{"title":"Data Security in Cognitive Information Systems","authors":"Anna Kubarek, L. Ogiela","doi":"10.1109/AINA.2018.00097","DOIUrl":null,"url":null,"abstract":"The aim of the article is to discuss security of IT systems and to identify elements that should be protected against unauthorized access. Software protection is created based on the characteristics of cyberspace. The complexity of IT systems makes security more complicated and unreliable. The development of technology is inseparably connected with the development of threats, which means that the improvement of software solutions has become an extremely important aspect for all users. The article is also intended to indicate what security elements should be considered as both the system user and when creating the security system. This paper presents topic of cognitive security aspects dedicated to management processes.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2018.00097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The aim of the article is to discuss security of IT systems and to identify elements that should be protected against unauthorized access. Software protection is created based on the characteristics of cyberspace. The complexity of IT systems makes security more complicated and unreliable. The development of technology is inseparably connected with the development of threats, which means that the improvement of software solutions has become an extremely important aspect for all users. The article is also intended to indicate what security elements should be considered as both the system user and when creating the security system. This paper presents topic of cognitive security aspects dedicated to management processes.