Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES

Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publikacja

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19

    Publikacja

    - Knowledge and Process Management - Rok 2022

    Abstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...

    Pełny tekst do pobrania w portalu

  • Managing enterprise IT infrastructure and security 2022

    Kursy Online
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cost assessment of computer security activities

    Publikacja

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Pełny tekst do pobrania w portalu

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publikacja

    - SENSORS - Rok 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Pełny tekst do pobrania w portalu

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Pełny tekst do pobrania w portalu

  • Cybersecurity of Enterprise Infrastructure 2023

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Theory and implementation of a virtualisation level Future Internet defence in depth architecture

    Publikacja
    • J. Konorski
    • P. Pacyna
    • G. Kolaczek
    • Z. Kotulski
    • K. Cabaj
    • P. Szalachowski

    - International Journal of Trust Management in Computing and Communications - Rok 2013

    An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics

    Publikacja
    • C. Busch
    • F. Deravi
    • D. Frings
    • E. Kindt
    • R. Lessmann
    • A. Nouak
    • J. Salomon
    • M. Achcar
    • F. Alonso-Fernandez
    • D. Bachenheimer... i 38 innych

    - IET Biometrics - Rok 2023

    Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...

    Pełny tekst do pobrania w portalu

  • Microbial diversity of inflamed and noninflamed gut biopsy tissues in inflammatory bowel disease.

    Publikacja

    - INFLAMMATORY BOWEL DISEASES - Rok 2016

    BACKGROUND: Inflammatory bowel disease (IBD) is a chronic gastrointestinal condition without any known cause or cure. An imbalance in normal gut biota has been identified as an important factor in the inflammatory process. METHODS: Fifty-eight biopsies from Crohn's disease (CD, n = 10), ulcerative colitis (UC, n = 15), and healthy controls (n = 16) were taken from a population-based case-control study. Automated ribosomal intergenic...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Pełny tekst do pobrania w portalu

  • Standards with cybersecurity controls for smart grid - A systematic analysis

    In recent years numerous standards related to the cybersecurity of smart grids have been published, which led to the challenge for operators in obtaining indications that match their specific objectives and contexts. Although several studies approached this problem by providing more or less comprehensive surveys and overviews of smart grid cybersecurity standards, none of them was dedicated to the actual and important subject of...

    Pełny tekst do pobrania w portalu

  • Cytokine IL6, but not IL-1β, TNF-α and NF-κB is increased in paediatric cancer patients

    Publikacja

    - Acta Biochimica Polonica - Rok 2023

    Cytokines are responsible for maintaining homeostasis as cell growth, differentiation, migration and apoptosis mediators. They play a pivotal role in immune responses to inflammatory reactions. In oncological diseases, the cross-talk between cells of the immunological system and cells of the tumour microenvironment is led by cytokines. Also, the overproduction of cytokines may change the tumour microenvironment and stimulate tumour...

    Pełny tekst do pobrania w portalu

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On symmetric extendibility of quantum states and its applications

    Publikacja

    - Rok 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Pełny tekst do pobrania w portalu