To manage emergencies and disasters most often is used the model composed of four phases: risk mitigation, preparedness, response and recovery. During the response phase, an incident management structure (IMS) is developed. It is generally acknowledged that the participation of communities in response actions increases the resources of public authorities and helps eliminate the outcomes of an incident in a more effective manner. Referring to the principles of the Neo-Weberian this article analyses the IMS, communitiesparticipation in the incident management and examines the assumptions of the Lithuanian laws on communities participation in incident management. The results of the research have revealed that community participation in the management of an incident, an emergency or a disaster is not regulated in Lithuania's legislation, for this reason, the conclusion could be drawn that it is difficult to apply advanced IMSs and to find a common solution while manoeuvring between the actions of the hierarchy-based institutions and officials or officers and citizen or their group participation in the management of emergencies, disasters and incidents.
To manage emergencies and disasters most often is used the model composed of four phases: risk mitigation, preparedness, response and recovery. During the response phase, an incident management structure (IMS) is developed. It is generally acknowledged that the participation of communities in response actions increases the resources of public authorities and helps eliminate the outcomes of an incident in a more effective manner. Referring to the principles of the Neo-Weberian this article analyses the IMS, communitiesparticipation in the incident management and examines the assumptions of the Lithuanian laws on communities participation in incident management. The results of the research have revealed that community participation in the management of an incident, an emergency or a disaster is not regulated in Lithuania's legislation, for this reason, the conclusion could be drawn that it is difficult to apply advanced IMSs and to find a common solution while manoeuvring between the actions of the hierarchy-based institutions and officials or officers and citizen or their group participation in the management of emergencies, disasters and incidents.
The master thesis aims to examine whether it is possible to develop a model for a cyber incident management team that, complementing national capabilities, would enable a team composed of CERT experts from several countries to act lawfully and effectively with the assistance of EU countries, institutions, partners and CFSP missions. The first part examines the theoretical aspects of cooperation between states in investigating cyber incidents, scientific literature and articles describing the cybersecurity situation in the European Union and Lithuania, describing the main cyber threats and actors. The first part also examines cybersecurity models and discusses the objectives and developments of Permanent Structured Cooperation (PESCO) based on scientific articles. The second part already deals with the operational management and legal aspects of PESCO CRRT teams. Part Three discusses the implementation of the PERSCO CRRT cyber rapid response team project.
The master thesis aims to examine whether it is possible to develop a model for a cyber incident management team that, complementing national capabilities, would enable a team composed of CERT experts from several countries to act lawfully and effectively with the assistance of EU countries, institutions, partners and CFSP missions. The first part examines the theoretical aspects of cooperation between states in investigating cyber incidents, scientific literature and articles describing the cybersecurity situation in the European Union and Lithuania, describing the main cyber threats and actors. The first part also examines cybersecurity models and discusses the objectives and developments of Permanent Structured Cooperation (PESCO) based on scientific articles. The second part already deals with the operational management and legal aspects of PESCO CRRT teams. Part Three discusses the implementation of the PERSCO CRRT cyber rapid response team project.
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of national security. The paper consists of introduction, four chapters with subchapters and conclusions. The first section approaches the multidimensionality of national security and the concept of cybersecurity, as well as the specifics of its enforcement. The second section analyzes national security legislation and threats that affect national security. The third chapter reviews the NATO and EU approach to cyber security and defense, discusses legal framework, activities of cybersecurity agencies, and the importance of international co-operation. analyzing the changes in cyber incidents and cyber espionage and reviewing the current real life situation. The importance and necessity of collaboration among Lithuania, NATO and the EU on cyber security and defense issues are also discussed
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of national security. The paper consists of introduction, four chapters with subchapters and conclusions. The first section approaches the multidimensionality of national security and the concept of cybersecurity, as well as the specifics of its enforcement. The second section analyzes national security legislation and threats that affect national security. The third chapter reviews the NATO and EU approach to cyber security and defense, discusses legal framework, activities of cybersecurity agencies, and the importance of international co-operation. analyzing the changes in cyber incidents and cyber espionage and reviewing the current real life situation. The importance and necessity of collaboration among Lithuania, NATO and the EU on cyber security and defense issues are also discussed
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of national security. The paper consists of introduction, four chapters with subchapters and conclusions. The first section approaches the multidimensionality of national security and the concept of cybersecurity, as well as the specifics of its enforcement. The second section analyzes national security legislation and threats that affect national security. The third chapter reviews the NATO and EU approach to cyber security and defense, discusses legal framework, activities of cybersecurity agencies, and the importance of international co-operation. analyzing the changes in cyber incidents and cyber espionage and reviewing the current real life situation. The importance and necessity of collaboration among Lithuania, NATO and the EU on cyber security and defense issues are also discussed
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of national security. The paper consists of introduction, four chapters with subchapters and conclusions. The first section approaches the multidimensionality of national security and the concept of cybersecurity, as well as the specifics of its enforcement. The second section analyzes national security legislation and threats that affect national security. The third chapter reviews the NATO and EU approach to cyber security and defense, discusses legal framework, activities of cybersecurity agencies, and the importance of international co-operation. analyzing the changes in cyber incidents and cyber espionage and reviewing the current real life situation. The importance and necessity of collaboration among Lithuania, NATO and the EU on cyber security and defense issues are also discussed
The purpose of Information technologies is to protect an organization's valuable resources, such as information, from unauthorization publishing, changing or missing. Total number of information security breaches unabated, according to Worldwide and Lithuanian institutions inquiring computer security incidents. In recent years a number of Government and independence Lithuanian organizations have reorginized the need for security education in Lithuania (especially in information security), and lack of information security courses. [.]
Mobility and connectivity are now approaching a new era at the European Union dimension, where a driverless vehicle might become a new nuclear for an ecosystem, as well as make mobility safer, easier and more sustainable. The automated driving system is considered as the progress reached in the field of Artificial Intelligence, which opens a new horizon in road mobility.Vehicles that are able to interact with each other and other road users within the road infrastructure, might solve the range of issues on the common market, such as improving environmental conditions, reducing dependency on fossil fuels, road safety mobility at a service and even urban planning. However, new technological progress is coming alongside with a number of obstacles and foreseeable negative outcomes at the European Union level. In order to mitigate the new era of mobility and connectivity, a particular range of legal regulations have to be introduced.At this stage, technologies cannot be considered to be certainly safe, hence particular incidents might still take place. Seeking to ensure a smooth entrance into a new era of mobility and connectivity, the regulation of civil liability, which must be strictly determined, rises as a consequence of the autonomous vehicles usage.
Mobility and connectivity are now approaching a new era at the European Union dimension, where a driverless vehicle might become a new nuclear for an ecosystem, as well as make mobility safer, easier and more sustainable. The automated driving system is considered as the progress reached in the field of Artificial Intelligence, which opens a new horizon in road mobility.Vehicles that are able to interact with each other and other road users within the road infrastructure, might solve the range of issues on the common market, such as improving environmental conditions, reducing dependency on fossil fuels, road safety mobility at a service and even urban planning. However, new technological progress is coming alongside with a number of obstacles and foreseeable negative outcomes at the European Union level. In order to mitigate the new era of mobility and connectivity, a particular range of legal regulations have to be introduced.At this stage, technologies cannot be considered to be certainly safe, hence particular incidents might still take place. Seeking to ensure a smooth entrance into a new era of mobility and connectivity, the regulation of civil liability, which must be strictly determined, rises as a consequence of the autonomous vehicles usage.
Mobility and connectivity are now approaching a new era at the European Union dimension, where a driverless vehicle might become a new nuclear for an ecosystem, as well as make mobility safer, easier and more sustainable. The automated driving system is considered as the progress reached in the field of Artificial Intelligence, which opens a new horizon in road mobility.Vehicles that are able to interact with each other and other road users within the road infrastructure, might solve the range of issues on the common market, such as improving environmental conditions, reducing dependency on fossil fuels, road safety mobility at a service and even urban planning. However, new technological progress is coming alongside with a number of obstacles and foreseeable negative outcomes at the European Union level. In order to mitigate the new era of mobility and connectivity, a particular range of legal regulations have to be introduced.At this stage, technologies cannot be considered to be certainly safe, hence particular incidents might still take place. Seeking to ensure a smooth entrance into a new era of mobility and connectivity, the regulation of civil liability, which must be strictly determined, rises as a consequence of the autonomous vehicles usage.
Mobility and connectivity are now approaching a new era at the European Union dimension, where a driverless vehicle might become a new nuclear for an ecosystem, as well as make mobility safer, easier and more sustainable. The automated driving system is considered as the progress reached in the field of Artificial Intelligence, which opens a new horizon in road mobility.Vehicles that are able to interact with each other and other road users within the road infrastructure, might solve the range of issues on the common market, such as improving environmental conditions, reducing dependency on fossil fuels, road safety mobility at a service and even urban planning. However, new technological progress is coming alongside with a number of obstacles and foreseeable negative outcomes at the European Union level. In order to mitigate the new era of mobility and connectivity, a particular range of legal regulations have to be introduced.At this stage, technologies cannot be considered to be certainly safe, hence particular incidents might still take place. Seeking to ensure a smooth entrance into a new era of mobility and connectivity, the regulation of civil liability, which must be strictly determined, rises as a consequence of the autonomous vehicles usage.
At present the information and data has become a very important product and has achieved higher value than ever before. The age of information has brought not only new opportunities and possibilities, but also new problems – first of all information security problems. The object of this master work is information and information property. The main aim of this work is to analyse and describe the information security problem in private and public sector. Tasks, which helped to achieve the main aim, were to find out the information security necessity, to look over the main security problems in private ant public organizations, also to analyse the security means and security politics. With a help of methods of documentary and scientific literature analysis, bibliographic method and quantitative survey was established, that the security problem really exists and has to be solved as soon as possible, because of the information security incidents the organizations experience large losses and damages every day. The urgency of information and data security problem was proofed while analysing scientific literature, reviewing researches, also while doing the quantitative research and questioning the information and data security specialist, that are working in public and private organizations, about security problems in their organizations. Every organization, does not matter in which sector working, is using a lot of different information in her daily work. Depending on their activities the organizations have a various threats and risks. To ensure the high level of information security the public and private organizations needs to apply not only technical, but also organizational and physical means of security. In contemporary society the information security problem is getting more and more attention. Regardless of this fact there exist not a lot of organizations, which can claim a high information security level. After quantitative research it became clear, that the information security problem is sorer and bigger in the private (business) sector. Business organizations more often are facing different information security threats and suffering larger damages than the public organizations. The information security means in private organizations are applied not as complex and purposeful as in the public organizations. Besides that the business organizations understands not so good the importance of information resources and appraises not totally the advantage, which can give the information and data. In research were established different incidents of information security, which are happening in public and private sector. Also were identified different information security means, which are similar in both sectors. The motives why the information should be protected were different: in private sector because of financial reasons, and in the public sector because that is a requisition of law statements. The results of the research let to assert, that the law regulation of the information and data security is one of the most effective means to protect the information property.
At present the information and data has become a very important product and has achieved higher value than ever before. The age of information has brought not only new opportunities and possibilities, but also new problems – first of all information security problems. The object of this master work is information and information property. The main aim of this work is to analyse and describe the information security problem in private and public sector. Tasks, which helped to achieve the main aim, were to find out the information security necessity, to look over the main security problems in private ant public organizations, also to analyse the security means and security politics. With a help of methods of documentary and scientific literature analysis, bibliographic method and quantitative survey was established, that the security problem really exists and has to be solved as soon as possible, because of the information security incidents the organizations experience large losses and damages every day. The urgency of information and data security problem was proofed while analysing scientific literature, reviewing researches, also while doing the quantitative research and questioning the information and data security specialist, that are working in public and private organizations, about security problems in their organizations. Every organization, does not matter in which sector working, is using a lot of different information in her daily work. Depending on their activities the organizations have a various threats and risks. To ensure the high level of information security the public and private organizations needs to apply not only technical, but also organizational and physical means of security. In contemporary society the information security problem is getting more and more attention. Regardless of this fact there exist not a lot of organizations, which can claim a high information security level. After quantitative research it became clear, that the information security problem is sorer and bigger in the private (business) sector. Business organizations more often are facing different information security threats and suffering larger damages than the public organizations. The information security means in private organizations are applied not as complex and purposeful as in the public organizations. Besides that the business organizations understands not so good the importance of information resources and appraises not totally the advantage, which can give the information and data. In research were established different incidents of information security, which are happening in public and private sector. Also were identified different information security means, which are similar in both sectors. The motives why the information should be protected were different: in private sector because of financial reasons, and in the public sector because that is a requisition of law statements. The results of the research let to assert, that the law regulation of the information and data security is one of the most effective means to protect the information property.