Wyniki wyszukiwania dla: SECURITY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURITY

Wyniki wyszukiwania dla: SECURITY

  • EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY

    Publikacja
    • H. Dźwigoł
    • M. Dźwigoł–Barosz
    • Z. Zhyvko
    • R. Miśkiewicz
    • H. Pushak
    • R. Miskiewicz

    - Journal of Security and Sustainability Issues - Rok 2019

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On UMTS security.

    Publikacja

    - Rok 2004

    W artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.

  • Internal Security

    Czasopisma

    ISSN: 2080-5268

  • Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security and knowledge management

    Publikacja

    Omówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.

  • Security of Web Services

    Publikacja

    - Rok 2006

    Artykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Pełny tekst do pobrania w portalu

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Pełny tekst do pobrania w portalu

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Pełny tekst do pobrania w portalu

  • Security Mechanisms in the Comcute System

    Publikacja

    - Rok 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Pełny tekst do pobrania w portalu

  • Areas of research in maritime security

    Publikacja

    - Rok 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • Security and Anonymity in Agent Systems

    Publikacja

    - Rok 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security ontology construction and integration

    Publikacja

    - Rok 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Plant Biotechnology in Food Security

    Publikacja

    - Rok 2020

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On some aspects of maritime security

    Publikacja

    - Rok 2005

    Zostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach

  • Quantum security and theory of decoherence

    Publikacja

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Pełny tekst do pobrania w portalu

  • The EU's Cyber Security Strategy

    Publikacja
    • M. Bharti

    - Rok 2023

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mobile Security: Threats and Best Practices

    Publikacja

    - Mobile Information Systems - Rok 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Pełny tekst do pobrania w portalu

  • Cost assessment of computer security activities

    Publikacja

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An integrated framework for security protocol analysis

    Publikacja

    - Rok 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Resilience and Security in Software Defined Networking

    Publikacja
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Rok 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Automatic sound recognition for security purposes

    Publikacja

    - Rok 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Pełny tekst do pobrania w portalu

  • Architecture supporting security of agent systems

    Publikacja

    - Rok 2006

    W rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...

  • An integrated method for security protocols analysis

    Publikacja
    • M. (. Olszewski

    - Rok 2008

  • Aspects of maritime security and safety of Poland

    Publikacja

    - Rok 2005

    Referat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...

  • Indo-French Defence and Security Partnership

    Publikacja
    • M. Bharti

    - Slovak Journal of International Relations - Rok 2023

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Impact of Terrorism on International Peace and Security

    Publikacja
    • M. Bharti

    - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • COMPUTERS & SECURITY

    Czasopisma

    ISSN: 0167-4048 , eISSN: 1872-6208

  • Health Security

    Czasopisma

    ISSN: 2326-5094 , eISSN: 2326-5108

  • Food Security

    Czasopisma

    ISSN: 1876-4517 , eISSN: 1876-4525

  • African Security

    Czasopisma

    ISSN: 1939-2206 , eISSN: 1939-2214

  • Democracy & Security

    Czasopisma

    ISSN: 1741-9166 , eISSN: 1555-5860

  • European Security

    Czasopisma

    ISSN: 0966-2839 , eISSN: 1746-1545

  • Water Security

    Czasopisma

    eISSN: 2468-3124

  • Asian Security

    Czasopisma

    ISSN: 1479-9855

  • Security Challenges

    Czasopisma

    ISSN: 1833-1459

  • INTERNATIONAL SECURITY

    Czasopisma

    ISSN: 0162-2889 , eISSN: 1531-4804

  • Security Forum

    Czasopisma

    ISSN: 2544-1809

  • Security and Privacy

    Czasopisma

    ISSN: 2475-6725

  • SECURITY STUDIES

    Czasopisma

    ISSN: 0963-6412 , eISSN: 1556-1852

  • Security Journal

    Czasopisma

    ISSN: 0955-1662 , eISSN: 1743-4645

  • SECURITY DIALOGUE

    Czasopisma

    ISSN: 0967-0106 , eISSN: 1460-3640

  • Practical Evaluation of Internet Systems' Security Mechanisms

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Pełny tekst do pobrania w portalu

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • Portable raman spectrometer for maritime security applications

    Publikacja

    - Rok 2010

    The fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Pełny tekst do pobrania w portalu

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • The Sense of Security of the Prison Service Offi cers

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Pełny tekst do pobrania w portalu

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Pełny tekst do pobrania w portalu

  • Sectarianism as a Factor Shaping Persian Gulf Security

    Publikacja

    - International Studies - Rok 2015

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Network-centric warfare: a strategy for homeland security

    Publikacja

    - Rok 2006

    Pojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...

  • Web-based marine gis for littoral security

    W artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...

  • Lab security improvement using RFID technologies

    Publikacja

    Technologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...

  • Water resources security and management for sustainable communities

    Publikacja

    - Rok 2021

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Climate Changes in Southeastern Poland and Food Security

    Publikacja
    • B. Sawicka
    • P. Barbaś
    • P. Pszczółkowski
    • D. Skiba
    • F. Yeganehpoor
    • B. Krochmal-Marczak

    - Climate - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Functional safety and security management in critical systems

    Publikacja

    - Rok 2005

    Głównym celem referatu jest przedstawienie wybranych kwestii zarządzania bezpieczeństwem i ochroną w systemach podwyższonego ryzyka i systemach krytycznych. Zarysowuje się kilka praktycznych problemów analizy bezpieczeństwa funkcjonalnego w celu podejmowania decyzji zgodnie z normami międzynarodowymi IEC 61508 i IEC 61511. Podkreśla się, że aspekty związane z ochroną powinny być starannie rozpatrzone zarówno w fazie projektowania,...

  • Hierarchical approach to security monitoring and risk evaluation

    Publikacja

    - Rok 2005

    Przedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.

  • Assessment of port facilities security in crisis management

    Z punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...

  • Security level estimation as a function of residual risks

    Publikacja

    - Rok 2006

    Artykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.

  • Energy Security of Polish Consumers in 2004-2021

    Dane Badawcze
    open access

    Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....

  • Revenue of social security contributions (in PLN billion)

    Dane Badawcze
    open access

    In the period January-September 2020, the expenditure of the Social Insurance Fund amounted to PLN 197.1 billion, and the revenues from contributions and their derivatives - PLN 144.5 billion. As a result, the proceeds covered 73.3 percent. expenses. At that time, the fund received a subsidy from the budget in the amount of PLN 29.3 million.

  • China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond

    Publikacja
    • M. Bharti

    - Historia i Polityka - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Determining and verifying the safety integrity level with security aspects

    Publikacja

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Functional safety and security assessment of the control and protection systems

    Publikacja

    - Rok 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Pełny tekst do pobrania w portalu

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Pełny tekst do pobrania w portalu

  • Software modules and application layer's security structure of RSMAD

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Uncertainty assessment in the safety and security oriented risk analyses

    Publikacja

    - Rok 2006

    W artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publikacja

    - Rok 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Pełny tekst do pobrania w portalu

  • Safety and security governance problems of critical systems and infrastructures

    Publikacja

    W artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji

    Pełny tekst do pobrania w portalu

  • Cryptographic Protocols' Performance and Network Layer Security of RSMAD

    Publikacja

    W artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Methodological issues of security vulnerability analysis and risk assessment

    Publikacja

    Artykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...

    Pełny tekst do pobrania w portalu

  • Selected Methods For Increases Reliability The Of Electronic Systems Security

    Publikacja

    - Journal of KONBiN - Rok 2015

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Challenges in security and safety management of critical systems and infrastructures

    Publikacja

    - Rok 2005

    Referat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...

  • Application of BAN Network to Increase Security in Transport Systems

    Publikacja

    - Rok 2017

    In the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Data Model Development for Security Information Sharing in Smart Grids

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publikacja

    - SENSORS - Rok 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Pełny tekst do pobrania w portalu

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...