Search results for: SECURITY - Bridge of Knowledge

Search

Search results for: SECURITY

Search results for: SECURITY

  • Portable raman spectrometer for maritime security applications

    Publication

    - Year 2010

    The fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....

    Full text to download in external service

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Full text available to download

  • The Sense of Security of the Prison Service Offi cers

    Publication

    Full text to download in external service

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • Integrated functional safety and cyber security analysis

    Publication

    - IFAC-PapersOnLine - Year 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Full text available to download

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publication

    - Year 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Security Assessment of a Turbo-Gas Power Plant

    Publication

    - Year 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Full text to download in external service

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • Lab security improvement using RFID technologies

    Publication

    - Year 2006

    Technologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...

  • Network-centric warfare: a strategy for homeland security

    Publication

    - Year 2006

    Pojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...

  • Assessment of port facilities security in crisis management

    Z punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...

  • Web-based marine gis for littoral security

    W artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...

  • Sectarianism as a Factor Shaping Persian Gulf Security

    Publication

    - International Studies - Year 2015

    Full text to download in external service

  • Functional safety and security management in critical systems

    Publication

    - Year 2005

    Głównym celem referatu jest przedstawienie wybranych kwestii zarządzania bezpieczeństwem i ochroną w systemach podwyższonego ryzyka i systemach krytycznych. Zarysowuje się kilka praktycznych problemów analizy bezpieczeństwa funkcjonalnego w celu podejmowania decyzji zgodnie z normami międzynarodowymi IEC 61508 i IEC 61511. Podkreśla się, że aspekty związane z ochroną powinny być starannie rozpatrzone zarówno w fazie projektowania,...

  • Hierarchical approach to security monitoring and risk evaluation

    Publication

    - Year 2005

    Przedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.

  • Security level estimation as a function of residual risks

    Publication

    - Year 2006

    Artykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.

  • Water resources security and management for sustainable communities

    Publication

    - Year 2021

    Full text to download in external service

  • Climate Changes in Southeastern Poland and Food Security

    Publication
    • B. Sawicka
    • P. Barbaś
    • P. Pszczółkowski
    • D. Skiba
    • F. Yeganehpoor
    • B. Krochmal-Marczak

    - Climate - Year 2022

    Full text to download in external service

  • Energy Security of Polish Consumers in 2004-2021

    Open Research Data
    open access

    Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....

  • Revenue of social security contributions (in PLN billion)

    Open Research Data
    open access

    In the period January-September 2020, the expenditure of the Social Insurance Fund amounted to PLN 197.1 billion, and the revenues from contributions and their derivatives - PLN 144.5 billion. As a result, the proceeds covered 73.3 percent. expenses. At that time, the fund received a subsidy from the budget in the amount of PLN 29.3 million.

  • China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond

    Publication
    • M. Bharti

    - Historia i Polityka - Year 2022

    Full text to download in external service

  • Determining and verifying the safety integrity level with security aspects

    Publication

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Full text to download in external service

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publication

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Full text to download in external service

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Full text available to download

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publication

    - Year 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Functional safety and security assessment of the control and protection systems

    Publication

    - Year 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • Software modules and application layer's security structure of RSMAD

    Publication

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Uncertainty assessment in the safety and security oriented risk analyses

    Publication

    - Year 2006

    W artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publication

    - Year 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Full text available to download

  • Safety and security governance problems of critical systems and infrastructures

    Publication

    W artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji

    Full text available to download

  • Methodological issues of security vulnerability analysis and risk assessment

    Publication

    Artykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...

    Full text available to download

  • Challenges in security and safety management of critical systems and infrastructures

    Publication

    - Year 2005

    Referat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...

  • Selected Methods For Increases Reliability The Of Electronic Systems Security

    Publication

    - Journal of KONBiN - Year 2015

    Full text to download in external service

  • Cryptographic Protocols' Performance and Network Layer Security of RSMAD

    Publication

    W artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...

    Full text to download in external service

  • Application of BAN Network to Increase Security in Transport Systems

    Publication

    - Year 2017

    In the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...

    Full text to download in external service

  • Data Model Development for Security Information Sharing in Smart Grids

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text available to download

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publication

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...