Filtry
wszystkich: 432
-
Katalog
Wyniki wyszukiwania dla: information security
-
Information Security Journal
Czasopisma -
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Data Model Development for Security Information Sharing in Smart Grids
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
IET Information Security
Czasopisma -
Journal of Information Security and Applications
Czasopisma -
EURASIP Journal on Information Security
Czasopisma -
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublikacjaThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Security information sharing for smart grids: Developing the right data model
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
International Journal of Information Security and Privacy
Czasopisma -
Journal of Internet Services and Information Security
Czasopisma -
Chinese Journal of Network and Information Security
Czasopisma -
Information and Computer Security
Czasopisma -
ISeCure-ISC International Journal of Information Security
Czasopisma -
International Journal of Computer Network and Information Security
Czasopisma -
International Journal of Communication Networks and Information Security
Czasopisma -
Journal of Information Assurance and Security
Czasopisma -
Journal of Information Systems Security
Czasopisma -
International Journal of Information and Computer Security
Czasopisma -
IEEE Transactions on Information Forensics and Security
Czasopisma -
ACM Transactions on Information and System Security
Czasopisma -
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublikacjaThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
International Journal of Information Security
Czasopisma -
International Journal for Information Security Research
Czasopisma -
Information Systems Security 2023
Kursy OnlineThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
International Journal on Information Technologies and Security
Czasopisma -
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Information Security Symposium
Konferencje -
Information Security Conference
Konferencje -
Information Systems Security 2023/2024
Kursy OnlineThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Australasian Information Security Conference
Konferencje -
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
International Conference on Information Security and Assurance
Konferencje -
Australian Information Security Management Conference
Konferencje -
IFIP Information Security & Privacy Conference
Konferencje -
Australasian Conference on Information Security and Privacy
Konferencje -
International Workshop on Information Security Applications
Konferencje -
International Conference on Information Security and Cryptology
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
International Conference on Information Security and Cryptography
Konferencje -
Australasia Conference on Information Security and Privacy
Konferencje -
Symposium on Requirements Engineering for Information Security
Konferencje -
SKLOIS Conference on Information Security and Cryptology
Konferencje -
Information Security Practice and Experience Conference
Konferencje -
International Conference on the Theory and Application of Cryptology and Information Security
Konferencje -
Australasian Information Security Workshop 2007 (Privacy Enhancing Technologies)
Konferencje -
Information Hiding and Multimedia Security Workshop
Konferencje -
International Conference on Information and Communications Security
Konferencje