Search results for: INFORMATION SECURITY. - Bridge of Knowledge

Search

Search results for: INFORMATION SECURITY.

Search results for: INFORMATION SECURITY.

  • ENISA Study: Challenges in Securing Industrial Control Systems

    Publication

    - Year 2013

    In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...

  • Horizon Europe proposals - Administrative Part

    The dataset contains data collected during the HE National Contact Point training on Oct. 12, 2022, reg. the administrative part of Horizon Europe grant proposals. The data set includes presentations concerning  administrative forms of 2022 proposals and their content, including participant data; information about abstract writing, keyword choice and...

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Publication

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Full text available to download

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publication

    - TASK Quarterly - Year 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Full text available to download

  • Automatic Analysis of Trajectories of Moving Objects

    Publication

    Ongoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...

    Full text available to download

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • Current risk analysis and management issues in technical systems.

    Dealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...

    Full text available to download

  • Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji

    Publication

    Niniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publication

    - Year 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Full text available to download

  • Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2018

    In this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...

    Full text available to download

  • Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk

    Publication

    - Year 2016

    Ensuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...

    Full text to download in external service

  • KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR

    Przedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...

    Full text to download in external service

  • Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol

    Publication

    The industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...

    Full text available to download

  • Modeling the impact of surface currents in a harbor using graph theory

    Publication

    - Zeszyty Naukowe Akademii Morskiej w Szczecinie - Year 2016

    Ensuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...

    Full text available to download

  • Validation of a virtual test environment for C2X communication under radio jamming conditions

    Publication

    - Year 2020

    In this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...

    Full text available to download

  • Managing enterprise IT infrastructure and security 2022

    e-Learning Courses
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Interaction with medical data using QR-codes

    Publication

    Bar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....

    Full text to download in external service

  • Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System

    Publication

    - FLUCTUATION AND NOISE LETTERS - Year 2015

    A recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...

    Full text available to download

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Cybersecurity of Enterprise Infrastructure 2023

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Trust Management Method for Wireless Sensor Networks

    Publication

    - Year 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Full text available to download

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Klaudia Skelnik dr

    People

    dr Klaudia Skelnik Prodziekan Wydziału Prawa i Administracji Wyższa Szkoła Bankowa w Gdańsku, doktor nauk społecznych w dyscyplinie nauki o bezpieczeństwie, absolwent studiów MBA zarządzanie bezpieczeństwem, mgr politologii w specjalizacji ustrojowo-samorządowej, posiadająca podyplomowe wykształcenie wyższe w zakresie prawa Unii Europejskiej, Edukacji dla bezpieczeństwa, Bezpieczeństwa i Higiena Pracy oraz szereg kursów i szkoleń...

  • Political Parties in the Digital World

    Publication

    - Year 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publication

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia

    Publication

    - Year 2014

    Zadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....

  • E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes

    Publication

    - Year 2020

    E-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...

    Full text available to download

  • Bartosz Woliński dr inż.

    Courses Informatization strategies (winter sem. 20/21, winter sem. 22/23) IT teams technologies (winter sem. 20/21) Decision analysis (winter sem. 20/21, winter sem. 21/22, summer sem. 22/23) Controlling in IT (summer sem. 20/21, 21/22, 22/23) Projects in enterprises (summer sem. 20/21, 22/23) Integrated enterprise information systems (winter sem. 20/21) Managing enterprise IT infrastructure and security (summer sem. 2021/22) Decision...

  • Deep Learning: A Case Study for Image Recognition Using Transfer Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Deep Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure

    Safety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...

    Full text to download in external service

  • Towards the value-based design of on-line services

    Publication

    The paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...

  • Techniczne aspekty implementacji nowoczesnej platformy e-learningowej

    Zaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.

    Full text available to download

  • Quantum security and theory of decoherence

    Publication

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Full text available to download

  • Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne

    W referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...

    Full text to download in external service

  • Edible black ant Smith (Carebara vidua) as human food – A systematic review

    Publication
    • S. A. Siddiqui
    • L. Ho
    • S. Adimulam
    • A. Nagdalian
    • B. Yudhistira
    • R. Castro Munoz
    • S. Ibrahim

    - Journal of Insects as Food and Feed - Year 2024

    Meeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...

    Full text available to download

  • Zarządzanie wiedzą w małych przedsiębiorstwach oferujących wiedzochłonne usługi biznesowe

    Celem artykułu jest przedstawienie praktyk zarządzania wiedzą oraz czynników wpływających na sukces, bądź porażkę w ich wdrażaniu na podstawie badania jakościowego przeprowadzonego w trzech firmach działających na terenie województwa pomorskiego. Firmy te należą do sektora małych i średnich przedsiębiorstw oraz oferują wiedzochłonne usługi biznesowe (knowledge-intensive business services – KIBS). W artykule podjęto próbę odpowiedzi...

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents

    Electronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...

    Full text available to download

  • Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems

    Publication

    - Year 2021

    This chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...

    Full text to download in external service

  • Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review

    Publication
    • S. A. Siddiqui
    • K. Asante
    • N. Ngah
    • Y. Saraswati
    • Y. Wu
    • M. Lahan
    • O. Aidoo
    • I. Fernando
    • S. Povetkin
    • R. Castro Munoz

    - Journal of Insects as Food and Feed - Year 2024

    The rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...

    Full text available to download

  • Józef Woźniak prof. dr hab. inż.

    People

    Professor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...

  • Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger

    W artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....

    Full text to download in external service

  • Maciej Szczodrak dr inż.

  • Development of the System Assurance Reference Model for Generating Modular Assurance Cases

    Publication

    - Year 2023

    Assurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...

    Full text to download in external service

  • Testy platformy SAN dla sektora elektroenergetycznego

    Współczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...

    Full text available to download