Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. Witkowski is active.

Publication


Featured researches published by M. Witkowski.


Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces | 2017

CYBER ATTACKS AND THREATS

M. Witkowski; Anna Wojaczek

The goal of this article is the presentation of current threats and possible attacks on IT systems. An analysis of attacks carried out using the Internet shows a growing threat to the security of data sent and stored in IT systems and equipment. The danger of losing such information refers not only to state organisations and institutions, but it can also pose a threat to private entrepreneurs and individual users. This is why all computer users, especially the ones connected to local or global networks, should realise the danger so as to protect themselves. Even basic safety measures introduced to secure internet connections can efficiently protect data from unauthorised access.


International conference KNOWLEDGE-BASED ORGANIZATION | 2016

Threat Analysis in the Network-Centric Environment

Mirosław Smolarek; M. Witkowski

Abstract The paper presents an analysis of the threats that one can face in the cyberspace and dangers affect the safety of a state and its citizens. The authors compare definitions of terrorism, particularly focusing on issues related to cyber terrorism. They explain concepts associated to terrorist activities in the network-centric environment. Next, the evolution of the threats awaiting in the Internet has been presented. Moreover, classification of cyber-attacks and current dangers that may occur in ICT systems has been analysed.


International conference KNOWLEDGE-BASED ORGANIZATION | 2015

ICT security of a state

Mirosław Smolarek; M. Witkowski

Abstract The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented. Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the modernization of IT systems, which could improve the secure dataflow and ensure continuous exchange of information between the components responsible for the security of the state.


international conference on transport systems telematics | 2014

Conditions of Telematics Service for Purposes of the Army

Andrzej Bujak; M. Witkowski

The paper presents modern transport systems telematics solutions that can be adapted to the needs of the military. The requirements that must be met in order to increase the possibility of the use of transport telematics in military logistics. It highlights the role of wired and wireless telecommunications in data transmission systems telematics. In the publication, a special attention was paid to the safety and reliability of transport systems telematics in military applications, with particular emphasis on emergencies.


Logistyka | 2015

Środki łączności i informatyki w usługach logistycznych

Andrzej Bujak; M. Witkowski


Logistyka | 2014

Systemy teleinformatyczne wykorzystywane na potrzeby kierowania bezpieczeństwem państwa

Andrzej Bujak; M. Witkowski


Logistyka | 2014

Zabezpieczenie logistyczne w zarządzaniu kryzysowym

Andrzej Bujak; M. Witkowski


Logistyka | 2014

Środki łączności i informatyki w systemie kierowania bezpieczeństwem narodowym

Andrzej Bujak; M. Witkowski


Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces | 2013

Wykorzystanie analizy ryzyka oraz scenariuszy przebiegu incydentów w systemie zarządzania bezpieczeństwem informacji gromadzonej, przetwarzanej i przesyłanej w systemach teleinformatycznych instytucji

A. Szleszyński; M. Witkowski


Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki | 2011

Bezpieczeństwo systemów teleinformatycznych w zarządzaniu kryzysowym

M. Witkowski

Collaboration


Dive into the M. Witkowski's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge