In addition to traditional threats such as spying or revealing state or business secrets, the new threats have appeared, among which the most dangerous is cyberterrorism. Proper functioning of society depends today largely on management functioning of modern techniques and information technology. Computers networks are widely used in economy, administration, as well as inhouseholds. Taking into account the problems of cyberterrorism, in particular an analysis of legislation aimed at ensuring the security of information systems of individual countries, this subject should be also recognized as a requirement for the insightful analysis. Therefore, this publication is an attempt to characterize the determinants of this phenomenon and an analysis of the latest legal solutions in the fight management against cyberterrorism in the European Union. Moreover, an attempt has been made to present the EU counter-terrorism policy so the Author`s intention is also to show the impact of legal instrument on combating cyberterrorism itself. In addition, it tries to find an answer to the question whether the current legal standard solutions of the European Union in the area of security are an effective tool in the fight against cyberterrorism.Keywords: management, cyberterrorism, policy, EU, law.
THE NOTION OF CYBERTERRORISMCyberterrorism has become a fashionable notion, but few people know what it really is. Many believe that this is only a theoretical concept, an action which probably will never happen in reality. But no one knows what the future holds.The cyberterrorism was also defined by M. Pollite as deliberate, politically motivated attacks carried out by non-state groups or clandestine agents against information, computer systems, software, and data.The term "cyberterrorism" appeared for the first time in 1979 in Sweden in the report that showed computer threats. It covered any activity involving computers aimed at the destruction of ICT systems, supervisory and control systems, programs, data, etc., and consequently intimidation of the governments and the societies to exert psychological pressure, bringing to life-threatening as a result of considerable damage. In the 80s of the twentieth century this term was used by the American special services, pointing at the possibility of carrying out electronic attacks by the enemies of the United States. In 1998, at the Headquarters of the FBI the National Infrastructure Protection Center (NIPC) was created, whose task was to coordinate the collection of information about the threats, 1 Izabela Oleksiewicz, Dsc, PhD, Associate Professor, Department of Security Science, Rzeszow University of Technology; e-mail: oleiza@prz.edu.pl.
142I. Oleksiewicz responding to the threats or attacks on critical information elements of the infrastructure of the state. Defining cyberterrorism as a combination of cyberspace and terrorism means that such an activity is associated not only with the hostile use of IT and the action in the virtual sphere, but it is also characterized by all constitutiv...