Dangerous Traffic
Situations
KAZIMIERZ PAWELEC
1
Abstract Traffic disasters, situations creating the danger of a disaster and
road accidents are usually preceded by dangerous activities of individuals
who, by act, negligence, or non-compliance, bring about hazardous
situations. Such behaviours can be caused by a range of factors, including
those that are specific to humans, who are considered to be the weakest link
in the entire system of road traffic safety. Hazardous situations can also
result from public servant passivity, the lack of reaction to recorded
behaviours, defective roads, inappropriate traffic markings, signage and
organisation, and from allowing dangerous vehicles on the road. In this
article, the author makes an attempt at identifying participant-induced
dangerous behaviours. Based on an analysis of traffic camera material, he
proposes to develop an algorithm to recognize individuals whose risky
behaviour may induce traffic mishaps, hence, allowing prompt measures to
be put in place to prevent them from creating dangerous road situations.
Furthermore, the paper argues that uniform driving fitness requirements
should be imposed across the European Union. It also draws attention to
the existing shortcomings in knowledge about the aetiology of traffic
crimes, and to the misguided focus of EU Member States’ authorities on
repressive measures ‒ which fail to deliver the expected outcome of
improved road traffic safety.
Keywords: • traffic crimes and petty traffic offences • intoxication •
dangerous behaviours • preventive measures
CORRESPONDENCE ADDRESS: Kazimierz Pawelec, Ph.D., Assistant Professor, Siedlce University of Natural
Sciences and Humanities, Faculty of Social Sciences, Institute of Security Science, S. Konarskiego 2, 08-110
Siedlce, Poland, e-mail:
[email protected], ORCID: 0000-0001-8669-0249.
https://doi.org/10.4335/2022.1.9
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
94
1
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
Introduction
Impaired psychomotor reactions of the driver can clearly lead to traffic disasters, the
immediate danger of a disaster, or a traffic accident. Many factors can play a role in
weakening psychomotor abilities, including those attributable to the driver, i.e.
intoxication with alcohol or other psychoactive substances, tiredness, poor health and
personality-related factors. This publication has significance for traffic safety, as it
attempts to identify, and possibly eliminate, so-called hazardous drivers before they can
create specific dangerous situations. Accordingly, the research aim was to develop
methods of identifying such individuals before they can take risky, hazardous actions or
commit omission. This required devising an internal safety system using cybersecurityspecific methods in order to, in a way, pre-emptively eliminate such individuals from
traffic by taking purely preventive measures and developing legal regulations underlying
these measures such that they are accepted by the general public without the need to use
more repressive methods. This has become more important in that the deterring approach
has clearly proven to be ineffective.
One more important issue to consider – highly relevant although beyond the scope of this
paper – is related to the significant technological advancements, especially in IT. Indeed,
many cars, especially premium class vehicles, are equipped with a range of driving
assistance devices, and in some countries, such as China, Canada and the US, so-called
“autonomous vehicles” are allowed on the road, where human involvement in driving the
car does not go beyond stating the destination. Consideration, therefore, should be given
to the possibility of unauthorised intrusion into the IT system of the vehicle to disrupt its
operation and cause an accident or disaster. The question, therefore, arises – would it be
possible to identify such intrusion before the disruption occurs, and what signs could
precede such disruption? In short, we should consider what could serve as research
material. Surprisingly, such material already exists and has been successfully used for
more than ten years. It is the data recorded by traffic cameras that are now commonly
used in many cities and on highways. The employment of such material should not be
considered as contributing to repressiveness. Rather, it should be considered as being
research material that is useful in developing an algorithm that could help to identify and
correctly interpret reactions and other external signs preceding behaviours that are
dangerous to others. This is also one of the research aims of this publication. However,
these considerations also require at least a synthetic examination of the legal solutions
related to the typification of traffic crimes and petty traffic offences, as exemplified by
the Republic of Poland. Another important step is to discuss the factors behind traffic
hazards caused by traffic participants, and subsequently to name the contributing factors
and behaviours relevant to the identification of a future hazard. In conclusive remarks,
the author proposes, among others, legislative solutions, including those relating to the
EU law, as well as de lege lata, that are important for practical considerations, such that
the focus is not only on the consequences, but also on the causes, shifting towards
preventive measures, and moving away from repression – treating this as a last resort.
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
2
95
The typification of traffic crimes and petty traffic offences in Polish law ‒
basic facts
Crimes against traffic safety are listed in Chapter XXI of the Penal Code of 6 June of
1997 (uniform text, Polish Journal of Laws 2020, item 1444, as amended) (further
referred to as “the PC”). The legislators have listed eight misdemeanours against the
above-mentioned legally protected right, with only three of them bearing specific
consequences, i.e. a disaster (Article 173 PC), creating the immediate danger of a disaster
(Article 174 PC), and an accident (Article 177 PC). It should be noted that the abovementioned misdemeanours are common, with only one of them – accident – considering
the violation, including unintentional violation, of safety rules in land, water or air traffic
as being an objective element of the prohibited conduct. This does not necessarily mean
that the occurrence of a disaster, or the creation of the immediate danger of a disaster,
cannot relate to these rules. However, only an accident can be caused inadvertently,
whereas a disaster, or the immediate danger of a disaster, can be caused by wilful
misconduct through both direct and oblique intent. The legislators have introduced
harsher penalties for perpetrators of acts set out in Articles 173, 174, and 177 of the PC,
who were intoxicated by alcohol, under the influence of a psychoactive substance, or who
fled the scene. They have restricted punishability to drivers of motor vehicles who were
driving when intoxicated by alcohol or under the influence of a psychoactive substance
(Article 178a PC), or who attempted to escape a chase taken up by a traffic officer (Article
178b PC). Another crime that may be perpetrated only by individuals operating motor
vehicles involves driving a motor vehicle despite a revoked driving license (Article 180a
PC).
Other provisions of Chapter XXI of the PC provide for the criminal liability of, for
instance, a dispatcher who allows the operation of a motor vehicle, or other vehicle, in a
condition which directly endangers the safety of land, water or air traffic despite being
under a specific obligation to the contrary, or of an individual who is performing traffic
safety duties when intoxicated by alcohol or under the influence of a psychoactive
substance (Article 180 PC). Of course, the liability of such individuals referred to in
Articles 179 and 180 of the PC is not excluded in the event of their causing a disaster, the
immediate danger of a disaster or an accident in line with the concept of extended liability,
provided that this is warranted by evidence (Pawelec, 2020: 297-302).
Petty offences against road traffic safety and order are typified in Chapter XI of the Code
of Petty Offences of 20 May 1971 (uniform text, Polish Journal of Laws 2021, item 281,
as amended) (further referred to as “the CPO”). The main idea behind this law was to
provide a full catalogue of petty offences against road traffic safety, and to facilitate the
application of a “range of laws”, such that petty offences deserving harsh treatment were
not treated lightly and, conversely, that the application of such laws would not be
overused through the formalistic interpretation of Chapter XI provisions of the PC
96
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
(Bardach, 1980: 441). Over the years, however, practical experiences revealed that these
provisions were deficient. This was particularly true for the vague provisions that
provided general descriptions of prohibited acts or contained references to other
regulations. Judged on their merits in terms of ensuring road traffic safety and order, they
also had repeatedly proven questionable. The prevailing approach was formalistic,
specific to administrative authorities, and as such having little to do with the dynamics,
variability and atypicality of road traffic situations (for instance – failure to follow signs,
signals or instructions in road traffic – Article 92 CPO; using a vehicle registration
certificate that contains false information – Article 95a CPO). The same formalistic
approach was adopted in respect of perpetrators of petty offences against traffic order (for
instance – failure to clean the road despite being under the obligation to do so –Article
101 CPO; failure to keep access points in a proper condition – Article 102 CPO).
Judging by the system of petty offences in Chapter XI of the PC, it is evident that the
prime importance in terms of ensuring safety and eliminating dangers was attached to
those petty offences that posed a direct threat to road traffic safety. However, in practice,
as well as in interpretations by legal commentators, there was one important aspect that
could not be ignored – namely, the repeated atypicality of traffic situations. Legal
regulations, including in particular the Traffic Law Act of 20 June 1997 (uniform text,
Polish Journal of Laws of 2021, item 450, as amended), which was extensively referred
to in the Code of Petty Offences, as were the general safety rules, assume the existence
of a certain model of typical behaviours in typical situations. Once this typicality is
disrupted, however, it becomes necessary to bring a response that deviates from this
model. Traffic participants not only have the right, but also the obligation, to eliminate or
minimise dangers on the road. Typical petty offences against road traffic safety are ones
that carry a potential for danger to others, as well as to the perpetrator. The danger had to
be real. This is the consequence referred to in Article 86 CPO – creating a danger to traffic
safety; Article 93 CPO – failure to help a victim of an accident; Article 97 CPO – violating
provisions on road traffic safety and order; Article 98 CPO – failure to exercise caution
when driving on internal roads, as well as Article 87 CPO – driving after the consumption
of alcohol or other substance with similar effects.
3
The weakest link – is it only man?
Overall, when considering issues around traffic crimes and petty traffic offences, as
briefly described above, it should be emphasised that state authorities pass legislation that
essentially shifts responsibility to humans – the weakest link of the entire system, one
could say (Pawelec, 2021: 27-161). The commonly accepted approach is one of
attributing guilt for all road traffic accidents to people. This is the approach that guides
all criminal and petty-offence procedures. Yet, state authorities fail to fulfil their
obligations and refuse to accept responsibility for their officers – and are absolutely
unwilling to admit this. They consider human mistakes – made by traffic participants –
as the primary, if not the only, cause of any road incident, forgetting that it is them that
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
97
bear responsibility for the condition of roads and associated equipment, traffic
organisation and the elimination of identified threats (Pawelec, 2017: 13-14). What they
do is engage in the art of manipulation by using a variety of methods, including: “blame
attribution”, “newspeak”, “talking through one’s hat”, “intimidation”, and even “making
supposed concessions” (Stelmach, 2018: 25-29). While doing so, they seem to disregard
their preventive function, the primary aim of which is to eliminate threats. They make no
efforts to comprehensively investigate the different causes of road incidents, including
the behaviours underlying them. Hence, it would be an overstatement to say that the
knowledge of the authorities about the aetiology of traffic crime is modest.
The study of practical experiences leads to a general conclusion that state authorities
showed little interest in causes other than those attributable to the behaviour of traffic
participants. For instance, they did not inquire into why the system failed to reveal mental
diseases, alcohol/drug additions, aggressive tendencies, as well as other impairments,
including those related to vision and hearing disorders, long reaction times, etc.
Sporadically, some consideration was given to the accountability of state officers who did
not react despite their knowledge of poor traffic organisation, markings and signage, road
surface defects, or despite being aware that a driving license for motor vehicles had been
issued to mentally ill, epileptic, visually impaired or otherwise impaired individuals.
An analysis of the causes of accidents or other road incidents leads to the conclusion that
risky decisions creating specific hazards, were the determining factors. These decisions,
however, mostly did not cause any danger. According to the author’s research, criminal
consequences ensued only in no more than 20% of all cases, although comprehensive
research on the subject is yet to be conducted (Pawelec, 2020: 14). So far, no attempts
have been made to identify signs of external behaviour preceding dangerous or risky
decisions.
4
Impairments of psychomotor abilities and their causes ‒ attempt at
assessment
As far as objective elements are concerned, road traffic crimes and petty traffic offences
essentially consist in violating the rules of cautious conduct, thereby putting legally
protected rights of others at risk, and in leading to specific consequences, provided that
such consequences are provided for by law. A violation of safety rules may involve
behaviour that runs counter to a specific directive that prescribes a certain behaviour, or
failure to behave as prescribed by such directive. Therefore, in addition to observing
traffic regulations, traffic participants should exercise common sense, take general
precautions and follow established uncodified rules (Pawelec, 2020: 77).
It should be noted that compliance with specific safety rules often requires reaction to
atypical situations, provided that they were recognisable and foreseeable, and that there
was sufficient time to take protective actions to eliminate the threat. Hence, it is extremely
98
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
important that the driver does not have impaired psychomotor reactions due to being
intoxicated by alcohol or under the influence of psychoactive substances, and does not
attempt to flee the scene, all of which are circumstances subject to harsher penalties and
elements of a crime under Article 178s § 1 and Article 180 of the PC, as already
mentioned. It should be remembered, however, that psychophysical properties, health
status, drugs used, tiredness, skills, experience and other factors are all human-related
(Pawelec, 2020: 134-148). They play an important role in safety, and their involvement
in causing dangerous situations seems undebatable. Behaviours preceding dangerous
situations can be identified by examining material from traffic cameras and CCTV
cameras installed on buildings and other structures and fixtures. Such behaviours can be
observed in drivers who are psychologically predisposed to being aggressive on the road,
and even to display so-called “road rage”.
Generally speaking, aggressive driving means driving a vehicle in a way that creates
dangerous situations for others. It is manifested by excessive speed, ignoring traffic
regulations, performing risky manoeuvres, disregarding other traffic participants,
violating the give way rule, etc. Research has provided examples that the increased
frequency of such behaviours is tantamount to the so-called road rage, which involves
attacking other traffic participants physically, acting verbally aggressive towards them,
and making non-verbal offensive gestures (Hołyst, 2019: 631-634).
In summary, it can be concluded that research on road aggression, considering its different
dimensions and aspects, could, or rather should, represent an important first step towards
improving prevention in road traffic. It is assumed – in fact, fairly commonly – that road
aggression deserves special attention because it involves problems with interpersonal
communication, limited by means of expression and interpretative ambiguity, that are not
found elsewhere (Parkinson, 2001: 507-526; Hołyst, 2019: 636).
Research on road aggression – an increasingly common phenomenon, regrettably –
considering its different dimensions and aspects, should lay the foundations for a concept
that is relevant to preventing aggression, since it deserves special attention due to its
involving problems with interpersonal communication, limited by means of expression
and interpretative ambiguity, that are not found elsewhere (Hołyst, 2019: 636).
Clearly, considering road rage as the intentional violation of safety rules – which
represents a highly aggravating circumstance – might prove a significant
oversimplification. Indeed, aggression can be caused by various preparations that have
little to do with psychoactive substances or alcohol. Among these is Boldeon – a
substance used for muscle building and body sculpting. The users of this drug are not
advised that it is an anabolic-androgenic steroid, classified in Group S1 of anabolic
substances on the World Anti-Doping Agency’s (WADA) List of Prohibited Substances
and Methods. The Warsaw Anti-Doping Laboratory has noted that anabolic-androgenic
steroids (AAS) cause a number of adverse effects, including mental symptoms, such as
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
99
mood swings, irritability, uncontrolled aggression, and other affective and mental
symptoms and syndromes. For instance, this drug was detected, among others, in a person
charged with uncontrolled aggression towards another traffic participant (Pawelec, 2020:
147).
5
Conclusion
Weakened psychomotor reaction, including a longer reaction time, can be caused not only
by intoxication with alcohol or the effects of psychoactive substances, but also by factors
that are altogether ignored during criminal proceedings, or in petty-offence cases,
including, health status, tiredness, psychological attributes and personality features, and
the use of certain drugs and preparations, even if they are legally marketed. Usually, the
dangerous situations created by such drivers, which might lead to disasters, or cause the
immediate danger of such disasters, may be preceded by atypical behaviours, specific, for
instance, to mental diseases, associated with severe pulmonary diseases, balance
disorders, eye disorders and other factors, including those associated with the use of
certain drugs, as well as addictions.
According to the European Transport Safety Council, there has been little interest in these
issues. The author has found clear evidence that the reports issued by the Road Traffic
Office of the Polish National Police Headquarters do not mention the health status of
traffic accident perpetrators, and also do not examine significant doubts as to the driver’s
health or qualifications. A similar situation applies to the Car Traffic Inspection.
Meanwhile, an analysis was run in Finland of fatal road accidents in the years 2014-2018.
Therein, it was found that in 16% of all cases, the driver’s health status directly caused
the tragic event. It is, therefore, worth undertaking work, in accordance with the EU
Directive on driving licenses, to examine the psychomotor abilities of driver candidates.
Particular attention should be paid to health issues related to poor vision, mobility
impairment, cardiovascular diseases, diabetes, neurological diseases and obstructive
pulmonary disease, epilepsy, mental disorders, alcohol issues, addiction to drugs and
medications, as well as renal dysfunctions. Such examination should also be compulsory
for drivers whose behaviour led to dangerous situations for other traffic participants. In
such cases, they should be referred by traffic authorities – or by prosecutor’s offices if
crime is involved – to undergo specific medical examinations. Decisions in this regard
should be subject to judicial control. In cases where dangerous situations have been
documented, state authorities should take preventive measures following relevant
regulations. After all, the main idea is to make sure that such behaviour does not lead to
a crime. Hence, it seems reasonable to develop the aforementioned algorithm. Finally,
efforts should be focused on preventing specific incidents instead of increasing repressive
measures against consequences. Repressiveness is a road to nowhere, as we have yet to
see comprehensive scientific research that would provide conclusive insights into the
aetiology of road traffic crime.
100
THE PUBLIC DIMENSION OF CYBERSECURITY
K. Pawelec: The Use of Cybersecurity-specific Research Methods to Identify
Behaviours Preceding Dangerous Traffic Situations
References:
Bachrach, A. (1980) Przestępstwa i wykroczenia drogowe w prawie polskim (Warszawa:
Wydawnictwo Naukowe PWN).
Hołyst, B. (2019) Przestępstwa przeciwko życiu i zdrowiu (Warszawa: Wolters Kluwer).
Parkinson, B. (2001) Anger on and off the road, British Journal of Psychology, 92, pp. 507-526.
Pawelec, K. (2017) Sprowadzenie niebezpieczeństwa w ruchu drogowym (Warszawa: Difin).
Pawelec, K. (2020) Bezpieczeństwo i ryzyko w ruchu drogowym (Warszawa: Difin).
Pawelec, K. (2021) Zarys metodyki pracy obrońcy i pełnomocnika w sprawach przestępstw i
wykroczeń drogowych (Warszawa: Wolters Kluwer).
Stelmach, J. (2018) Sztuka manipulacji (Warszawa: Wolters Kluwer).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Procedure for the Identification of an Operator of
Essential Services under the Act on the National
Cybersecurity System
DOROTA LEBOWA
1
Abstract The Polish Act on the National Cybersecurity System defines
cybersecurity as "the resistance of information systems to activities that
violate the confidentiality, integrity, availability and authenticity of the data
processed or related services offered by these systems". The Act is designed
to ensure an adequate level of protection for users of digital services, and
one of the basic measures to achieve this is to impose numerous obligations
on digital service operators. The Act on the National Cybersecurity System
sets out a procedure for identifying an entity as providing essential services.
Recognition of a specific entity as an operator of essential services takes
place through a formalized procedure with specific guarantees, concluded
with an administrative decision. The provisions of the Polish Code of
Administrative Procedure apply to the procedure for identifying an
operator of essential services.
Keywords: • cybersecurity • operator of essential services • administrative
decision • essential service
CORRESPONDENCE ADDRESS: Dorota Lebowa, Ph.D., Assistant Professor, Maria Curie-Sklodowska University,
Faculty of Law and Administration, Department of Administrative Law and Administrative Sciences, Plac Marii
Curie-Sklodowskiej 5, 20-031 Lublin, Poland, e-mail:
[email protected], ORCID: 0000-0003-33165541.
https://doi.org/10.4335/2022.1.10
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
102
1
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services under
the Act on the National Cybersecurity System
Introduction
The ever-growing influence of information and communication technology (ICT) on the
socio-economic development of the Member States of the European Union and the
increased use of ICT results in the products and services offered being increasingly
dependent on cybersecurity (Karpiuk, 2021a: 611). The extensive architecture of ICT
systems, including big data operations, serves the development of communication, trade
and transport, and provides a foundation for rendering essential, digital and public
administration services. Unfortunately, the opportunities offered by modern digital
technologies are also used for unfair competition practices, to interrupt the continuity of
selected services (whether for hooliganism purposes or to undermine the competitive
position of an entity), to commit crimes using the Internet, or to carry out terrorist
activities (explanatory memorandum to the government-proposed draft Act on the
National Cybersecurity System, Sejm Papers no. 2505).
The Act of 5 July 2018 on the National Cybersecurity System (consolidated text: Journal
of Laws of 2020, item 1369), hereinafter referred to as ANCS, implements Directive
2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
measures for a high common level of security of network and information systems across
the Union. Pursuant to the principles of the so-called pro-EU interpretation of national
law (see, for example, the CJEU judgment of 9 March 2004, in joined cases C 397/01 to
C 403/-1, Pfeiffer, 2004, p. I-8835, paragraph 113), it is right and necessary to refer to the
relevant provisions of the Directive when interpreting individual norms of the ANCS.
Important guidelines on how to understand the objectives of the Directive are provided in
its preamble, which points out that networks and information systems and services play
an important role in society. Their reliability and security are essential for economic and
social activities and especially for the functioning of the internal market. The scale,
frequency and impact of security incidents are larger and larger and pose a serious threat
to the functioning of networks and information systems (Hydzik, 2019: 84-87).
The definition of operator of essential services is contained in Article 4(4) and Article
5(2) of the NIS (Network and Information Security) Directive 2016/1148 of 6 July 2016,
according to which ‘operator of essential services’ means a public or private entity of a
type referred to in Annex II, which provides a service which is essential for the
maintenance of critical societal and/or economic activities; the provision of that service
depends on network and information systems; and an incident would have significant
disruptive effects on the provision of that service (Karpiuk, 2021b: 238).
The ratio legis behind the ANCS is to protect users of digital services in a broad sense
from negative exposure to risks associated with the lack of an adequate degree of
cybersecurity (Wajda, 2020: 5). The correct implementation by operators of essential
services of the obligations imposed on them by the Act should, as planned by the
lawmakers, translate into an appropriate degree of protection in the space of digital
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services
under the Act on the National Cybersecurity System
103
services. These obligations comprise a very broad and complex range of activities
concerning, among other things, the obligation to implement systemic solutions for
managing security in the information system, the obligation to designate appropriate
structures responsible for cybersecurity, information obligations (in relation to users and
relevant authorities), obligations to implement appropriate procedures in the area of
cybersecurity, including in the area of incident response, and the obligation to conduct
audits in the area of cybersecurity (Chałubińska-Jentkiewicz, Karpiuk & Kostrubiec,
2021: 16). The implementation of these obligations is secured by the mechanism provided
for in the ANCS for the supervision of their implementation, as well as administrative
liability, i.e. the power to impose administrative penalties by competent authorities.
To sum up, it can be stated that the legislature has set very strict requirements for
operators of essential services, which may entail the need to rebuild the company structure
and a new division of powers and responsibilities in order to ensure an appropriate degree
of cybersecurity (Sawicki, 2019: 13-20). Hence, the procedure established in the ANCS
for identifying an entity as a provider of essential service is so important.
2
Procedure for the identification of operator of essential service
Recognition of a specific entity as an operator of essential services takes place through a
formalized procedure with specific guarantees, concluded with an administrative
decision. The procedure for identifying an operator of essential services is generally
governed in Poland by the provisions of the Act of 14 June 1960 the Code of
Administrative Procedure (consolidated text: Journal of Laws of 2021, item 735, as
amended), hereinafter referred to as CAP. The Act on the National Cybersecurity System
does not contain a direct reference to the provisions of the CAP. It seems that such a
reference is not necessary in the light of the principles of correct lawmaking, On the other
hand, the application of the provisions of the CAP is indicated by the reference to the
detailed regulation concerning the time limits for settling administrative matters
contained in Article 5(5) ANCS (the period for consultation referred to in paragraph 4
shall not be included in the time limits referred to in Article 35 of the Act of 14 June 1960
- Code of Administrative Procedure). Moreover, the requirements for the application of
the provisions of the CAP on jurisdictional proceedings set out in Article 1(1) CAP (the
Code of Administrative Procedure governs proceedings before public administration
bodies in individual matters falling within the jurisdiction of these bodies, resolved
through administrative decisions or settled on a tacit basis) must be met, and proceedings
in this matter have also not been explicitly excluded from the application of the Code in
Articles 3 and 4 CAP or in specific provisions of the Code.
The Act provides for a specific procedure for the competent authority to determine
whether the entity concerned meets the conditions to be considered an operator of
essential services. The authority may request a specific entity to provide information
allowing for a preliminary assessment of whether the entity meets the conditions to be
104
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services under
the Act on the National Cybersecurity System
considered as an operator of essential service (Article 43ANCS). Such a solution stems
from a very large number of entities that need to be verified. The procedure is
deformalised and shall take place without initiating administrative proceedings. This is
an exception to the fundamental principle of administrative law, namely the running of
jurisdictional proceedings to concretise the legal norm and to determine the rights and
obligations of supervised entities. Such a basic procedure in the Polish legal system is
the administrative procedure carried out on the basis of the Code of Administrative
Procedure. The competent authority requests the entity by way of a simple official letter
containing the questions which will allow an initial assessment whether it would be
appropriate to initiate the formal procedure. The request should specify a time limit to
provide the requested information, which must not be less than 14 days. The addressee
of the letter is not obliged to provide information. However, it should be pointed out that
the entity concerned may be interested in providing that information to avoid the initiation
of an administrative procedure, if the preliminary proceeding demonstrates that the
statutory conditions for considering the entity as an operator of essential service are not
met. The information provided by the entity will be able to be used as evidence in future
administrative proceedings.
As a rule, the administrative procedure for identification is initiated ex officio. However,
the provisions of the Code of Administrative Procedure do not prevent another authority
whose competence includes cybersecurity issues from drawing the competent authority's
attention to the need to initiate such proceedings. As part of its business, an important
piece of information for the entity running such business is the possibility of excluding it
from the requirements of the ANCS. It is therefore possible that an entity not recognised
as an operator of essential services may apply for such proceedings. The ANCS also does
not exclude the possibility of initiating such proceedings at the request of an NGO or
allowing this organization to participate in ongoing proceedings with the rights of a party,
if it is justified by the statutory objectives of this organization and if there is a public
interest in doing so (Article 31 §1(1) CAP).
The public administration body is not obliged to issue a separate decision on the initiation
of proceedings. The initiation of proceedings ex officio entails, in the light of Article 61
§ 4 CAP, the obligation to notify all the parties of this initiation. The case-law stresses
that the notification of the initiation of proceedings served to a party is not a value in
itself, but has a specific purpose, namely primarily to inform the parties that an
administrative procedure has begun in which they may need to defend their rights
(Judgment of the Supreme Administrative Court of 18 April 2008, case ref. no. II OSK
429/07, LEX no. 469206). On the other hand, when a party is served the notice of
initiation of proceedings, the Code requirements for the public administration body to
conduct proceedings under and within the limits of law are applicable, taking into account
the constitutional principles and general administrative procedural principles.
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services
under the Act on the National Cybersecurity System
105
The Act does not provide for a time limit to conclude the administrative procedure for the
adoption of an identification decision. Therefore, in this respect, reference should be
made to the time limits contained in the CAP. The handling of a case requiring
clarification proceeding should take place no later than one month and for a particularly
complex case no later than two months after the initiation of the proceedings (Article 35
§ 3 CAP).
The procedure for identifying an operator of essential services may be concluded with a
decision to recognise it an operator of essential services only if the competent authority
has determined that the entity meets the conditions for obtaining this status (of a systemic
and substantive nature). If, on the other hand, following clarification proceeding, the
authority finds that the conditions for considering an entity to be an operator of essential
services are not met, the procedure should also end with an administrative decision. The
provisions of the ANCS do not contain a separate regulation in this matter, so the
authority in such a situation should issue a decision to discontinue the proceedings
pursuant to Article 105 § 1 CAP.
According to Article 7 CAP, in the course of the proceedings, public authorities must
safeguard the rule of law, take all necessary steps, either ex officio or at the request of the
parties, to examine the facts thoroughly and to settle the case having regard to the public
interest and the legitimate interests of citizens. This provision expresses the principle of
objective truth, according to which a public authority is required to study thoroughly all
the facts in order to examine the case correctly, which is a necessary element in the proper
application of a norm of substantive law. This principle is mainly guaranteed by the rules
governing evidence taking. The authority is required to collect thorough evidence and
therefore to take a series of procedural steps to gather and consider all the evidence
(Article 77 § 1 CAP). In the course of the proceedings, it is also necessary to take account
of the principle of active participation of the parties in the proceedings by providing the
parties with access to the file of the case and by notifying them of the opportunity to
comment on the evidence collected and the service of the decision.
3
Conditions for considering an entity as an operator of essential services
The following entities shall be deemed operators of essential services: 1) those which are
listed in the annex to the ANCS and have an organisational unit in the territory of the
Republic of Poland; 2) which provide an essential service specified in the list of essential
services; 3) the provision of this service depends on information systems; 4) an incident
would have a significant disruptive effect on the provision of the essential service by this
operator (Article 5(1) and (2) ANCS).
Specific categories of entities are described in the annex to the ANCS to indicate potential
entities for which a decision to recognise them as operators of essential services may be
issued now or in the future, but this does not mean that such an entity will be automatically
106
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services under
the Act on the National Cybersecurity System
recognised as an operator of essential services. Essential service within the meaning of
Article 2(16) of the Act under is a service which is of key importance for maintaining a
critical social or economic activity, specified in the list of essential services. The list is
contained in the Ordinance of the Council of Ministers of 11 September 2018 on the list
of essential services and the thresholds of significance of the disruptive effect of an
incident on the provision of essential services (Journal of Laws of 2018, item 1806). For
an entity to be qualified as an operator of essential service, it is necessary that the
provision of the essential service is dependent on information systems. Information
system is defined in Article 2(14) ANCS as an ICT system referred to in Article 3(3) of
the Act of 17 February 2005 on computerisation of the activities of public task-performing
entities (consolidated text Journal of Laws of 2021, item 670) together with data in
electronic form processed in it. The case law points out that information system is a set
of cooperating IT devices and software ensuring the data processing (including storage,
as well as sending and receiving) by telecommunication networks by means of a
telecommunications device appropriate for a given type of network and designed to be
connected directly or indirectly to network terminals, together with the data processed in
it in electronic form (Judgment of the Regional Administrative Court of 5 August 2020,
VI SA/Wa 2667/19, LEX No. 3068097). In general, therefore, the dependence of the
provision of an essential service on information systems should be referred to such
circumstances in which the use of information systems is necessary for the continuous
and effective provision of the service in question.
The last condition for an entity to be considered an operator of essential services is related
to the fact that a cybersecurity incident, if any, has a significant disruptive effect on the
provision of the essential service by the entity. Cybersecurity is understood as the
resistance of information systems to activities that compromise the confidentiality,
integrity, availability and authenticity of the data processed or related services offered by
these systems (Article 2 (4) ANCS). According to Article 2(5) ANCS, incident is an event
that has or may have an adverse impact on cybersecurity. It is not sufficient for an entity
to provide an essential service in a manner that is dependent on information systems, but
it is further required that a possible incident affects (or could affect) the confidentiality,
integrity, availability and authenticity of the data processed for the provision of the
service or affects the provision of that service (e.g. interferes with its proper provision or
even prevents its performance).
What is legally relevant is not any impact of an incident on the provision of a service, but
rather causing an effect of a material nature that disrupts the provision of this service by
a given operator, e.g. one that affects continuity of provision of the service, quality of the
service, security of users, protection of users' data, etc. The degree of significance of the
incident is of a highly arbitrary nature. Possible effects of such an incident may depend
on many variables, such as the scale of provision of a given type of service, or the scale
of impact of the incident on economic or social activity. That is why it was necessary to
establish thresholds of significance of the disruptive effect, on the basis of which the
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services
under the Act on the National Cybersecurity System
107
competent authorities assess, in the course of the procedures for identification of operators
of essential services, the significance of the disruptive effect for a given service provided
by a particular operator. These thresholds are set out in the aforementioned Ordinance of
the Council of Ministers of 11 September 2018 on the list of essential services and the
thresholds of significance of the disruptive effect of an incident on the provision of
essential services.
The disruptive effect significance thresholds are set out in the Annex to the Ordinance for
each essential service sector. In general, these thresholds correspond to the cross-sectoral
factors set out in the provisions of Directive (EU) 2016/1148 of the European Parliament
and of the Council of 6 July 2016 concerning measures for a high common level of
security of network and information systems across the Union. As follows from Article
6(1) of the Directive, when determining the significance of a disruptive effect, Member
States must take into account at least the following cross-sectoral factors: 1) the number
of users relying on the service provided by the entity concerned; 2) the dependency of
other sectors referred to in Annex II on the service provided by that entity; 3) the impact
that incidents could have, in terms of degree and duration, on economic and societal
activities or public safety; 4) the market share of that entity; 5) the geographic spread with
regard to the area that could be affected by an incident; 6) the importance of the entity for
maintaining a sufficient level of the service, taking into account the availability of
alternative means for the provision of that service.
4
Decision on recognising an entity as an operator of essential service
The recognition as an operator of essential service is to be done by way of an
administrative decision. Administrative decision means a specific administrative act,
which is a manifestation of the will of public authorities administering the State, issued
under generally applicable administrative law of a sovereign and external nature,
resolving a specific case of a specific natural or legal person, in proceedings governed by
procedural rules (Judgment of the Supreme Court of 3 April 2000, I CKN 582/98, LEX
No. 50843; Zdyb, Stelmasiak 2020: 220-224). The constituent elements of administrative
decision are listed in Article 107 CAP. This provision obliges the authority to clarify all
relevant factual and legal circumstances and to explain to the party the reasons behind the
decision on handling the party's request. The statement of reasons for the decision must
be drafted in such a way as to make it possible to understand the body’s reasoning and to
review correctness of the decision. A precondition for the recognition as an operator of
essential services is that all the above-mentioned conditions must be met cumulatively,
which should be reflected in the factual and legal substantiation for the decision. The legal
basis for the decision in question should be the following provisions: Article 5 1 ANCS
(systemic condition), Article 5 (2) ANCS (substantive condition) and Article 41(1) and
Article 42 (1) item 2 ANCS (competent authority).
108
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services under
the Act on the National Cybersecurity System
Factual findings should concern all the conditions for the recognition as an operator of
essential service. The competent authority may not confine itself to identifying the
evidence gathered in the case and referring to the content of the provisions applicable to
the case. It is also necessary to establish and demonstrate a link between various
conditions, in particular regarding the provision of a particular service, with the fact that
it depends on the functioning of the information system, or to analyse the significance of
the disruptive effect.
As a rule, a decision must not be enforced before the time limit for lodging an appeal
against it, and lodging an appeal suspends its enforcement. However, the legislation
provides for quite numerous exceptions to this rule. This is because a decision may be
subject to the obligation of immediate enforceability by virtue of law or where the
requirement of immediate enforceability is conferred on it by a public administration
body pursuant to Article 108 CAP. "The state of immediate enforceability of a decision"
consists in the possibility of immediate enforceability of the decision, which becomes an
enforcement order, despite being not final (judgment of the Supreme Administrative
Court of 7 December 2018, I OSK 3311/18, LEX No. 2628876). Article 5 (7) ANCS
indicates that the decision on recognition of an entity as an operator of essential services
is subject to immediate enforcement. Contrary to the literal wording of the Act, it should
be assumed that the decision is not immediately enforceable by operation of law, but the
competent authority is obliged to declare ex officio the decision on recognition as an
operator of essential service immediately enforceable (Besiekierska, 2019). However,
the immediate enforceability of a decision does not mean that the obligations imposed by
the Act on the operator are promptly applicable. The individual obligations imposed by
the law are to be fulfilled by the operator within the time limits set out in Article 16
ANCS: from 3 months to a year from the date of service of the decision. The essence of
this solution is to oblige operators of essential services to undertake performing the
obligations imposed by the ANCS as soon as possible (Wajda, 2020: 9). It is the right
solution from the point of view of clients of these services since the operator, regardless
of filing the appeal to the administrative court, will be required to ensure the provision of
services with an appropriate degree of cybersecurity.
An entity recognised in the decision as an operator of essential services may appeal
against the decision to an administrative court. A party dissatisfied with the decision of
the body may also exercise the right provided for in Article 127 § 3 CAP, according to
which a decision issued in the first instance by the Minister may not be appealed against,
but a party dissatisfied with the decision may apply to this body for reconsideration of the
case; the provisions on appeals against decisions shall apply accordingly to such an
application. The relevant case law indicates that in the proceedings for reconsideration of
the case, similarly as in appeal proceedings, the administrative body is obliged to
reconsider the case in its entirety, including in particular to respond to the allegations and
arguments contained in the request for reconsideration (judgment of the Supreme
Administrative Court of 19 March 2019, II OSK 1132/17, LEX No. 2655883). In the
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services
under the Act on the National Cybersecurity System
109
ANCS, the legislature also regulated a situation similar to the regulation contained in
Article 162 CAP, i.e. declaring a decision expired due to its groundlessness. In relation
to an entity which no longer meets the conditions for being recognised as an operator of
essential services, the competent authority for cybersecurity makes a decision stating that
the decision on recognition as an operator of essential services has expired (Article 5(6)
ANCS). The proceedings in this matter may be initiated ex officio, but in practice this is
most often done at the request of an interested entity.
5
Conclusion
The cybersecurity obligations contained in the Act on the National Cybersecurity System
concern, inter alia, the implementation of an effective security management system,
including risk management, procedures and mechanisms for reporting and handling
incidents or organisation of structures at operator level. However, the annex to the Act
lists potential categories of entities in particular sectors of the economy and government
activities, from which operators of essential services may be selected through an
administrative decision. The criteria for identifying operators of essential services set out
in the Act on the National Cybersecurity System meet the requirements referred to in
Directive 2016/1148. Recognition of a specific entity as an operator of essential services
takes place through a formalized procedure with specific guarantees, based as a rule on
the provisions of the Code of Administrative Procedure.
110
THE PUBLIC DIMENSION OF CYBERSECURITY
D. Lebowa: Procedure for the Identification of an Operator of Essential Services under
the Act on the National Cybersecurity System
References:
Besiekierska, A. (ed.) (2019) Ustawa o krajowym systemie cyberbezpieczeństwa. Komentarz
(Warszawa: C.H. Beck).
Chałubińska-Jentkiewicz, K., Karpiuk, M. & Kostrubiec, J. (2021) The Legal Status of Public
Entities in the Field of Cybersecurity in Poland (Maribor: Institute for Local Self-Government),
https://doi.org/10.4335/2021.5.
Hydzik, W. (2019) Cyberbezpieczeństwo i ochrona danych osobowych w świetle regulacji
europejskich i krajowych, Przegląd Ustawodawstwa Gospodarczego, 3, pp. 84-87.
Karpiuk, M. (2021a) The Local Government’s Position in the Polish Cybersecurity System, Lex
Localis
–
Journal
of
Local
Self-government,
19(3),
pp.
609-620,
https://doi.org/10.4335/19.3.609-620(2021).
Karpiuk, M. (2021b) The organisation of the national system of cybersecurity. Selected issues,
Studia Iuridica Lublinensia, 30(2), pp. 233-224, http://dx.doi.org/10.17951/sil.2021.30.2.233244.
Sawicki, M. (2019) Kilka uwag na temat ochrony infrastruktury krytycznej w internecie na tle
dyrektywy NIS i jej transpozycji do polskiego porządku prawnego, Europejski Przegląd Sądowy,
9, pp. 13-20.
Wajda, P. (2020) Cyberbezpieczeństwo – sektorowe aspekty regulacyjne, Internetowy Kwartalnik
Antymonopolowy i Regulacyjny, 2, pp. 9-27.
Zdyb, M. & Stelmasiak, J. (eds.) (2020) Prawo administracyjne. Część ogólna, ustrojowe prawo
administracyjne, wybrane zagadnienia materialnego prawa administracyjnego (Warszawa:
Wolters Kluwer).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Supervision and Inspection in the Field of Cybersecurity
MAŁGORZATA CZURYK
1
Abstract The national cybersecurity system consists of a number of entities
that play important roles in protecting cyberspace from threats, including
those compromising the normal functioning of the state. The national
cybersecurity system aims to ensure national cybersecurity, including the
uninterrupted provision of critical and digital services, by achieving an
adequate level of security within the information systems used to provide
these services and ensuring incident handling. Supervision and inspection
in terms of compliance with security requirements covers providers of
cybersecurity services, operators of essential services, as well as digital
service providers.
Keywords: • supervision • inspection • cybersecurity • essential service •
digital service
CORRESPONDENCE ADDRESS: Małgorzata Czuryk, Ph.D., Dr. Habil., University Professor, University of
Warmia and Mazury in Olsztyn, Faculty of Law and Administration, ul. Obitza 1, 10-725 Olsztyn, Poland, email:
[email protected], ORCID: 0000-0003-0362-3791.
https://doi.org/10.4335/2022.1.11
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
112
1
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
Introduction
Cybersecurity can be seen in both public and private aspects. The development of
information technologies has, on the one hand, resulted in much greater opportunities for
the rapid acquisition, transmission, or collection of information, while on the other hand,
new threats have arisen that occur in cyberspace. In view of the great importance of ICT
systems and networks, both for the economic and public sphere, the state must have
appropriate tools to combat cyberattacks, especially those that are relevant to its
functioning. It is the purpose of supervision and inspection to prevent unwanted incidents
in cyberspace, thus ensuring cybersecurity at an appropriate level and allowing the
uninterrupted performance of public tasks. The ideal state of being free of all disruptions
is not achievable, so the realistic objective is to ensure a level of cybersecurity that allows
public needs to be met uninterruptedly, while maintaining appropriate quality standards
and adequate availability of services at optimal cost of service provision.
Cybersecurity involves the prevention of threats, their anticipation, as well as the removal
of consequences arising from their occurrence. The sphere in which such threats and
threat outcomes occur is cyberspace (Karpiuk, 2021a: 612). According to Article 2(4) of
the Act of 5 July 2018 on the National Cybersecurity System (consolidated text, Polish
Journal of Laws of 2020, item 1369, as amended) – the Act is hereinafter referred to as
the ‘NCSA’, cybersecurity is the resilience of information systems against actions which
compromise the confidentiality, integrity, availability and authenticity of processed data,
or the related services provided by those information systems. As information systems
develop, an adequate protective infrastructure must also be created to ensure security in
cyberspace.
Nowadays, cybersecurity is very important, and the consequences of actions that
undermine this type of security are experienced not only in the public sphere, but also in
the economic and social spheres. Therefore, the state must react quickly and decisively to
cyberattacks by looking for ever more modern protection mechanisms (among other
actions). Responding to the increasingly frequent threats to cyberspace, the legislators
have decided that an appropriate legal regulation is necessary, allowing for both a proper
diagnosis and an adequate response in the event of cyberattacks (Karpiuk, 2021b: 234).
In today’s highly computerised world, in addition to the activities of public entities in
ensuring the security of various resources, technical protection is increasingly needed
(Chałubińska-Jentkiewicz, Karpiuk, Kostrubiec, 2021: 52).
Under the Act of 5 July 2018 on the National Cybersecurity System (consolidated text,
Polish Journal of Laws of 2020, item 1369, as amended), supervision and inspection
applies to operators of essential services, digital service providers and providers of
cybersecurity services, and it is these aspects that the analysis will focus on. An essential
service, according to Article 2(16) of the NCSA, is a service that is deemed essential in
maintaining critical social or economic activity and which is included on the list of
essential services. A digital service, according to Article 2(15) of the NCSA, is an
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
113
electronically supplied service. Provision of an electronically supplied service is,
according to Article 2(4) of the Act of 18 July 2002 on Providing Services by Electronic
Means (consolidated text, Polish Journal of Laws of 2020, item 344, as amended), the
performance of a service rendered without the simultaneous presence of the parties (at a
distance), through the transmission of data at the individual request of the customer, sent
and received by means of electronic processing devices, including digital compression
and data storage, which is entirely broadcast, received or transmitted via a
telecommunications network. At the same time, telecommunications networks, pursuant
to Article 2(35) of the Act of 16 July 2004 – Telecommunications Law (consolidated text,
Polish Journal of Laws of 2021, item 576, as amended), should be understood as
transmission systems and switching or routing equipment, as well as other resources,
including inactive network elements, that enable the broadcasting, reception or
transmission of signals by wire, radio, optical or other electromagnetic means, regardless
of their type.
2
The concept of supervision and inspection
The concept of supervision should be understood as such shaping of mutual relations
between public administration entities, in which the supervisory entity has the power to
directly interfere with the activities of the supervised entity (Polinceusz, 2013: 312).
Supervision is an institution that enables authoritative interference in the sphere of
activity of the supervised entity when irregularities are detected. The criteria, as well as
the supervisory authorities, and the scope of supervision must be clearly specified by the
legislators. It cannot be presumed that there is any authoritative interference with the
sphere of independence of supervised entities; such interference must be clearly provided
for in statutory-grade generally applicable laws. If there is no clear legal basis for
initiating the supervisory procedure, it is not permissible.
The concept of inspection is a multidimensional term that applies to all forms of
organisation of social life, therefore it can be used in various semantic contexts
(Kostrubiec, 2013: 329). The purpose of inspection – as provided for in Article 3 of the
Act of 15 July 2011 on Inspection in State Administration (consolidated text, Polish
Journal of Laws of 2020, item 224, as amended) – the Act is hereinafter referred to as the
‘ACSA’ – is to assess the activity of the inspected entity on the basis of established facts,
subject to the adopted inspection criteria. Where irregularities are found, the purpose of
inspection is also to determine their extent, causes and effects, as well as those
responsible, and to formulate recommendations aimed at correcting the irregularities.
Inspection can be conducted under an ordinary and simplified procedure. It should be
emphasised, however, as provided for in Article 51(1) of the ACSA, that inspection can
be ordered in a simplified procedure in cases justified by the nature of the case or urgency
of inspection activities.
114
3
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
Supervision in the field of cybersecurity
The issues of supervision in the application of the provisions of the NCSA, therefore, in
the field of cybersecurity, are set out in Article 53 of the NCSA. This supervision,
according to Article 53(1) of the NCSA, is exercised by: 1) the minister competent for
computerisation in respect of the fulfilment by the providers of cybersecurity services of
the requirements concerning: a) the fulfilment of organisational and technical conditions
making it possible to ensure cybersecurity to the served operator of an essential service;
b) the possession of premises for the provision of incident response services, protected
from physical and environmental threats; c) the application of a safeguard to ensure
confidentiality, integrity, availability and authenticity of the processed information,
taking into account personal security, operation and architecture of the systems; 2) the
competent authorities for cybersecurity with regard to: a) fulfilment by operators of
essential services of their obligations under the Act with respect to countering
cybersecurity threats and reporting serious incidents; b) compliance by providers of
cybersecurity services with the security requirements of their services and performance
of their obligations with respect to reporting major incidents; this concerns both the
application of appropriate technical and organisational measures, acting on the basis of
risk analysis, identifying threats, or proper management of ICT networks and systems.
Pursuant to Article 41 of the NCSA, the competent authorities for cybersecurity, who also
exercise supervision, include: 1) for the energy sector – the minister competent for
energy; 2) for the transport sector, excluding the water transport sub-sector – the minister
competent for transport; 3) for the water transport sub-sector – the minister competent for
the maritime economy and the minister competent for inland navigation; 4) for the
banking sector and financial markets infrastructure – the Polish Financial Supervision
Authority; 5) for the healthcare sector – the minister competent for health; 6) for the
healthcare sector and the digital infrastructure sector covering entities subordinated to the
Minister of National Defence or supervised by him and enterprises of special economic
and defence importance in respect of which the Ministry of National Defence is the
authority organising and supervising the performance of tasks for state defence – the
Minister of National Defence; 7) for the drinking water supply and distribution sector –
the minister competent for water management; 8) for the digital infrastructure sector and
digital service providers – the minister competent for computerisation. As a rule,
therefore, the supervisory authorities are ministers in charge of a specific department of
government administration, only in the case of the banking sector and financial market
infrastructure is it the Polish Financial Supervision Authority.
As part of the supervision of operators of essential services, digital service providers and
providers of cybersecurity services, pursuant to Article 53(2) of the NCSA: 1) the
competent authority for cybersecurity or the minister competent for computerisation
exercises inspection on compliance with security requirements and obligations in this
respect; 2) the competent authority for cybersecurity imposes fines on operators of
essential services and digital service providers. Supervision in the field of cybersecurity
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
115
is carried out in two stages: first, inspection is conducted, covering the performance of
obligations on countering cybersecurity threats and reporting incidents, as well as meeting
requirements to ensure cybersecurity, including the security of digital services provided.
Where irregularities are found, the competent authority for cybersecurity may impose a
fine on the supervised entity. In the case of a digital service provider, a fine is imposed
upon evidence that it fails to comply with the security requirements of the digital services
provided or the statutory obligations regarding the reporting of material incidents.
4
Cybersecurity-related inspection
If the inspection concerns an entity that is an entrepreneur, pursuant to Article 48 of 6
March 2018 – the Entrepreneurs Law (consolidated text, Polish Journal of Laws of 2021,
item 162, as amended) – the Act is hereinafter referred to as the “EL” – the inspection
authority notifies the entrepreneur of its intention to initiate an inspection. The inspection
is initiated no sooner than after 7 days and no later than after 30 days from the date of
delivery of the notice on the intention to initiate inspection. At the request of the
entrepreneur, inspection may be initiated within 7 days from the date of delivery of the
notice. If inspection is not initiated within 30 days from the delivery of the notice, the
initiation of the inspection requires a new notice. The lack of a notice of inspection
undoubtedly has a significant impact on the inspection’s outcome. It prevents the
entrepreneur from proper preparation for the inspection activities. Nevertheless, since the
law stipulates that an effective notice is a necessary condition for conducting inspection,
prior to its initiation, the inspecting entity is obliged to have evidence of delivery of a
relevant notice to the entrepreneur (judgement of the Voivodeship Administrative Court
in Warsaw of 25 October 2017, VI SA/Wa 1122/17, LEX No. 2425534). A notice of the
intention to initiate inspection is not issued, among others, in the event when: 1)
inspection is to be conducted in accordance with the ratified international agreement or
directly applicable provisions of the European Union law; 2) the inspection must be
conducted to prevent an crime or petty offence, a fiscal crime or a fiscal petty offence, or
to secure the evidence that such offence or crime has been committed; 3) the inspection
is justified when there is a direct threat to life, health or the environment; 4) the
entrepreneur does not have the address of residence or the registered address, or the
delivery of letters to the given addresses was ineffective or difficult.
It does not follow from the regulations that the inspection authority, in explaining the
reasons for an inspection without prior notice, is required, at the moment of its initiation,
to provide the justification for accepting such a basis for inspection, indicating why such
inspection is, for example, essential to prevent the commission of an crime or a petty
offence, a fiscal crime or a fiscal petty offence, or to secure the evidence of its
commission. In view of these considerations, it seems hardly justified to warn the
inspected entity about the evidence that the authority will look for as part of the initiated
proceedings. Therefore, the citation of the relevant legal basis should be treated as
sufficient (judgement of the Supreme Administrative Court of 28 September 2017, I FSK
1125/17, LEX No. 2404466). The list of exemptions from the obligation to notify about
116
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
the inspection indicates that the legislators included it in special cases, related to the
protection of particularly socially sensitive goods, where the balance of the entrepreneur’s
interest related to the possession of information about the planned inspection and the
protection of these goods by the inspection authorities speaks in favour of the primacy
for the protection and possibly rapid response to threats or pathologies. And it is
indisputable here that the inspection authority, within the scope of its competence, may
act ex officio and the source from which the authority obtained information about the
threat is of no significance (judgement of the Supreme Administrative Court of 29
December 2015, II OSK 1001/14, LEX No. 1999995).
A person conducting inspection related to entities that operate as businesses – as provided
for in Article 55 of the NCSA – has the right to: 1) freely enter and move around the
premises of the inspected entity without the obligation to obtain a pass; 2) access
documents related to the activity of the inspected entity, collect against a receipt and
secure documents related to the scope of inspection, while observing the provisions on
legally protected secrets; 3) prepare, and if necessary request the preparation of, copies,
excerpts or extracts of documents, as well as statements or calculations indispensable for
the inspection; 4) process personal data as needed for the achievement of the inspection
objective; 5) request to provide oral or written explanations in matters related to the scope
of inspection; 6) perform the visual inspection of devices, carriers and information
systems. These are the standard inspection powers that make it possible to verify the facts
and identify possible irregularities.
Article 56 of the NCSA imposes obligations on inspected entrepreneurs that make it
possible to conduct inspections efficiently. Inspected entities that are entrepreneurs
provide the inspecting person with the conditions necessary to efficiently conduct the
inspection – in particular, by ensuring the immediate presentation of requested
documents, providing oral and written explanations in a timely manner in matters covered
by the inspection, providing access to the necessary technical equipment, as well as
making copies or printouts of documents and information collected on carriers, in devices
or in information systems on their own. The inspected entity certifies copies or printouts
as true copies of the originals. In the event of refusal to certify consistency with the
originals, they are confirmed by the inspecting person, who makes a note about this fact
in the inspection report. Without access to documentation or explanations from the
entrepreneur, it may prove impossible to conduct the inspection. Therefore, the legislators
have imposed an obligation on the inspected entity to immediately present the requested
documents, provide oral and written explanations in a timely manner, as well as to make
the necessary technical equipment available, or to make copies or printouts of documents.
It should be emphasised, however, that all these obligations may not go beyond the scope
of the inspection, i.e. the inspection authority may not demand more information than
required by the scope of the inspection.
The details of the inspection are documented in a report. Pursuant to Article 58 of the
NCSA, the person inspecting entities that are entrepreneurs shall present the details of the
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
117
inspection in a inspection report. An inspection report provides: 1) the name or first name
and surname and address of the inspected entity; 2) the first name and surname of the
person representing the inspected entity and the name of the body representing this entity;
3) the first name and surname, position and authorisation number of the inspecting person;
4) the start and end dates of inspection activities; 5) the subject and scope of the
inspection; 6) the facts established in the course of the inspection and other information
essential for the conducted inspection, including the scope, reasons and effects of the
irregularities found; 7) attachments, if any. This is the basic information that makes it
possible to take relevant decisions at a later stage, particularly to identify irregularities
and persons responsible for them, especially if it proves necessary to take appropriate
punitive measures against the inspected entity.
A inspection report is signed by the inspecting person and the person representing the
inspected entity. Prior to signing the report, the inspected entity may, within 7 days from
the date of its presentation for signing, make written reservations to the report. If
reservations are made, the inspecting person analyses them and, if necessary, takes
additional inspection steps. In the event that the reservations are justified, the inspecting
person changes or supplements the relevant part of the report in the form of an annex to
the report. In the event that the reservations are not accepted in whole or in part, the
inspecting person informs the inspected entity in writing. A reservation may not be made
after the inspection report has been signed. The inspecting person makes a note on the
refusal to sign the report, including the date of such refusal. The report in paper form is
drawn up in two copies, one of which is left for the inspected entity, and if the report is
drawn up in electronic form, it is delivered to the inspected entity.
Pursuant to Article 51 of the EL, the inspection is conducted in the entrepreneur’s
registered office or place of business, and during working hours or at the time of the actual
performance of business activity by the entrepreneur. Upon the entrepreneur’s consent or
request, the inspection is conducted in the place where documentation, including tax
books, is stored other than the registered office or place of business to facilitate the
inspection. With the consent of the entrepreneur, the inspection, or individual inspection
activities, may also be conducted in the registered office of the inspection authority to
facilitate the inspection. Subject to the entrepreneur’s consent, the inspection, or
individual inspection activities, may be conducted remotely via a postal operator or by
electronic means of communication, if this serves to facilitate the inspection or is justified
by the nature of the business activity conducted by the entrepreneur. If, in cases requiring
the consent or request of the entrepreneur, the inspection authority undertook inspection
activities without such consent or request, the documents and information collected in the
course of such activities do not constitute evidence in the inspection proceedings.
Inspection activities should be performed in an efficient manner and in such a way as not
to disturb the functioning of the entrepreneur’s business. In the event that the entrepreneur
indicates in writing that the performed activities significantly interfere with the
entrepreneur’s business activity, the necessity to undertake such activities shall be
118
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
justified in the inspection report. This rule is introduced by Article 54 of the EL. The
purpose of the entrepreneur’s activity is to conduct business, and the inspection may not
lead to the suspension of the business activity – it may limit it, but only to the extent
necessary to achieve the objective of the inspection. The inspection may not be excessive,
and it should create as little burden for the entrepreneur as possible.
If deficiencies are identified, the inspection authority may issue follow-up
recommendations to the inspected entity. Pursuant to Article 50 of the NCSA, if, on the
basis of the information contained in the inspection report, the competent authority for
cybersecurity or the minister competent for computerisation recognises that there may
have been a breach of the provisions of the NCSA by the inspected entity, it will issue
follow-up recommendations concerning the removal of irregularities. The follow-up
recommendations may not be appealed against. The inspected entity is required, within
the prescribed time limit, to inform the competent authority for cybersecurity or the
minister competent for computerisation on the manner in which the recommendations
have been implemented.
5
Conclusion
Supervision and inspection related to cybersecurtiy (and other areas) is exercised and
conducted by the authorities expressly mentioned by the legislators, including in the
NCSA. Supervisory and inspection powers may not be presumed due to the onerousness
of these measures for the the entities that are supervised and inspected. Specific solutions
in this regard are provided in Article 60 of the EL, on the basis of which the executive
body of a municipality may take actions aimed at suspending the entrepreneur’s business
activity, including if it does not meet the conditions provided for ensuring cybersecurity,
and, at the same time, leads to qualified threats. Pursuant to this provision, in the event
that a threat to life or health, danger of substantial damage to property or a direct threat
to the environment is identified as a result of the performance of this activity, the
commune head or the mayor of the city must immediately notify the competent authorities
– in this case, the competent authorities competent cybersecurity, as set out in the NCSA.
The notified authorities shall immediately apprise the commune head or the mayor of the
city of the actions taken. Should it be impossible to inform the competent authorities, the
commune head or the mayor of the city may order the entrepreneur, by way of a decision,
to suspend business activity for a necessary period of time, not longer than three days.
The decision ordering the suspension of business activity in the event of a threat to life or
health, danger of substantial damage to property or a direct threat to the environment as
a result of the performance of such activity is immediately enforceable. The
entrepreneur’s business activity may be suspended where the entrepreneur fails to comply
with their obligations with respect to countering cybersecurity threats and incident
reporting and where, at the same time, this has led to a threat to life or health, danger of
substantial damage to property or a direct threat to the environment.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Czuryk: Supervision and Inspection in the Field of Cybersecurity
119
The tasks to be completed by the inspection should be specified in terms of the
functioning of the entire cybersecurity system. An effective inspection system should
contribute to ensuring that the implementation processes run properly and that the best
possible results are achieved in each activity. Several elements contribute to the
effectiveness of inspection activities. One is the proper selection of the subject matter of
the inspection. Professionalism of the inspection is also important. This term should be
understood as the due preparation of the inspectors, both substantive and ethical
(Nowikowska, 2021: 100). Professionalism is the element of the inspection that is
manifested in the substantive and organisational preparation of the inspecting entity,
whose employees have sufficient knowledge and experience (Kostrubiec, 2013: 331).
References:
Chałubińska-Jentkiewicz, K., Karpiuk, M. & Kostrubiec, J. (2021) The Legal Status of Public
Entities in the Field of Cybersecurity in Poland (Maribor: Lex Localis),
https://doi.org/10.4335/2021.5.
Karpiuk, M. (2021a) The Local Government’s Position in the Polish Cybersecurity System, Lex
Localis – Journal of Local Self-Government, 3, pp. 609-620, https://doi.org/10.4335/19.3.609620(2021).
Karpiuk, M. (2021b) The Organisation of the National System of Cybersecurity: Selected Issues,
Studia Iuridica Lublinensia, 2, pp. 233-244, http://dx.doi.org/10.17951/sil.2021.30.2.233-244.
Kostrubiec, J. (2013) Kontrola administracji publicznej, In: Karpiuk, M. & Kowalski, J. (eds.)
Administracja publiczna i prawo administracyjne w zarysie (Iuris: Warszawa-Poznań), pp. 329364.
Nowikowska, M. (2021) Nadzór i kontrola operatorów usług kluczowych, dostawców usług
cyfrowych i podmiotów świadczących usługi w zakresie cyberbezpieczeństwa, Cybersecurity
and Law, 1, pp. 77-103.
Polinceusz, M. (2013) Nadzór nad administracją publiczną, In: Karpiuk, M. & Kowalski, J. (eds.)
Administracja publiczna i prawo administracyjne w zarysie (Iuris: Warszawa-Poznań), pp. 311327.
120
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Procedural Provisions in the Convention on Cybercrime
FILIP RADONIEWICZ
1
Abstract The objective of this study is to analyse the solutions provided in
the Council of Europe Convention on Cybercrime (ETS No. 185) of 23
November 2001 with regard to criminal procedures concerning the
obtaining and preservation of evidence in the form of computer data, i.e.
preservation of data (Articles 16 and 17), and four measures aimed at data
collection (production orders – Article 18, search and seizure of stored
computer data -– Article 19, real-time collection of traffic data – Article
20, and interception of content data – Article 21). The investigation of this
subject-matter is preceded by an introductory part in which the key notions
defined in the Convention on Cybercrime – namely computer data,
computer system, service provider and traffic data – are discussed.
Keywords: • cybercrime • online search • on-line operational activities •
hacking • interception of content data
CORRESPONDENCE ADDRESS: Filip Radoniewicz, Ph.D., War Studies University, Department of Cyber Security
Law and New Technologies, Institute of Law, Centre for Cybersecurity Studies, Aleja Generała Antoniego
Chruściela „Montera” 103, 00-910 Warsaw, Poland, e-mail:
[email protected], ORCID: 00000002-7917-4059.
https://doi.org/10.4335/2022.1.12
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
122
1
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
Introduction
The Convention on Cybercrime (the Council of Europe Convention on Cybercrime (ETS
No. 185) of 23 November 2001) is the first international treaty that deals with combating
crimes committed with the use of the Internet and computer networks.
Representatives of most Member States of the Council of Europe (including Poland) and,
in the capacity of observers, delegates from the USA, Japan and Canada, representatives
of EU institutions and independent experts took part in the works on the Convention,
which took over four years to be completed. The objective of the Convention on
Cybercrime was to create a legal framework for prosecuting crimes. Numerous innovative
solutions were proposed in the Convention (innovative at the time – we should bear in
mind that it was being drafted at the end of the last century). The list of offences was
extended in relation to previous international documents (Computer-Related Crime.
Analysis of legal policy in the OECD Area, OECD, ICCP Series No. 10, Paris 1986;
Recommendation No. R (89) 9 on computer-related crime and final report of the
European Committee on Crime Problems, Council of Europe, Publishing and
Documentation Service, Strasbourg 1990). They include, i.a., illegal access, illegal
interception, data interference, system interference, offences related to hacking tools –
misuse of devices, computer-related forgery, computer-related fraud, offences related to
child pornography, offences related to infringements of copyright and related rights). It
also includes provisions concerning the penal liability related to individual stages of an
offence (attempt), the forms of accessory liability (aiding and abetting), and corporate
liability (this term is understood also as the liability of non-corporate organisational
units). The Convention also sets out a number of procedural solutions, such as the
preservation of data, search and seizure of stored computer data, etc. These were included
in Section 2 of the Convention (Procedural law). They should, first and foremost, be
applied to proceedings concerning “conventional” offences (i.e. offences established in
accordance with Articles 2 through 11 of the Convention). In addition, they should be
applied in relation to all other offences committed by means of a computer system, and
the collection of evidence in electronic form in the course of criminal proceedings
concerning other offences (Radoniewicz, 2016: 162-165).
2
Explanation of key terms
Before the provisions stipulated in Section 2 of the Convention are discussed, it is
necessary to explicate the most important terms, i.e. “computer system”, “computer data”,
“service provider” and “traffic data”.
In the light of Article 1(a) of the Convention, a “computer system” means any device or
a group of interconnected or related devices, one or more of which, pursuant to a program,
performs automatic processing of data.
According to the Explanatory Report (Explanatory Report to Convention on Cybercrime
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
123
– a commentary to the Convention prepared by its authors, Points 23 and 24), a “computer
system” is a device consisting of hardware and software. “Hardware” may include input,
output and storage facilities. A ‘computer program’ is a set of instructions that can be
executed by the computer system to achieve the intended result. A “computer system”
usually consists of different devices. A “central processing unit” is the indispensible
component. Other elements are “optional” and include “peripherals” (devices that
perform certain specific functions in interaction with the processing unit, such as a video
screen, printer, DVD reader/writer or other storage devices, etc.). In the light of the
Convention on Cybercrime, computer systems include mobile phones, decoders and,
most of all, a device which is commonly understood as a stand-alone “personal computer”
(PC), i.e. a single host. Furthermore, two or more independent interconnected computer
systems (i.e. able to communicate computer data) comprise a “network”. The connections
through which data is transmitted may be earthbound (e.g., wire or cable) and/or wireless
(e.g., radio). A network may have a different geographical reach – from small “local area
networks” (LANs) – composed of several computers, to networks spanning a large area
(“wide area networks” – WANs). Computer systems may be connected to the network as
endpoints (single hosts, decoders, phones, etc.) or as a means to assist in the data transfer
process, such as routers or servers. The prerequisite for considering a given structure a
network is the exchange of data over the network.
“Computer data” means any representation of facts, information or concepts in a form
suitable for processing in a computer system, including a program suitable to cause a
computer system to perform a function.
As per Article 1(c) of the Convention, the term “service provider” is understood as 1) any
public or private entity that provides to users of its service the ability to communicate by
means of a computer system, and 2) any other entity that processes or stores computer
data on behalf of such communication service or users of such service.
In general, the term “service provider” encompasses two categories of entities: “content
providers”, i.e. entities providing access to their own services (content) (e.g. web portal
operators), and entities intermediating in the access to services – “intermediary service
providers”, broken down into “access providers” and “service providers”, namely entities
which transmit, store and provide access to information on the Internet. In some cases the
same entity performs both functions, e.g. a web portal operator may at the same time post
its own content (thus being a content provider) and render services to other entities, e.g.
a hosting service (storage of data provided by third parties – clients). This usually consists
in providing access to own servers (or, for instance, virtual digital platforms). It might
include, for example, the maintenance of a client’s website on a server, in which event,
the service provider concerned assumes the role of an intermediary service provider. This
distinction is significant from the legal point of view, due to the exclusion of liability in
the event of rendering certain services by entities belonging to the last group (i.e.
intermediary service provider offering the aforementioned hosting, mere conduit and
caching (temporary and automated data storage in order to accelerate further access to it
124
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
– e.g. downloading the most popular websites among network users to the servers of a
local area network to facilitate fast access to them).
Based on the definition provided in Article 1(c), it can be inferred that, for the purpose of
the Convention on Cybercrime, the term ‘service providers’ refers only to the group of
intermediary service providers. According to the definition, they encompass public or
private entities which provide the users of its services the ability to communicate by
means of a computer system, or other entities that process or store computer data on
behalf of such communication service or users of such service (which means that they
have mere conduit, hosting or caching in their service portfolio).
Under Article 1(d) of the Convention, “traffic data” is defined as any computer data
relating to a communication by means of a computer system, generated by a computer
system (e.g. a mobile phone, a computer, but also router or server, as points on the data
transfer route) that formed a part in the chain of communication, indicating the
communication’s origin (a place where data transfer was initiated, expressed as, most of
all, an IP address, optionally a phone number, or a similar identification of a
communications facility to which a service provider renders services), destination (the
identification data of a communications facility to which communications are transmitted
is the same as that of the communications facility being a location where data transfer
was initiated), route, time, date, size, duration, or type of underlying service (e.g. file
transfer, or electronic mail). Traffic data can assume a dynamic form, i.e. data on
transmission (data included in packet headers) and static form, such as system logs stored
in firewalls, routers or servers (including information about any events taking place in the
networks, including the details of participating entities). E-mail addresses and IP
addresses are undoubtedly traffic data.
Certain doubts may arise when qualifying URL addresses or search criteria entered in a
search engine. On the one hand, it is a set of simple instructions in a binary code, allowing
users to obtain information from the web. In this context, they have the features of traffic
data. On the other hand, they constitute a form of communication, because they indicate
what a given user has in mind by entering a URL address or a phrase in a search engine.
Similar issues can be observed as regards HTTP requests that may include such
information as user's e-mail address, recently visited websites or search criteria (Clough,
2013: 153-154).
3
Conditions and safeguards
In Article 15 of the Convention, emphasis was placed on the protection of human rights.
Pursuant to this provision, the establishment, implementation and application of the
powers and procedures provided for in the Convention are subject to conditions and
safeguards provided for under the domestic law of each Party, which should ensure the
adequate protection of human rights and liberties, including rights arising pursuant to
obligations it has undertaken under the 1950 Council of Europe Convention for the
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
125
Protection of Human Rights and Fundamental Freedoms (ECHR), the 1966 United
Nations International Covenant on Civil and Political Rights, and other applicable
international human rights instruments. It was also stressed that the adopted measures
must incorporate the principle of proportionality, and such conditions and safeguards
should, as appropriate in view of the nature of the procedure or power concerned, inter
alia, include judicial or other independent supervision, grounds justifying application, and
limitation of the scope and the duration of such power or procedure. To the extent that it
is consistent with the public interest, in particular the sound administration of justice, each
Party is obliged to consider the impact of the powers and procedures in this section upon
the rights, responsibilities and legitimate interests of third parties. Since the Convention
is to be applied by states having different legal systems, it is not possible to define the
conditions and safeguards applicable for each power and procedure provided for in its
provisions. Therefore, certain common standards and minimum safeguards to be observed
by Parties to the Convention have been indicated. These include standards or minimum
safeguards arising pursuant to obligations that a Party has undertaken under applicable
international human rights instruments, i.e. primarily the European Convention for the
Protection of Human Rights and Fundamental Freedoms and its Protocols (Explanatory
Report, Point 145).
4
Procedural provisions
The Convention provides for five new measures – one aimed at the preservation of data
(Articles 16 and 17), and four aimed at data collection (production order – Article 18,
search and seizure of stored computer data – Article 19, real-time collection of traffic data
– Article 20, and interception of content data – Article 21).
The first of the instruments laid down in the Convention involves the granting of powers
to competent law enforcement authorities of the Parties to order network administrators,
or to similarly obtain, the expeditious preservation of specified computer data, including
traffic data that has been stored by means of a computer system, and has probative value.
This measure may be applied, in particular, where there are grounds to believe that the
computer data is particularly vulnerable to loss or modification.
This construct should not be confused with data retention – which is limited to traffic data
and includes the data of all entities operating in the network. It involves the retention by
providers of publicly available electronic communications services or of a public
communications network of the so-called “transfer data” (traffic and location data, and
the related data necessary to identify the subscriber or registered user) generated or
processed by such service providers, in order to ensure their availability for the purposes
of investigation, detection and prosecution of criminal offences. As regards EU law, the
obligation to retain data for a period of not less than six months and not more than two
years from the date of the communication was imposed under Directive 2006/24/EC of
the European Parliament and of the Council of 15 March 2006 on the retention of data
generated or processed in connection with the provision of publicly available electronic
126
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
communications services or of public communications networks and amending Directive
2002/58/EC (OJ EU 2006 L 105/54). It was rendered invalid as a result of the Judgement
of the Court of Justice of 8 April 2014 (Joined Cases C‑293/12 and C‑594/12, Digital
Rights Ireland Ltd v. Minister for Communications et al., ECLI:EU:C:2014:238).
The preservation of data provided for in the Convention refers to specific data regardless
of data type.
The preservation order should impose an obligation on the person in possession of (or
controlling) computer data to preserve and maintain the integrity of specified stored
computer data in that person’s possession or control for as long as necessary, but no
longer than ninety days, to enable the competent authorities to seek its disclosure. A Party
may provide for such an order to be subsequently renewed. There should also be a
possibility to oblige the custodian or other person required to preserve the computer data
to keep confidential the undertaking of such procedures for the period of time provided
for by its domestic law (Article 16(3)).
As regards traffic data to be preserved under Article 16, in Article 17, it is stipulated that
Parties are obliged to ensure that the expeditious preservation of traffic data is available
regardless of whether one or more service providers were involved in the transmission of
that communication, and ensure the expeditious disclosure to the Party’s competent
authority, or a person designated by that authority, of a sufficient amount of traffic data
to enable the authority to identify the service providers and the path through which the
communication was transmitted.
Due to the significant controversies between state governments in relation to the issues
of cross-border evidence collection, the Convention does not impose any specific
solutions in this respect, instead only encouraging states to cooperate on this matter.
Accordingly, the cross-border access to evidence will be as deemed appropriate by a
given state, in line with the recommendations of the Convention. It is an open issue
whether solutions will be harmonised. However, the Convention requires the adoption of
certain “minimum procedures” (see Article 23) (Weismann 2011: 273).
The next legal construct provided for in the Convention is the “production order”
described in Article 18. It may be addressed both to a person in the territory of the issuing
party, and to a service provider offering its services in the territory of the Party. In the
former case, it entails an obligation of the person indicated in the order to submit specified
computer data in that person’s possession or control, which is stored on a computer
system or a computer-data storage medium, and as regards the latter case, an obligation
to “submit subscriber information” relating to such services in that service provider’s
possession or control. As per Article 18(3), “subscriber information” means any
information contained in the form of computer data or any other form that is held by a
service provider, relating to subscribers of its services, other than traffic or content data,
and by which can be established: 1) the type of communication service used, the technical
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
127
provisions taken thereto and the period of service; 2) the subscriber’s identity, postal or
geographic address, telephone and other access number, billing and payment information,
available on the basis of the service agreement or arrangement; 3) any other information
on the site of the installation of communication equipment available on the basis of the
service agreement or arrangement.
Article 19(1) provides for a measure that involves empowering competent law
enforcement authorities of a Party to search a computer system or part of it and computer
data stored therein, and a computer-data storage medium in which computer data may be
stored, or “similarly access” a computer system or part of it and computer data stored
therein, and a computer-data storage medium in which computer data may be stored in its
territory.
Article 19(2) of the Convention provides an “invasive” form of search, i.e. extended
search. The provision allows law enforcement authorities to extend the scope of “search
operations” (e.g. to search or similarly access computer data, as provided for in Article
19(1a)) to include the resources stored in another computer system or its part, accessible
from or available to the initial system, if they have grounds to believe that the data sought
is stored in another computer system or part of it. The other computer system or its part
must be located in the territory of the state concerned. The convention does not define the
procedure for extending the search. This is left to domestic law. The authors of the
Convention give several examples of possible solutions: 1) empowering the judicial or
other authority which authorised the search of a specific computer system (“initial”
computer system) in a specified network (mainly LAN) to authorise the extension of the
search or similar access to a connected system (“secondary or further computer system”)
if there are grounds to believe (to the degree required by national law and human rights
safeguards – e.g. high probability verging on certainty) that the connected computer
system may contain the specific data that is being sought in proceedings under which a
relevant decision has been issued; 2) empowering the investigative authorities to extend
an authorised search or similar access of a specific computer system to a connected
computer system where there are similar grounds to believe that the specific data being
sought, relevant to the proceedings being conducted, is stored in the other computer
system; 3) or exercising search or similar access powers at several locations
simultaneously (i.e. both in the initial and secondary systems, which means that it is not
precisely an extended search, taking into account that the secondary system is not
accessed through the initial system in this case) in a coordinated and expeditious manner
(so-called “simultaneous search”).
In all cases, the data to be searched must be lawfully accessible from or available to the
initial computer system (Explanatory Report, Points 193-195).
It is worth stressing that the extended search constitutes a significant interference in the
privacy of computer system users, as there is no possibility to control the search
operations, and law enforcement authorities gain wide access to data during the search,
128
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
whereas at the same time the rights of persons affected by such actions are not properly
secured (it is worth remembering that these are often random computer systems – for
example, systems connected to the same local area network).
For that reason, search extension was one of the several solutions which were most
criticised by non-governmental organisations during the works on the Convention (in
addition to criminalising activities concerning the so-called “hacking tools” – Article 6
of the Convention).
Therefore, the parties to the Convention have been obliged to establish conditions and
safeguards which should provide for the adequate protection of human rights and liberties
(the aforementioned Article 15).
I believe that, in line with the principle of proportionality and subsidiarity, it would be
advisable to include a provision stipulating that a search may only be extended where it
is not possible to otherwise obtain the data sought, and in the event where there is a high
probability that the data is stored in a connected computer system, while the application
of the measure should be limited to matters related to the most serious prohibited acts
provided for by law.
Paragraph 3 sets out the obligation to empower the competent authorities of a Party to
seize or similarly secure computer data accessed as a result of search, including the power
to: 1) seize or similarly secure a computer system or part of it or a computer-data storage
medium; 2) make and retain a copy of those computer data; 3) maintain the integrity of
the relevant stored computer data; 4) render inaccessible or remove those computer data
in the accessed computer system.
According to the authors of the Convention, it is necessary to empower its competent law
enforcement authorities to order any person who has knowledge about the functioning of
the computer system or measures applied to protect the computer data therein to provide,
as reasonable, the necessary information to enable the undertaking of the relevant
measures (Article 19(4)).
Pursuant to Article 20(1), a measure entailing the real-time collection of traffic data was
introduced. The Convention provides for its two variants, including the collection or
record of data through the application of technical means independently by a competent
authority, or through, or with the assistance of, service providers, as the Parties may
compel a service provider to collect or record traffic data through the application of its
own technical means or to co-operate and assist the competent authorities in these
operations. The two variants are not alternatives – each Party must ensure that both
measures can be carried out. According to Point 223 of the Explanatory Report, such
solution is necessary in case a service provider does not have the technical ability to
assume the collection or recording of traffic data. Furthermore, in the event of some local
area networks (LANs), where no service provider may be involved, the only way for
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
129
collection or recording to be carried out would be for the law enforcement authorities to
do it themselves. Where a Party, due to the established principles of its domestic legal
system, cannot adopt the measures in question, it may limit itself to other measures, such
as only relying on the operations of service providers (Article 20(2)).
The discussed provision at the same time limits the adoption of the measures by a Party
to criminal proceedings in specific cases, and to traffic data associated with specified
communications “in its territory.”
Each Party should adopt such legislative and other measures as may be necessary to
oblige a service provider to keep confidential the fact of the execution of any power
provided for in the discussed Article (Article 20(3)).
As regards the interception of content data (computer surveillance), it is assumed that this
investigative measure must be restricted to a range of serious offences. The initiative to
compile a list of such offences is left to the Parties.
The measure may be applied only in the course of criminal proceedings, as it entails the
collection of content data, in real-time, of specified communications in its territory
transmitted by means of a computer system. Similarly to traffic data, the Convention
provides for two possible variants of such measures – the collection and recording of
content data by law enforcement authorities, and “the employment” of service providers
to perform the activities, so that within their existing technical capability, they collect or
record content data through the application of technical means on the territory of that
Party, or co-operate and assist the competent authorities in the collection or recording of
content data. Where a Party, due to the established principles of its domestic legal system,
cannot adopt the measures referred to in paragraph 1(a) (collection and recording of data
by law enforcement bodies), such Party may limit the measures to relying on the
operations of service providers only.
Of course, similarly to collecting and recording traffic data, each Party should adopt such
legislative and other measures as may be necessary to oblige a service provider to keep
confidential the fact of the execution of any power provided for in the discussed Article
(Article 21(3)).
Each Party may reserve the right to apply the measures stipulated in Article 20 solely to
criminal offences or categories of offences specified in the reservation, provided that the
scope of such offences or categories is not more restricted than the scope of offences to
which it applies the interception measures referred to in Article 21. Each Party should
consider restricting such a reservation to enable the broadest application of the measure
referred to in Article 20 (Article 14(3)(a)). Where a Party, due to limitations in its
legislation in force is not able to apply the measures referred to in Articles 20 and 21 to
communications being transmitted within a computer system of a service provider, which
system is being operated for the benefit of a closed group of users, and does not employ
130
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
public communications networks and is not connected with another computer system,
whether public or private, that Party may reserve the right not to apply these measures to
such communications.
At the same, it has been stressed that each Party should consider restricting such a
reservation to enable the broadest application of the measure referred to in Article 20
(Article 14(3)(b)).
To conclude, it is worth mentioning one more important issue – the nature of traffic data
and the degree of its protection. As noted above, the data includes information on the
events in the network and details of participating entities. Therefore, they have significant
probative value. At the same time, the data can say a lot about network users (whom a
given person has contacted, which websites he/she visited, what services he/she uses ...).
The collection of this data may, in some situations, permit the compilation of a profile of
a person’s interests, associates and social context. Accordingly, Parties should bear such
considerations in mind when establishing the appropriate safeguards and legal
prerequisites for undertaking such measures, pursuant to Articles 14 and 15 (Explanatory
Report, Point 227). It should be noted that the European Court of Human Rights (ECtHR)
found that the use of traffic data constituted interference in the right to respect for private
life, within the meaning of Article 8 of the ECHR. In the Judgement in the Malone v. the
United Kingdom case (ECtHR Judgement of 2 August 1984, Application No. 8691/79),
the Court found that the so called “metering” (recording phone calls made from a given
device by registering the numbers dialled and the time and duration of each call), which
is a standard activity made by telecommunications service suppliers, per se cannot be
considered as interference in the right to privacy. However, the release of the information
obtained this way without the consent of the subscriber amounts to the interference with
a right guaranteed by Article 8 ECHR. In the Court’s view, this stems from the fact that
the metering records contain information that is an integral element in the
communications made by telephone. In a ruling made in the Copland case (ECtHR
Judgement of 3 April 2007 in the Copland v. the United Kingdom case, application No.
62617/00), the Court stressed that the data related to e-mail and Internet usage (i.e. traffic
data) were subject to protection equivalent to that of telephone conversations.
5
Conclusions
It is a truism to say that international cooperation is of key significance in combating
offences committed by means of computer networks. Telecommunications networks span
the entire globe. The perpetrators’ conduct can simultaneously affect numerous countries
located in distant parts of the world. In addition to close cooperation between law
enforcement authorities, as one of the formal conditions of such collaboration (due to the
principle of dual criminality), it is important to ensure the criminalisation of computer
crimes in the greatest possible number of states, reaching a situation where there are no
so-called “hacker havens”, which are the countries in which their operations are not
prosecuted, and to introduce legal measures allowing the conduct of criminal proceedings
THE PUBLIC DIMENSION OF CYBERSECURITY
F. Radoniewicz: Procedural Provisions in the Convention on Cybercrime
131
in cybercrime matters in the legislations of such states, such measures being “on-line”
operational activities discussed in the present study.
Currently, the only international agreement addressing measures against computer crime
is the Convention on Cybercrime. This paper discussed the procedural solutions proposed
in the Convention. As of time this paper was written, they should have been adopted in
several dozen countries that have ratified the Convention. Some of its unquestionable
advantages include the open-ended nature of the Convention – it may be acceded by states
that are not members of the Council of Europe, and the provisions of optional clauses.
They allow the adoption of the Convention on Cybercrime with the exception of certain
provisions, thanks to which the state parties implementing the Convention to their
domestic laws may reconcile it with their own legal tradition and culture, and the legal
regulations in force. Given the above, nearly all Member States of the Council of Europe
signed the Convention on Cybercrime by 17 September 2021 (46 countries to be exact,
as only Russia has not signed the Convention), and 45 states ratified the document (apart
from Russia, which is obvious, Ireland has not ratified the Convention yet). The
Convention has also been signed by four non-European states (Canada, Japan, the United
States, the Republic of South Africa; and ratified by three of these countries, except the
RSA), while further 17 countries (including Australia, Dominican Republic, Israel,
Panama) acceded to it. In total, the Convention was ratified by 66 states. As a side note,
it should be mentioned that numerous countries that had not signed the Convention
decided to use its provisions to draft their own domestic laws. They include Botswana,
Egypt, the Philippines, and Pakistan (Brunst, Gecrke, 2009: 53).
References:
Clough, J. (2013) Principles of Cybercrime (Cambridge: University Press).
Brunst, P.W. & Gecrke, M. (2009) Praxishandbuch Internetstrafrecht (Stuttgart: Kohlhammer).
Radoniewicz, F. (2016) Odpowiedzialność karna za hacking i inne przestępstwa przeciwko danym
komputerowym i systemom informatycznym (Warszawa: Wolters Kluwer).
Weismann, M.F. (2011) International cybercrime: Recent developments in the law, In: Clifford,
R.D. (ed.) Cybercrime: The Investigation, Prosecution and Defense of a Computer-related Crime
(Carolina: Academic Press), pp. 257-294.
132
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Management in Cyberspace: From Firewall to Zero Trust
WOJCIECH PIZŁO
1
Abstract Households, enterprises, as well as the entire sphere of public
services, are undergoing intense digitization. We are learning to use
information and communication tools at work to a greater extent than
before and enterprises are increasingly using new technologies to improve
management in many spheres. The aim of this research is to identify
changes in the approach to management in cyberspace that are mediated by
information technologies. This paper presents the key issues pertaining to
the definition of cyberspace, defines the characteristics of cyberspace
management and the framework regulating its functioning – international
and national legislation. Additionally, it discusses the principles of risk
management in cyberspace, including the core principles of cybersecurity,
best practices of regulators, as well as the approach to security known as
Zero Trust.
Keywords: • cyberspace management • zero trust • digital security •
cyberspace regulations
CORRESPONDENCE ADDRESS: Wojciech Pizło, BEng, Ph.D., Dr. Habil., University Professor, Warsaw
University of Life Sciences (SGGW), Institute of Management, Nowoursynowska (Street) 166, 02-787
Warszawa, Poland, e-mail:
[email protected], ORCID:0000-0002-5212-0990.
https://doi.org/10.4335/2022.1.13
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
134
1
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
Introduction
Remote work has become an essential part of many areas of the economy, in particular
public services such as medical care and education. The scope of computerization of
societies and the global economy has expanded considerably. Consequently, the increased
dependence of citizens and businesses on the provision of digital services and the related
availability of technical infrastructure can be observed. Management in the sphere of
cyberspace is related to property rights, IT resources, the availability of technical
infrastructure as well as the capabilities of people operating in the digital space.
Due to the implementation of information and communication technologies in various
spheres of life, enterprises are subject to intense changes. Research shows that in
organizations with a hierarchical structure, the flow of information is limited (Jarvempaa
& Tanriverdi 2003: 403-412). The universal access to IT tools results in flattening of the
organizational structures and change in power dynamics (networking of power) in
organizations which often gains an informal dimension. Organizations, even small and
medium-sized enterprises, create networks of relationships that extend beyond national
borders. For this purpose, they use modern technologies to build groups of customers,
suppliers and business partners. Business networks, modern IT tools, databases, and
above all, creative people constitute the basis for creating new organizational solutions
and new management methods characterized by high degree of flexibility and efficiency
(Snellman, 2014: 1251-1261). The emergence and dynamic development of social and
market cyberspace produce changes in social relations and transform the management
methods (Pizło, Parzonko, 2022: 61-79), the organizational structure of enterprises, and
stimulate the creation of organizations, (not only enterprises), which are designed from
the very beginning as virtual. The literature indicates that the main factors mediating new
management solutions are the construction of open virtual organizations and the lack of
administratively limited access to selected innovative technologies (Gassmann, 2006:
223-228). The currently used knowledge management support tools (Le-Nguyen,
Dyerson, Harindranath, 2018: 1117-1133) include: document management systems (Sun,
Lei, Cao, Zhong, Wei, Li, Yang, 2020), Web 2.0 (Orenga-Roglá, Chalmeta, 2019: 195213), supporting the development of innovation (Schmidt, von der Oelsnitz, 2020: 9-21)
and team work, as well as corporate portals and decision support systems.
The aim of this research is to identify changes in the approach to management in
cyberspace mediated by information technologies. The paper addresses the following
research questions: 1) How are the issues of cyberspace and cybersecurity perceived in
the literature?; 2) What are the characteristics of cyberspace management, taking into
account the zero trust approach?
The research method was desk based analysis of literature. The data sources included the
selected publications from Elsevier and Researchgate databases.
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
2
135
Definition of cyberspace
The term "cyber" used in the literature usually refers to two elements, namely, the virtual
reality and the interconnected electronic communication networks. In the case of virtual
reality, the emphasis is put on the intangible nature of the maintained relationships; in the
second approach, the concept of "cyberspace" is synonymous with the Internet. This
concept is broader because it covers any network connecting information systems,
including local area networks (LAN), i.e. a local computer network that connects selected
areas, e.g. laboratories, offices, or entire enterprises and wide area network (WAN),
which is a computer network extending beyond urban agglomerations, the country even
the continent. Cyberspace is defined as "(...) a collection of interconnected computerized
networks, including services, computer systems, embedded processors and controllers, as
well as information in storage or transit" (Refsdal, Solhaug, & Stølen, 2015), and also as
"global domain within the information environment, consisting of an interdependent
network of information systems infrastructure, including the Internet,
telecommunications networks, computer systems and embedded processors and
controllers" (NIST, 2020). The concept of cyberspace in military terminology refers to
(DOD 2021) infrastructure and systems supporting it. In this approach, cyberspace is
defined as "the global domain within the information environment consisting of
interdependent networks of information technology infrastructure and resident data,
including the Internet, telecommunications networks, computer systems, and embedded
processors and controllers" (DOD 2021: 55). The cyberspace security is defined as
"actions taken within protected cyberspace to prevent unauthorized access to, exploitation
of, or damage to computers, electronic communications systems, and other information
technology, including platform information technology, as well as the information
contained therein, to ensure its availability, integrity, authentication, confidentiality, and
nonrepudiation". The concepts of cyberspace are based on several important elements,
that is: 1) human perception penetrating the world of information, both posted and created
on the network; 2) range of impact; 3) virtual reality.
3
Management in cyberspace
An important aspect of cyberspace realm is cyberspace management, which strives to
organize the processes taking place there. Management in cyberspace is determined by
the framework of international law and national regulations, as well as the capabilities to
manage the organization's resources in cyberspace. The purpose of this activity is, on the
one hand, to maximize the benefits of using new technologies and, at the same time, to
minimize the risk of their negative effects. The activities of enterprises in business
cyberspace have been carried out for several dozen years. The wide spread of new
technologies has made security in the digital space one of the key sources of threats.
Cybersecurity covers a wide spectrum of challenges e.g. ensuring the free use of critical
infrastructure, influencing civic participation, such as elections in democratic countries,
as well as preventing the loss of key data by strategically important enterprises and
organizations. The threat comes not only from hostile countries, but also from competing
136
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
enterprises as well as criminal and terrorist organizations. One of the first studies on
cybersecurity referred to: the design of cyberspace intrusion detection systems requiring
the fusion of data from myriad heterogeneous distributed network sensors (Bass 2000:
99-105), as well as insurance covering the potential loss of important information as a
result of cyber-attacks (Biener , Eling, Wirfs 2015: 131-158). In the inclusive approach,
"cybersecurity is the organization and collection of resources, processes, and structures
used to protect cyberspace and cyberspace-enabled systems from occurrences that
misalign de jure from de facto property rights". (Craigen, Diakun-Thibault, Purse, 2014).
The intention of the authors of this definition was to emphasize the interdisciplinary
nature of the concept of cybersecurity and thus change the approach of scientists,
financing agencies and the organizations themselves to the challenges related to
cybersecurity. This approach shifts the focus from the technical point of view to the
interdisciplinary perspective, supporting inclusiveness, as well as through the relationship
with other functional areas of cyberspace and pointing to the issues of access to resources
and property rights. The issue of organizations’ willingness to invest in cybersecurity is
thoroughly analyzed in research by Wessels, van den Brink, Verburgh, et al. (2021) which
provides a typology of incentives for cybersecurity investments. Research on
cybersecurity is often based on the Global Cybersecurity Index, which measures the
commitment of countries to cybersecurity at a global level to raise awareness of the
importance and different dimensions of the issue. It indicates that most governments have
developed national cybersecurity defense strategies to combat the cybersecurity risks
(Fadia, Nayfeh, Noble, 2020: 2), because an increasing group of citizens, enterprises and
public institutions managing critical infrastructure is exposed to cyber attacks.
The literature points to the role of cybersecurity and the associated risks related to the
economic situation of enterprises (Yang, Lau, Gan 2020: 167-183), and also emphasizes
the relationship between the competitive strength of individual enterprises and the trust
of various entities, including investors, in the information security management. People
create communities by working, having fun and spending time together. Every time they
do so, they benefit from trust. In online communication people are unable to verify who
they are interacting with. Online communication adds new dimensions to trust (Marsh,
Atele-Williams, Basu, Dwyer, Lewis, Miller-Bakewell, Pitt, 2020). The role of the state
is to build trust and security in cyberspace. The pandemic has indicated a different
approach to understanding macroeconomic principles of operation in the field of cyber
security (Global Cybersecurity Index 2021). Trust is important in a society and digital
economy, because the main trust-encouraging features on the Internet is transparent and
reliable data, but most of all, what is emphasized in the literature, is the "need to
democratize big data, and not let it be the preserve of corporate, scientific, or political
elites" (Marsh, et al 2020). The essence is the responsible and ethical use of big data
instead of using it for business purposes (corporate power) or political purposes,
especially when it comes to lowering the rank of democracy (power of political parties)
or in scientific circles (power of knowledge).
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
137
The core principle of enterprises' activities in cyberspace is the creation of an individual
model of reacting to potential malicious incidents. Concern for maintaining a high level
of security and minimizing cyber risk is important in the long-term perspective. It is
confirmed (Ferens, 2021) that information on cyber threats is important enough to be
consolidated and standardized. Cyberspace is built by individual network elements, but
even when one network is secure; it is not known how it will behave in an interaction
with other network elements of other entities. Relationships between several elements can
lead to unpredictable instability (Helbing, 2013: 51-59).
4
Risk management in cyberspace
Risk management in the case of organizations operating in cyberspace consists of: 1)
identification of goals; 2) risk determination; 3) assessment of the probability of cyber
incident occurrence; 4) avoiding and mitigating the negative effects of a cyber attack; 5)
continual monitoring of threats. The implementation of the indicated elements of cyber
risk management depends on the IT department's ability to cooperate with other parts of
the organization. It is indicated in the literature that enterprises holding the position of the
head of information security or a similar position bear lower costs related to cyber attacks.
In the case of some countries, having a digital security certificate opens the public
procurement market for the company. This takes place in Japan and the countries of the
European Union.
5
Cybersecurity in different economic systems
The literature indicates that (Biener, Eling, Wirfs 2015: 131-158) cybersecurity is a public
good and the market provides an insufficient level of cybersecurity, therefore government
interventions such as subsidies for technological support preventing cyber attacks or
compulsory cybersecurity insurance may be considered. Governments, at least a
considerable number of them, focus their efforts on preventing and cyber attacks,
mitigating their effects and protecting their citizens, businesses and critical infrastructure.
The main regulators, which are states and institutions of international law, have the
possibility to directly increase cybersecurity through appropriate legislation, as well as,
by acting indirectly to stimulate the desired behavior of both organizations and
individuals in the field of cybersecurity.
In economics, two different approaches to market regulation are differentiated. The first
approach is the command-and-control regulation consisting in an arbitrary determination
of the rules regulating the market. The second approach involves regulation through
economic incentives or automatic regulation or self-regulation developed by a given
community. In the case of "motivated regulations" defined through the prism of the
applied rewards and penalties, their aim is to achieve the desired results, while
maintaining a certain decision-making autonomy. Giving freedom to the actors in the
market does not mean that the regulator's decision is the only single factor, (even if it is
one of the stronger ones), but it is always one of the many stimuli that coexist in the
138
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
structure of stimuli. Another approach to "motivated regulation" is the perception of
markets through the prism of people's inclination to build social bonds, spontaneous
knowledge sharing (Smith, 2013, XXXVI, 50-57), which is the foundation for creating
new markets. In this case, the knowledge and skills of the community constitute the basis
for spontaneously arising rules that often create a sophisticated system of using shared
resources by community members (Ostrom, 2013).
An important element of building a rational framework of regulations relating to
cyberspace is the use of the provisions of the Budapest Convention (Convention on
Cybercrime, 2001) ratified by over 60 countries and the EU Directive 2016/1148 of the
European Parliament and of the Council of 6 July 2016 concerning measures for a high
common level of security of network and information systems across the Union. The
Budapest Convention recommends the adoption of substantive and procedural
regulations. The substantive regulations define different types of cybercrime, including
copyright infringement, computer-related fraud, data and systems interference and child
pornography. In turn, the procedural regulations provide the law tools to investigate
cybercrime and secure electronic evidence in relation to any crime. Due to technological
progress, the rules of enacting cyberspace law should be modified in order to keep up
with the innovativeness of the market. The element that binds the cybersecurity system is
the observation of both the development of technology and social attitudes towards
potential threats.
When building national institutional structures dealing with cybersecurity, it is necessary
to consider the following questions (Fadia, Nayfeh, Noble, 2020): 1) Should the agency
reside within a defense and intelligence entity or within a civilian body? 2) What level in
the government does the agency report to? 3) What is the scope of the agency’s control
and oversight (for example, does it focus only on critical infrastructure or also on citizens
and small and midsize businesses)? The questions should be treated rhetorically, as they
refer to the choices that reflect the "philosophy" of internal policy, the development of
cyber infrastructure and aspirations in the field of cybersecurity of an individual country.
Cyber risk is a derivative of the regulatory approach to the issue of how to ensure security
and related to the behavior of network users as a result of which identity theft (loss) and
disclosure of confidential, most often personal, information occurs. The probability of a
threat related to interference in the managed cyberspace of the enterprise is referred to as
cyber risk (Eling, Schnell, 2021). Knowledge of the market and threats in cyberspace
minimizes the likelihood of its negative effects, and also contributes to easier modeling
and management of this type of threat.
The simplest division of cyber risk is the indication of threats caused by independent
natural factors causing mechanical damage to IT infrastructure and man-made threats
(intentional and unintentional). The susceptibility of enterprises to cybercrime threats
may be determined by the specific features of the organization that minimize the threat
of a cyber attack. These specific features include: technology that the company has at its
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
139
disposal, processes as well as knowledge and IT skills of employees. Threats of cyber
attacks result from the widespread use of IT tools both in public administration and
private enterprises. The changing area of cyber threats makes it necessary to observe a
wide and interdisciplinary spectrum of issues.
The research results indicate that (Naseer, Maynard, Desouza, 2021) the ability to quickly
detect and effectively respond to cyber attacks is an important element of the efficient
operation of any organization (Ahmad, Desouza, Maynard, Naseer, Baskerville, 2020:
939-953). The diagnosis of the threat, and in particular the response to incidents, i.e.
incident detection, diagnosis of the areas of interference and its elimination, as well as
restoration of the original state and elimination of the possibility of similar interference
in the future, is the essence of rational counteracting cyber threats. The principal element
of counteracting cyber attacks is the constant operation of an interdisciplinary team,
whose task is to observe the information system, assess events and report on cybersecurity
in an enterprise described as agile – capable of rapid reacting to unexpected challenges.
An important factor of success (preventing interference) is the time that elapses from the
detection of a cyber attack to the system recovery. The speed of this reaction is called
agility and is important because the probability of a negative impact on the organization
increases with time distance from the detection of the incident. The essence of
counteracting cyber threats is collecting, storing and analyzing all data related to the
incident.
6
Best practicies of cybermarket regulators
The McKinsey & Company report (2020) compared cyber security strategies in 11
countries that are best organized in this respect. The research has identified five
components of a successful cybersecurity strategy. Firstly, it is the existence of a
dedicated national cybersecurity agency (NCA), the aim of which is macroeconomic and
macrosocial cybersecurity, secondly, a national critical infrastructure protection program,
thirdly, a national incident response and recovery plan, fourthly, clearly defined legal
regulations concerning cybercrime, and lastly, ensuring an efficient cybersecurity
ecosystem. The recommendations of the report, summarizing good practices of best-inclass countries, include: 1) the need to establish a national cybersecurity agency
responsible for defining and driving the cybersecurity agenda of the entire country; 2) the
need to develop a cohesive national cybersecurity strategy to protect the critical
infrastructure of the country; 3) define a wide range of actions in response to cyber
incidents, including in particular the definition of cybersecurity standards; 4) improving
the cyber awareness of citizens; 5) developing the cybersecurity capabilities of
professionals.
A priority recommendation for public authorities is to eliminate the risk of a cyber attack
on the national critical infrastructure which may lead to disruptions in other sectors of
public life. Critical infrastructure is an attractive target for both hostile state actors and
hostile organizations seeking publicity. Effective cyber attacks have a negative impact on
140
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
the economy, society and business confidence, and undermine national defense
capabilities. The best cybersecurity programs targeting critical infrastructure focus on
selecting critical sectors and assets to be specially protected. The choice of critical areas
depends on the way in which the rulers define the role of individual sectors of the
economy, well-being of the society, and national security of the country. The experience
of countries with the best system of counteracting cyber attacks indicates the need to
respond to incidents even when their losses are relatively small and recovery activities
are ongoing (Fadia, Nayfeh, Noble, 2020: 2). The essence of counteracting is not only to
prevent negative events, but if they occur, learn about their mechanism and mitigate their
negative effects.
The McKinsey report (Fadia, Nayfeh, Noble, 2020: 2) defines actions needed to
counteract cyber attacks, i.e. procedures for reporting observed incidents (cyber attacks)
by citizens and enterprises. The best results were achieved in those countries where it was
clearly defined to whom cyber incidents could be reported by institutions, citizens and
enterprises. It was recommended (Fadia, Nayfeh, Noble, 2020: 2) to build a centralized
repository where all data on cyber threats and cyber attacks will be collected. In addition
to passively recording all reported cybercrimes, central institutions must actively monitor
the Internet for cyber threats. The traditional national security intelligence to monitor
threats should be combined with other channels like a platform collecting confidential
information from the private sector (Great Britain - Cyber Security Information Sharing
Partnership). This platform allows for quick and confidential sharing of information about
threats. An important element of active protection against cyber attacks is automated
manner of counteracting cyber threats (National Cyber Security Centre in Great Britain).
When malicious content is detected on a website, the system blocks this content
nationwide and works with the hosting company to remove it. Each cyber incident should
be classified based on its level of threat in relation to e.g. critical infrastructure, national
security or other socially and economically important criteria, as well as the type of victim
and the expected interdependence of cyber threats, because a cyber attack on a "small"
entity may be a preparation to attack an important public institution. The introduction of
standardization of incidents organizes risk management in public cyberspace, allowing
for a rational and orderly minimization of the risk of a cyber attack. Determining the
threat level together with the "severity assessment matrix" is part of a well-developed
mobilization plan that enumerates public entities that should respond to cyber incidents
of varied severity. A local incident, such as a break-in into a small enterprise, is the
domain of the local police, supported by procedures and expert advice from a national
cybersecurity agency. On the other hand, counteracting threats to critical infrastructure
should be coordinated, among others, by the police, proper sector regulator, intelligence
agencies, etc., where the coordinating entity is a national cybersecurity agency.
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
7
141
Zero trust security model
Contemporary organizations, when it comes to information systems, do not have easily
identifiable borders. They rely on complex multifunctional systems supporting corporate
offices, production departments, warehouses, sales and marketing departments including
remotely working sales representatives, accounting and logistics. The complexity of such
systems makes it difficult to protect them against cyber attacks (Department of Defense,
2021). One of the pioneers of the zero trust approach was. J. Kindervag (2010) who
noticed that the dominant concept of categorizing network users into trusted and untrusted
is not effective enough. The new approach, now known as zero tust, adopts the principle
that no implicit trust is granted to any user or process. This approach assumes that the
attacker is already present on the network. Therefore, an algorithm is used to grant access
based on detailed requests. The following principles underlying the concept of zero trust
(Kindervag, 2010) are indicated: 1) ensuring secure access to all resources regardless of
location. This approach assumes that all network traffic is a potential threat until it is
verified and secured; 2) adopting the strategy of the lowest privilege and strictly enforcing
access controls. It is assumed that each user in the network must have limited – minimal,
but sufficient for effective work - rights, with simultaneous strict (regulated) access to
sensitive resources of the organization. Users who have access to the network are
continuously monitored to determine if their activity does not deviate from the adopted
security standards. The zero trust concept assumes that the network traffic is registered,
verified and the response to unusual events is immediate.
The National Institute of Standards and Technology (NIST) pointed to the main factors
that determine the choice of a zero-trust strategy by an organization (Rose, Borchert,
Mitchell, Connelly, 2020). In the case of an enterprise, they may have a complex system
serving the organization's network. The internal network may include: 1) a remote office
with its own local infrastructure; 2) remote and/or mobile workers; 3) cloud services.
Building security based on perimeters (firewalls) by such an organization is insufficient
because after defeating the security, access to the organization's resources is unlimited
(Rose, Borchert, Mitchell, Connelly, 2020).
The concept of zero trust in cybersecurity was developed at the Defense Information
Systems Agency (DISA) and the US Department of Defense, where a strategy ensuring
cybersecurity for enterprises referred to as "black core" was developed. Since 2004, the
idea of "deperimeterization" has been promoted, which consisted in eliminating the
implicit trust, which based, inter alia, on the location of the network, its static protection
and static defense mechanisms in a large segment of the network (The Jericho Forum,
2007). The concept of "deperimeterization" has been changed, improved and called "zero
trust". Today, the term "zero trust" is understood as a new cybersecurity paradigm that
shifts defense from network-based perimeters to users, assets and resources. The zero
trust strategy assumes that there is no basis for implicit trust. Trust cannot be completely
based on the physical or network location, and on the ownership of assets, such as
ownership of a business and its domain. Adopting a zero trust attitude in cybersecurity
142
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
requires designing a simpler and safer architecture of the company's IT system. While the
classic approach to cybersecurity assumed "defense in depth", zero trust promotes a more
secure, coordinated, seamless, transparent, and cost effective IT architecture. The core of
zero trust is the principle of Continuous Diagnostics and Mitigation (CDM), related to
external malicious interference harmful to the organization. The activities of the
organization are aimed at limiting the access of persons and institutions to information
resources and making them available only to authorized persons. Zero trust is a strategy
that applies to the entire information architecture. The purpose of this approach is to
prevent access to critical resources of the organization. The organization adopting this IT
development strategy undertakes to secure, manage and monitor every device, user,
application and network transaction occurring at the perimeter and/or within the network
enclave (Department of Defense (DOD), 2021). In this approach, it is assumed that no
entity, system, network or service operating outside or within the space used by the
organization is secure. The organization and its structures must verify everything and
everyone who tries to access their resources.
Figure 1:
Zero trust security concept
Source: Department of Defense (DOD) Zero Trust Reference Architecture, ver. 1.0, (2021), Agency
(DISA) and National Security Agency (NSA):12. https://dodcio.defense.gov (Access. 10
September 2021).
The adoption of the high-level zero trust operation concept implies the acceptance of such
information architecture where non-person entity identity and user identity are tracked
independently allowing for separate paths of validating confidence levels. Authentication
and authorization activities are performed at defined points in the enterprise. In the
enterprises where the zero trust concept is applied, the confidence level for individual
devices and users is determined and the access level is adjusted to the current defined
threats. Users and non-person entities have a confidence level assigned to them. In the
case of an assessment that the level of threat to the organization is above the set threshold,
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
143
such an entity does not receive access to a given digital space. Both the access itself and
the data are protected by the Data Loss Prevention System. Control of access to enterprise
resources is related to the diagnosis of the risk level of both users and devices used by a
given entity.
The zero trust architecture should include (Department of Defense, 2021): 1) Identity
Provider - a system performing direct authentication 2) Automatic Account Provisioning
– a system providing identity governance services such as user entitlement management,
business role auditing and enforcement and account provisions and deprovisioning 3)
Master User Record – a system reporting on the access of individual people and devices
to the system and subsystems as well as to individual applications. In addition, MUR
provides the identification of internal and external threats and the circumstances in which
users are granted or denied access to the resources of the organization 4) Privileged
Access Management - a system that secure, control, manage and monitor privileged
access to critical assets. This includes administrative access of systems, applications and
services.
Both private and public enterprises as well as numerous government agencies and nonprofit organizations have embraced or are transitioning to a security strategy based on the
principles of zero trust. There are several concepts regarding the zero trust approach in
cybersecurity management in an organization. First, there is an assumption that there is
no longer a trusted interface on our security devices; second, there is no longer a trusted
network; and third, there are no longer trusted users (Kindervag, 2010: 2). In this
approach, it is recommended to treat all network traffic as involving risk. At the same
time, Kindervag notes that this concept does not imply that employees are untrustworthy;
however, the concept of implicit trust should not be applied to network traffic and data.
By not granting trust to the activities that take place in the network, we reduce the
likelihood of abuse of procedures and inappropriate use of the network. The chance of
detecting non-standard activities and, consequently, cybercrimes also increases.
8
Conclusions
In recent decades, management in the cyberspace sphere has been dominated by people
professionally involved in building telecommunications and information systems. This
environment has imposed a technology-focused perception of cyberspace, limiting it
mainly to technological issues. Managerial approach to cyberspace and cybersecurity
refers to the social dimension of the relationship between employees, as well as between
a device and an employee. The dissemination of information technologies modifies the
shape of an organization, as the flow of information has become widespread. The
structures of many organizations are more flattened; power dynamics changes as it
becomes more networked and often gains an informal dimension. The dynamic
development of social and market cyberspace entails changes in social relations, and
along with them, management methods are modified to adapt to new conditions. An
important area of cyberspace is cyber management, which is a set of strategies undertaken
144
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
to effectively manage the information resources owned by organizations. The framework
of management activity is determined, on the one hand, by the international law and
national regulations, on the other hand, by individual capabilities of an organization to
manage its digital resources.
The state plays an important role in shaping cybersecurity and market rules. In economics,
and in particular in institutional economics, two basic concepts of regulating the market
are recognized. The first regulatory technique is the command-and-control approach
consisting in arbitrary determination of the market rules, where representatives of the
political power take the floor and not the community affected by the regulation. The
second approach to regulating the market is self-regulation developed by a given
community. Giving the market actors the freedom to regulate it is often a simpler solution,
and in most cases respected by the community. In the case of cyberspace, neither the
knowledge nor capabilities of the community constitute sufficient competence to regulate
the market. Therefore, it would be advisable to refer to the provisions of the Budapest
Convention ratified by over 60 countries and the European Union Directive concerning
measures for a high common level of security of network and information systems across
the Union. In addition to legal regulations, an important area is the development of a
cybersecurity strategy, involving the widest possible cooperation between specialized
national cybersecurity agencies. Good practices of best-in-class countries show that it is
necessary to establish a national cybersecurity agency, to develop strategies needed to
reduce cyber threats, to define actions to be taken in response to cyber incidents, to
improve citizens' cybersecurity awareness and to enhance the competences of
cybersecurity professionals. An important recommendation that can be taken into account
both in macro terms and for individual organizations is the implementation of zero trust
strategy. It is based on the assumption that no user or network can be implicitly trusted
and must always be verified. Zero trust concept represents a new cybersecurity paradigm
that shifts defense from web-based perimeters to users (both non-person and person
entities).
References:
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H. & Baskerville, R. L. (2020) How
integration of cyber security management and incident response enables organizational
learning, Journal of the Association for Information Science and Technology, 71, pp. 939-953,
https://doi.org/10.1002/asi.24311.
Bass T. (2000) Intrusion detection systems and multisensor data fusion: Creating cyberspace
situational awareness, Communications of the ACM, 43, pp. 99-105.
Biener C., Eling M., & Wirfs J.H. (2015) Insurability of cyber risk: An empirical analysis, The
Geneva Papers on Risk and Insurance-Issues and Practice, 40, pp. 131-158.
Convention on Cybercrime
(Budapest,
November
23, 2001), available
at:
https://www.coe.int/en/web/cybercrime/the-budapest-convention#{%22105166412%22:[0]}
(August 18, 2021).
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
145
Craigen, D., Diakun-Thibault, N. & Purse, R. (2014) Defining cybersecurity, Technology
Innovation Management Review, 4, pp. 13-21, https://doi.org/10.22215/timreview835.
Creazza, A., Colicchia, C., Spiezia, S. & Dallari S. (2021) Who cares? Supply chain managers’
perceptions regarding cyber supply chain risk management in the digital transformation era,
Supply
Chain
Management,
Vol.
ahead-of-print
(No.
ahead-of-print),
https://doi.org/10.1108/SCM-02-2020-0073.
Department of Defense (DOD) Zero Trust Reference Architecture, ver. 1.0 (2021) Agency (DISA)
and National Security Agency (NSA), available at: https://dodcio.defense.gov (August 18, 2021).
DOD Dictionary of Military and Associated Terms. As of January 2021, available at:
https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf (August 18, 2021).
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
measures for a high common level of security of network and information systems across the
Union, available at: http://data.europa.eu/eli/dir/2016/1148/oj (August 18, 2021).
Eling, M. & Schnell, W. (2016) Ten Key Questions on Cyber Risk and Cyber Risk Insurance, In:
Sommerrock, F. (ed.) Ten Key Questions on Cyber Risk and Cyber Risk Insurance (The Geneva
Association – International Association for the Study of Insurance Economics’ Zurich), pp. 8-37,
available at: https://www.genevaassociation.org (August 18, 2021).
Fadia, A., Nayfeh, M. & Noble, J., (2020) Public and Social Sector Practice, Follow the leaders:
How governments can combat intensifying cybersecurity risks, It is undoubtedly challenging to
craft and execute a national cybersecurity strategy. Our research reveals common elements of
successful
strategies
(McKinsey
&
Company),
p.
5,
available
at:
https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-leadershow-governments-can-combat-intensifying-cybersecurity-risks (August 18, 2021).
Ferens, A. (2021) Cybersecurity and cyber risk in integrated and management reports of key service
operators, Theoretical Journal of Accounting, 45(2), https://doi.org/10.5604/01.3001.0014.9558.
Gassmann, O. (2006) Opening up the innovation process: towards an agenda, R &D Management,
36(3), pp. 223-228.
Global Cybersecurity Index 2020 (2021) Measuring commitment to cybersecurity (Geneva:
International Telecommunication Union), available at: https://www.itu.int/dms_pub/itud/opb/str/D-STR-GCI.01-2021-PDF-E.pdf (August 18, 2021).
Helbing, D. (2013) Globally networked risks and how to respond, Nature, 497, pp. 51-59, available
at: http://www.marsh-stresstest.eu (August 18, 2021).
Sun, J., Lei, K., Cao, L., Zhong, B., Wei, Y., Li, J. & Yang, Z. (2020) Text visualization for
construction document information management, Automation in Construction,
111,
https://doi.org/10.1016/j.autcon.2019.103048.
Jarvempaa, S.L & Tanriverdi, H. (2003) Leading virtual Knowledge Networks, Organizational
Dynamics, 31, pp. 403-412, http://dx.doi.org/10.1016/S0090-2616(02)00127-4.
Kavanagh, K., Bussa, T. & Collins, J. (2021) Magic Quadrant for Security Information and Event
Management,
(Gartner
Technical
Report),
available
at:
https://www.gartner.com/doc/reprints?id=1-26OLSQ2N&ct=210630&st=sb (August 18, 2021).
Kindervag, J. (2010) Build Security Into Your Network’s DNA: The Zero Trust Network
Architecture (John Kindervag for Security & Risk Professionals), pp. 1-25, available at:
https://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf (August 18, 2021).
Le-Nguyen, K., Dyerson, R. & Harindranath, G. (2018) Exploring knowledge management
software implementation from a knowing-in-practice perspective, Inf Syst Front, 20, pp. 11171133, https://doi.org/10.1007/s10796-016-9713-3.
Marsh, S., Atele-Williams, T., Basu A., Dwyer, N., Lewis, P.R., Miller-Bakewell, H. & Pitt, J.
(2020)
Thinking
about
Trust:
People,
Process,
and
Place,
Patterns,
https://doi.org/10.1016/j.patter.2020.100039.
146
THE PUBLIC DIMENSION OF CYBERSECURITY
W. Pizło: Management in Cyberspace: From Firewall to Zero Trust
Naseer, H., Maynard, S.B. & Desouza, K.C. (2021) Demystifying analytical information processing
capability: The case of cybersecurity incident response, Decision Support Systems, 143,
https://doi.org/10.1016/j.dss.2020.113476.
NIST (2020) Security and Privacy Controls for Information Systems and Organizations, NIST
Special Publication 800-53, Revision 5, (National Institute of Standards and Technology),
https://doi.org/10.6028/NIST.SP.800-53r5.
Orenga-Roglá, S. & Chalmeta, R. (2019) Methodology for the Implementation of Knowledge
Management Systems 2.0, Bus Inf Syst Eng, 61, pp. 195-213, https://doi.org/10.1007/s12599017-0513-1.
Ostrom, E. (2013) Dysponowanie wspólnymi zasobami (Warszawa: Wolters Kluwer).
Chamoso, P., Rodriguez, S., de la Prieta, F. & Bajo, J. (2018) Classification of retinal vessels using
a collaborative agent-based architecture, AI Communications, 31, pp. 427-444.
Pizło W. & Parzonko A. (2022) Virtual organization and trust, In: Paliszkiewicz, J. & Chen (eds.)
Trust, Organization and Digital Economy (London: Taylor and Francis), pp. 61-79.
Rashid, Z., Noor, U. & Altmann, J. (2021) Economic model for evaluating the value creation
through information sharing within the cybersecurity information sharing ecosystem, Future
Generation Computer Systems, 124, pp. 436-466.
Refsdal, A., Solhaug, B. & Stølen, K. (2015) Cyber-Risk Management (Cham: Springer
International Publishing).
Rose, S., Borchert, O., Mitchell, S. & Connelly, S. (2020) Zero Trust Architecture, NIST Special
Publication
800-207
(National
Institute
of
Standards
and
Technology),
https://doi.org/10.6028/NIST.SP.800-207, available at: https://www.nist.gov (August 19, 2021).
Schmidt, S. & von der Oelsnitz, D. (2020) Innovative business development: identifying and
supporting future radical innovators, Leadersh Educ Personal Interdiscip, 2, pp. 9-21,
https://doi.org/10.1365/s42681-020-00008-z.
Smith, V.L. (2013) Racjonalność w ekonomii (Warszawa: Wolters Kluwer).
Snellman, L. C. (2014) Virtual teams: Opportunities and challenges for e-leaders, Procedia – Social
and Behavioral Sciences, 110, pp. 1251-1261.
The Jericho Forum (2007) Jericho Forum Commandments, version 1.2., available at:
https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf (August 19, 2021).
Wessels, M., van den Brink, P., Verburgh, T., Cadet, B. & van Ruijven, T. (2021) Understanding
incentives for cybersecurity investments: Development and application of a typology, Digital
Business, 1(2), pp. 1-7, https://doi.org/10.1016/j.digbus.2021.100014.
Yang, L., Lau, L. & Gan H. (2020) Investors’ perceptions of the cybersecurity risk management
reporting framework, International Journal of Accounting & Information Management, 28(1),
pp. 167-183.
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec
Cybersecurity and School-age Young People – Challenges
and Threats
ANDRZEJ PIECZYWOK
1
Abstract Cybersecurity is currently a major priority for states. The Internet
is providing growing opportunities for development, but it can also lead to
risky situations. As the Web continues to expand, people are more likely to
be exposed to threats due to inadequate security or the inappropriate use of
resources online. State-of-the-art digital media and interactive information
and communications technology – all of which constitute cyberspace and
the virtual world – pose many threats for school-age young people. They
are dynamic and widespread, and have a global dimension. It is common
practice for both teachers and students to use the rich educational resources
available online. Against this backdrop, it is important to investigate what
causes online threats to emerge and what consequences they have, as well
as to develop popular awareness towards a safe use of cyberspace.
Keywords: • cyberspace • cybersecurity • school-age young people •
challenges • threats • cybereducation
CORRESPONDENCE ADDRESS: Andrzej Pieczywok, Ph.D., Dr. Habil., University Professor, Kazimierz Wielki
University, Faculty of Political Sciences and Administration, Department of Security Policy, ks. J.
Poniatowskiego (Street) 12, 85-671 Bydgoszcz, Poland, e-mail:
[email protected], ORCID: 0000-00024531-0630.
https://doi.org/10.4335/2022.1.14
ISBN 978-961-7124-10-1 (PDF)
Available online at http://www.lex-localis.press.
© The Author(s). Licensee Institute for Local Self-Government Maribor. Distributed
under the terms of the Creative Commons Attribution-NonCommercial 4.0 license
(https://creativecommons.org/licenses/by-nc/4.0/), which permits use, distribution and
reproduction for non-commercial purposes, provided th original is properly cited.
148
1
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
Introduction
The bulk of human activity nowadays – whether educational, social, professional or
leisure – takes place in cyberspace. Professional and school lives, and most social
contacts, have largely gone online. On the one hand, this creates enormous opportunities,
but on the other, we need to realise that many threats are also involved. In recent years,
the information-related dimension of threats has become particularly significant. The
Internet, networks, information, data and cyberspace have all become critical for citizen
and organisational security and knowledge, and even for the authority of states. Virtual
space is very often more attractive than other environments. It allows people to meet many
of their needs. Interpersonal attractiveness can grow substantially online (financial and
social benefits, improved self-esteem, developing a certain identity, etc.). What counts
online is closeness, the law of attraction, humour, civility and mutual sympathy. Indeed,
virtual communication clearly has many advantages:
anonymity, wide reach,
imagination, etc. School-age young people are fairly active on social media. It is worth
noting that the main idea behind these sites is to allow users to stay in contact with their
friends and relatives, or to make new acquaintances, as well as to share certain
information with large groups of people. Sometimes it is difficult to maintain privacy.
Social media sites are a real world for many young people. Moreover, they are an everchanging space in which young people can express their identity and establish relations
with others, often from different countries (Kowalczuk, 2009: 25). Social media foster
their need for being part of a group, for belonging, being active, establishing their
presence and promoting themselves. Young people, in particular, adolescents, tend to
have a strong desire to express their views. Through social media sites, they can engage
in dialogue and share interesting information – i.e. communication that satisfies their
sense of agency and fosters their creative achievements and cause-and-effect thinking.
It is worth noting that cybersecurity means the resilience of information systems against
actions which compromise the confidentiality, integrity, availability and authenticity of
processed data, or the related services provided by those information systems. The use of
social media sites involves many emerging threats associated with, among others,
providing sensitive information to other users (burglars, paedophiles), phishing (access
to passwords and logins), identity theft, cyberstalking, talking to strangers, etc.
Information technology carries with it many threats whose consequences are hidden and
distant in time. It is important to be aware of the threats and to have the knowledge and
skills to navigate cyberspace. School-age young people tend to believe that they know
more about the Internet than adults, overestimating their online skills and ability to protect
against these threats.
Cyberspace addiction is a common problem nowadays. Some compare it to alcoholism
and drug addiction. Many young people struggle with computer, TV or mobile phone
addictions. They lie to themselves, which makes them oblivious that they have a problem.
School-age young people do not realise the underlying threats. The uncontrolled use of
media often causes changes in how their body and personality function.
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
149
The Internet is the main channel for communication and source of knowledge for young
people. Hence, it is critically important for them to develop critical thinking and source
verification skills. With the spread of fake news and unverified information, these skills
are instrumental in protecting young people against being misled or even manipulated.
Knowledge acquired online is currently replacing academic knowledge gained by reading
books, encyclopaedia and scientific journals. Whereas these traditional sources are highly
reliable and can be trusted, the Internet is a mosaic of information, the control over and
verification of which is limited. Therefore, it is critically important for them to develop
critical thinking and source verification skills.
2
Main threats associated with the inappropriate use of cyberspace
Cyberspace not only opens up qualitatively new opportunities that can make life easier
for people, but also involves a range of qualitatively new threats in the personal, national
and even international dimensions. It can be a source of addictions, a vehicle for socially
unacceptable behaviours and values, a tool of qualitatively new forms of crime, a space
for terrorist activities, and an arena for cyberwarfare if seen through the lens of military
threats (Pieczywok, 2017: 113).
Threats associated with the broadly defined human contact with the world of technology,
and, in particular, cyberspace, have been engendered by the euphoria surrounding the new
opportunities afforded by the world of media. This euphoria has caused people to become
less cautious, to underappreciate, and even to consciously ignore threats. As shown by
the history of human civilisation, threats are an inseparable part of the encounter with
new techniques and technologies. This creates – in quantitative and qualitative terms –
new needs, or generates them artificially, indirectly making survival dependent on
adaptation – in terms of both broadly defined technology and at the psychological level.
These technologically forced shifts may lead to outcomes that are difficult to predict –
both globally and individually. As rightly noted by S. Bębas, “technological
advancements have changed not only human habits, but also the way in which pathologies
can manifest” (Bębas, 2013: 22).
According to M. Szydłowska, information threats are “all destructive (intentional and
unintentional) acts in the form of the undesirable disclosure, distortion, modification,
damage, destruction, or the disabling of the processing of, information produced,
processed, stored, and sent in a specific information flow system, potentially causing a
loss (Szydłowska, 2019: 22).
P. Bączek claims that, when analysing information security, the following threats should
be addressed: 1) random (natural disasters, catastrophes, accidents, fires, floodings); 2)
conventional (espionage, subversion, sabotage, disinformation); 3) technological
(cybercrime, cyberterrorism, information warfare); 4) civil rights-related (unauthorised
disclosure, information selling, breach of privacy, unlawful interference by special forces,
150
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
thwarting public transparency); 5) organisational and structural shortcomings
(mishandled operations, mismanagement and poor decision-making, poor information
flow, corruption) (Bączek, 2005: 71-73).
Adverse phenomena associated with the development of information technology and, by
extension, cyberspace, include: 1) the decline of humanistic values – technocratic outlook
on the world; 2) opportunities to manipulate people freely – to steer their consciousness;
3) difficulties adapting to an information society and addiction to technology; and 4) the
spread of pathological processes associated with the use of technology, such as violence,
aggression, erotica and pornography, piracy and hacking, computer addiction
(Siemieniecki, 2001: 31).
Cyberspace threats are multidimensional. These do not just pertain to access to
inappropriate content, but also to the risk of eye and musculoskeletal diseases, and mental
diseases. Of particular concern are addictions and, increasingly, specific behaviours
associated with different types of violence and aggression (in both the virtual and real
world), social changes and ethical threats, as well as the decline of independent thinking
and deep reflection.
Threats may come from unverified software downloaded by students and teachers, fake
websites, links to malicious codes and malicious codes contained in attachments to emails
offering discounts for teachers, or fake emails from IT departments. Sensitive information
about students, teachers and graduates are of great value to hackers – they can demand
money to decipher such information or sell it on a black market. The research results and
intellectual property of educational institutions are targeted as well.
As far as education is concerned, particular dangers relate to the cognitive and intellectual
sphere involving cognition and school learning, which include: cognitive threats
(uniformity and/or reduction of experience), limited perception of issues, the primacy of
visual over verbal, inundation with ready-to-use hypermedia information, preventing
their creative shaping and use, and the inability to take rational decisions and actions
(Pieczywok, 2017: 114).
Generally, cyberspace threats to school-aged young people can be divided into a number
of primary areas. These include: 1) cyberspace threats: a) mental and physical health
threats: eye ailments, hearing disorders, musculoskeletal ailments, wrist ailments, thumb
ailments (texting), diseases of other body organs, self-destruction, self-harm, cyberspace
suicide; b) moral threats: cyberpornography, online prostitution; cyberpaedophilia,
cybersex, sexting, human trafficking, including for organ trade; c) socio-educational
threats: cyberbullying, online violence and aggression, gambling, second life,
cybersectarianism, human trafficking, including for organ trade, impaired interpersonal
relationships, human functioning in the world of humanoid robots; d) chemical hazards:
bigorexia, drugs online, energy drinks, new psychoactive substances; and e) infoholism
and computer-game threats; as well as 2) crime and ICT security threats: a) ICT crime in
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
151
the EU; b) ICT security policy, including: - violating the integrity and confidentiality of,
and disabling access to, data and computer systems; - computer crime; - crime specific to
the nature of targeted information; - intellectual property crime; c) ICT crime in Poland,
including: - crime against information protection, - computer hacking, - electronic
eavesdropping; - unlawful destruction of information; - computer sabotage; - copyright
violation, - crimes against the credibility of documents; and d) virtual financial crime.
Among school-age young people, these threats can take the form of an addiction,
necessitating measures to prevent, diagnose and treat threats and pathologies.
3
The cybereducational dimension of shaping attitudes in school-age young
people
It can be assumed that education is a unique socio-cultural process through which humans
gradually develop, mature and shape their personality. The educational system allows
young people to establish social relationships and gain socio-cultural experience (Tkacz,
2008: 315).
For a long time, the aim of education was to facilitate the acquisition of certain
information, skills and attitudes. Nowadays, however, its main priority is not to pass
encyclopaedic information, but to shape attitudes. Accordingly, the qualities that are now
fostered by education include being active, having imagination, being intellectually
autonomous, and engaging in continuous education.
It is clear, then, that school education related to identifying and counteracting cyberthreats
improves the effectiveness of help and support to school-age young people experiencing
virtual-world problems. Thorough knowledge about the psychological mechanisms
underlying addiction and co-addiction, and the ability to apply it in everyday work with
students, are very important.
As human civilisation continues to develop, the educational system has no choice but to
follow. Digitisation, digital teaching, mixed learning styles, cyberspace learning and
mobility have all become a part of the educational routine. Nevertheless, there exist some
deeply ingrained and persisting habits causing teachers to be viewed through the lens of
the system as compliant cogs, deprived of any tools – a part of a mindless testing machine.
Embracing these new developments while overcoming the deep-seated mindset is a
challenge for teachers. Usually, however, change is not entirely possible even if there is
willingness to make it.
The constantly evolving digital technology and very easy access to diverse information
engender the misconception that, for instance, the Internet and e-learning are fully
sufficient to teach more in less time. There is no denying, however, that the ongoing ICT
revolution will force profound changes across formal and informal education, mainly in
the choice of educational contents, the teaching-learning methodology, and in evaluating
school performance. Media pedagogy is facing the serious challenge of actively shaping
152
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
indispensable human skills. This mainly involves improving the ability to actively and
creatively participate in developing the culture of network society. School and broadly
defined education will certainly come under criticism. There is no doubt, however, that
teachers will manage to mould information acquired by young people from a wide range
of sources into the sound knowledge they will especially need in the future (Pieczywok,
2017: 120).
Today’s schools provide students with inadequate – or, to be more exact, very little –
preparation to handle the emerging challenges associated with ICT threats, addiction to
new technology, and cyberspace pathologies. It should be kept in mind, however, that
nobody prepared teachers (educators) and parents for these new tasks. Schools lack
experts and teachers capable of diagnosing issues among students exposed to cyberspace
threats. For these reasons, online security and safety in the context of the threats and social
pathologies is emerging as the latest and highly important educational problem and
challenge for teachers. Hence, as rightly noted by J. Kopański – “preparation for the
teacher profession and the continuing professional development among teachers must
change to take account of the ongoing evolution in the use of media” (Kopański, 2010:
83).
It is not common for teachers and students to have adequate knowledge about the
functioning of social media sites, about using the potential of the Internet, and about
online safety. As online crime, addiction to the Internet, and the adverse impacts of the
Internet on behaviour become a growing phenomenon, the role of media education at
school is coming to the fore (Goban-Klas, 1999: 49).
Hence, providing the general public with media education is now an important challenge.
Contemporary school is being profoundly influenced by the Internet, perhaps to the point
of being under its dictatorship. What is interesting is that not only pupils and students but
also teachers succumb to this dictatorship. For many years now – in fact, from the dawn
of computers and later the Internet – education has been constantly adapting to the world
of technology.
In the face of the technological advancements and increasing digitisation, there is an evergrowing need for raising awareness about cyberthreats and for education in this area
among young people.
In the context of these threats, it is particularly important to provide cybereducation
understood as the diagnosis, prevention, and therapy at institutions dealing with the
education and socialising of school-age young people, including family, schools, media,
counselling centres, foundations, organisations, etc.
It is important that school curricula incorporate instruction on cybersecurity, which is
becoming one of the primary challenges of the 21st century. Cybereducation should
become a permanent part of the school landscape, especially in the form of practical
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
153
classes to teach young people how to use the Internet safely. While the user is usually the
weakest link in each system, cybereducation among students and teachers is still lacking.
Therefore, it is important to show teachers and students what to pay attention to, what
information and applications should raise suspicions, and to whom to report incidents. It
is not enough to give a 15-minute talk at the beginning of the school year. What is needed
is ensuring continuous cyberhygiene care.
The aim of cybereducation is to make sure young people know how to use online
resources safely, where to look for help when they fall victim to cybercrime, and how to
critically approach information found on the Internet.
The basic skill that young people should learn is to remain aware of how the information
they share online, almost on a daily basis, can be used. For instance, pictures of them
walking their dog, photos of expensive gadgets, and logging in at specific locations can
help criminals determine, for one, their daily routine. Another fundamental task is to teach
school-age young people to identity attempts to illegally obtain information.
Education will certainly face the challenge of adapting instruction plans to the
dynamically changing landscape of threats and methods used by criminals. Caution
should be at the core of students’ activities online. Being careful, however, is not enough.
It is fundamentally important to instil in them scepticism about sharing their sensitive
data online. Everyone should also form the habit of protecting their information, and learn
how to create strong passwords. While this might seem obvious, it is still common for
students to use weak combinations and log in at various locations using the same
identification data.
A growing number of teachers and experts are realising that the issue of cybersecurity is
underestimated at schools. Cybersecurity instruction could take place during weekly class
meetings, computer science classes, or as part of a dedicated subject. It should be borne
in mind that lectures and routine school talks are not enough. One way to mobilise young
people to explore the subject deeper would be to organise contests and practical classes
for them. In fact, there are a myriad of possibilities to tackle this challenge.
Cybersecurity education should be provided as soon as children and young people gain
access to digital services, preferably before they even enter the digital world, i.e. at
preschool. There is a need for a wide social campaign on cybereducation and
cyberhygiene. To make this happen, a multi-pronged approach should be taken by
incorporating cybersecurity into the core curriculum and securing adequate funds to
improve teacher competencies, among others. This would involve developing and
implementing a continuous teacher development programme on using new technology,
and supporting them in meeting core-curriculum requirements related to the safe use of
new technology.
154
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
The combination of the teacher’s professional knowledge and deep experience allied with
the digital skills of students and opportunities afforded by digital devices creates a true
synergy in shaping modern education and educating a generation that will change the
world more consciously and responsibly. Jan Wróbel is right to claim that “in the school
of the future, it is the teacher that is, or at least should be, of prime interest” (Wróbel,
2010: 67).
Routine tasks performed by teachers should be increasingly replaced with attractive
computer programs, especially given the now fairly common availability of virtual
lectures, modern e-learning courses, instructional games, electronic tests, educational
portals, as well as digital school registers and systems designed to monitor the learning
process. Indeed, for many students, a multimedia lecture is much more interesting than a
regular class. Teachers are not, therefore, needed to pass knowledge, test and evaluate.
Their new role involves acting as advisers, coaches, counsellors and learning experts,
supporting students in difficult moments, guiding and motivating them when in doubt,
and teaching them how to learn.
As new information and communication technologies and cyberspace continue to evolve,
the role of teachers is changing. As well as being able to use cyberspace tools, teachers
should know the threats posed by cyberspace to respond appropriately when seeing
adverse cyberspace-related effects in their students. Also, in addition to passing on the
latest knowledge, their role is to protect children against negative phenomena in
cyberspace. In order to provide such protection, however, they need to become familiar
with the origin, scale, causes and effects of these phenomena.
When providing education with the use of latest information technologies, to shape
desirable attitudes in school-age young people, teachers should not only provide them
with the right conditions to acquire knowledge and the practical skills to apply it, but also
shape their moral qualities, such as honesty, reliability, responsibility, etc.
It is worth stressing that digital space, the virtual world and the Internet are changing the
lifestyles and culture of learning of both teachers and students, as well as the way they
communicate. Hence, the following should be at the core of educating the young
generation as a conscious information society: 1) promoting critical attitudes towards
content found in cyberspace and the ability to cull through the content; 2) forming an
active attitude to cyberspace resources to make it a tool for actively influencing audiences;
3) stimulating and strengthening sensitivity to providing objective information and
promoting attitudes against its distortion; and 4) passing on knowledge of cyberspace
specifications and its underlying mechanisms (Trzcińska, 2006: 269).
THE PUBLIC DIMENSION OF CYBERSECURITY
A. Pieczywok: Cybersecurity and School-age Young People – Challenges and Threats
4
155
Conclusion
The potential of technology and online resources, teenager habits shaped by their contact
with technology and the power of teachers’ expert knowledge should create a new space
for learning and a new model of working. Parents and teachers will, thus, together face
the challenge of implementing innovative project methods and preparing students for
work.
In addition to a range of advantages, the use of cyberspace by students has a fair share of
negative aspects. The threats that await us online, including, in particular, that faced by
children and young people, are increasingly serious, and it is impossible to protect young
users against them only by using software to block undesirable websites.
Today, the key factor in school-age young people’s development is having the ability to
use, analyse, creatively process and appraise information. Media digitisation has made it
possible to create virtual reality, leading to a life in the so-called “simulacrum culture”.
This is why reflective thinking, nurturing imagination, and developing the ability to
distinguish facts from fiction are important.
References:
Bączek, P. (2005) Zagrożenia informacyjne a bezpieczeństwo państwa polskiego (Toruń:
Wydawnictwo Adam Marszałek).
Bębas, S. (2013) Patologie społeczne w sieci (Toruń: Wydawnictwo Edukacyjne „AKAPIT”).
Goban-Klas, T. (1999) Społeczeństwo informacyjne. Szanse, zagrożenia, wyzwania (Warszawa:
Wydawnictwo Fundacji Postępu Telekomunikacji).
Kopański, J. (2010) Kompetencje nauczyciela a cyberbezpieczeństwo ucznia, Meritum, 4, pp. 8287.
Kowalczuk, P. (2009) Posługuje się myszą i klawiaturą, Wychowawca, 9, pp. 25-26.
Pieczywok, A. (2017) Edukacyjne wyzwania w kształtowaniu pozytywnych postaw młodzieży w
cyberprzestrzeni, In: Trubalska, J. & Wojciechowski, Ł. (eds.) Bezpieczeństwo osób w
cyberprzestrzeni (Lublin: Wydawnictwo Wyższej Szkoły Innowacji i Ekonomii), pp. 107-126.
Siemieniecki, B. (2001) Technologia informacyjna w polskiej szkole. Stan i zadania (Toruń:
Wydawnictwo Adam Marszałek).
Szyłkowska, M. (2019) Bezpieczeństwo informacyjne państwa. Wybrane problemy (Toruń:
\Wydawnictwo Adam Marszałek).
Tkacz, T. (2008) Formalne i prywatne funkcje przestrzeni edukacyjnej, Nierówności Społeczne a
Wzrost Gospodarczy. Uwarunkowania Instytucjonalne, 12, pp. 315-320.
Trzcińska, M. (2006) W stronę pedagogiki mass mediów, In: Muchacka, B. (ed.) Szkoła w nauce i
praktyce edukacyjnej (Kraków: Oficyna Wydawnicza „Impuls”), pp. 265-273.
Wróbel, J. (2010) Nauczyciele, supermani i poczciwe niezguły (Gdańsk: Wydawnictwo Aeropag).
THE PUBLIC DIMENSION OF CYBERSECURITY
M. Karpiuk & J. Kostrubiec