Search results for: INFORMATION SECURITY.
-
Information Security Journal
Journals -
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Data Model Development for Security Information Sharing in Smart Grids
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
IET Information Security
Journals -
Journal of Information Security and Applications
Journals -
EURASIP Journal on Information Security
Journals -
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Security information sharing for smart grids: Developing the right data model
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
International Journal of Information Security and Privacy
Journals -
Journal of Internet Services and Information Security
Journals -
Chinese Journal of Network and Information Security
Journals -
Information and Computer Security
Journals -
ISeCure-ISC International Journal of Information Security
Journals -
International Journal of Computer Network and Information Security
Journals -
International Journal of Communication Networks and Information Security
Journals -
Journal of Information Assurance and Security
Journals -
Journal of Information Systems Security
Journals -
International Journal of Information and Computer Security
Journals -
IEEE Transactions on Information Forensics and Security
Journals -
ACM Transactions on Information and System Security
Journals -
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublicationThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
International Journal of Information Security
Journals -
International Journal for Information Security Research
Journals -
Information Systems Security 2023
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
International Journal on Information Technologies and Security
Journals -
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Information Systems Security 2023/2024
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Information Security Symposium
Conferences -
Information Security Conference
Conferences -
Australasian Information Security Conference
Conferences -
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
International Conference on Information Security and Assurance
Conferences -
Australian Information Security Management Conference
Conferences -
IFIP Information Security & Privacy Conference
Conferences -
Australasian Conference on Information Security and Privacy
Conferences -
International Workshop on Information Security Applications
Conferences -
International Conference on Information Security and Cryptology
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
International Conference on Information Security and Cryptography
Conferences -
Australasia Conference on Information Security and Privacy
Conferences -
Symposium on Requirements Engineering for Information Security
Conferences -
SKLOIS Conference on Information Security and Cryptology
Conferences -
Information Security Practice and Experience Conference
Conferences -
International Conference on the Theory and Application of Cryptology and Information Security
Conferences -
Australasian Information Security Workshop 2007 (Privacy Enhancing Technologies)
Conferences -
Information Hiding and Multimedia Security Workshop
Conferences -
International Conference on Information and Communications Security
Conferences