Information & Security: An International Journal最新文献

筛选
英文 中文
Developing Regional Air Defence Capabilities: Role of NC3A 发展区域防空能力:NC3A的作用
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2511
M. Bartolozzi
{"title":"Developing Regional Air Defence Capabilities: Role of NC3A","authors":"M. Bartolozzi","doi":"10.11610/ISIJ.2511","DOIUrl":"https://doi.org/10.11610/ISIJ.2511","url":null,"abstract":"The South Eastern European nations of the Balkan Region form an area of countries with similar geo-political issues. These nations need to go through a modernization process of their Air Defence capabilities, in times where financial limitations make it difficult for a single nation to acquire such capabilities on their own. The NATO C3 Agency is highly engaged with the nations of South East Europe in supporting their C4ISR transformation efforts, and possesses all skills, capabilities, and tools to design, procure and implement a regional, multi-national air defence capability, with truly joint situational awareness and integration of national sensors and Missile Defence systems.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UBIQUITOUS INSECURITY? HOW TO "HACK" IT SYSTEMS 无处不在的不安全感?如何“黑”it系统
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0706
Michael Näf
{"title":"UBIQUITOUS INSECURITY? HOW TO \"HACK\" IT SYSTEMS","authors":"Michael Näf","doi":"10.11610/ISIJ.0706","DOIUrl":"https://doi.org/10.11610/ISIJ.0706","url":null,"abstract":"ly, a port specifies the endpoint of a connection on a networked device. Ports are identified as numbers. Many port numbers are standardized14 and denote a specific network or application protocol (e.g. port number 80 for HTTP or 23 for Telnet). A lot of the software components serving the respective protocols contain well-known and well-documented vulnerabilities or weaknesses (for instance, a system with anonymous login enabled). Thus, it is only a matter of finding computers that make use of those vulnerable protocols in order to try and attack the affected systems. This search can be automated using a number of tools. One famous example is SATAN (Security Administrator Tool for Analyzing Networks). SATAN is downloadable at no charge and comes with an easy-to-use HTML-based user interface. The tool automatically and efficiently scans any given host (or the respective subnet) for a number of known vulnerabilities and produces a clear and readable report. This report can then be used as a basis to look for actual vulnerabilities.15 2.3. How to Write a Computer Virus Computer viruses and worms are a common way of accessing computer systems without authorization. The effects differ: some viruses merely cause annoyance and inconvenience; others affect the functionality and stability of computing environments or compromise the confidentiality or integrity of (sometimes valuable) information. Three major aspects are important if someone wants to write their own computer virus: ● Payload. What does the virus do once it has infected a system? The amount of damage to be caused by the virus is arbitrary and can be freely specified by the author; ● Delivery and Propagation. How does the virus reach the target systems? And, in case of a (selfpropagating) worm, how does the worm automatically spread to other computer systems? ● Execution. How is the virus payload executed on the target machine? Computer viruses are not dangerous as long as they are not executed. There are two generic methods of ensuring that a virus is executed: (1) The virus can be programmed to exploit one of the countless vulnerabilities that exist in many of today’s mail clients or operating system components. Consequently, these types of viruses are executed without any form of user interaction; (2) Alternatively, the virus can rely on user interaction, in which case the virus is typically delivered as a simple e-mail attachment with a subject heading and content that invites people to open the attachment. The virus is executed as soon as the attachment is opened. Short Analysis of the ILOVEYOU Worm This section gives a short overview of the infamous ILOVEYOU worm by exploring each of the three aspects identified above. The goal is to give some insights into the internals of a virus (or worm) and show how easy it is to create this digital germ. ● Payload: The ILOVEYOU worm is written in Visual Basic Script, an easy-to-learn and powerful programming language by Microsoft, which is often","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Art of Achieving Political Goals without Use of Force: War by Non-Military Means 不使用武力实现政治目标的艺术:非军事手段的战争
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3911
V. Stoilova
{"title":"The Art of Achieving Political Goals without Use of Force: War by Non-Military Means","authors":"V. Stoilova","doi":"10.11610/ISIJ.3911","DOIUrl":"https://doi.org/10.11610/ISIJ.3911","url":null,"abstract":"Nowadays, the boundaries between war and peace are increasingly blurred. Over the past few years we can observe the appearance of new terms in the field of international relations – ‘hybrid war,’ ‘hybrid conflicts’ or ‘hybrid threats.’ Despite the absence of a generally recognized definition of the concept, its characteristics are close to the definition of terrorism. Some security analysts indicate this type of conflict as a war, combining conventional methods with guerrilla, cyber and information warfare techniques (media and Internet) as well as with non-military actions, which run contrary to international law and aim to achieve specific policy goals.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testbed for implementation of advanced IT Participation 实现高级IT参与的测试平台
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.0611
A. Nachev
{"title":"Testbed for implementation of advanced IT Participation","authors":"A. Nachev","doi":"10.11610/isij.0611","DOIUrl":"https://doi.org/10.11610/isij.0611","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Classroom to Online Teaching – A Case during COVID19 从课堂到网络教学——covid - 19期间的一个案例
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4620
Harri Ruoslahti
{"title":"From Classroom to Online Teaching – A Case during COVID19","authors":"Harri Ruoslahti","doi":"10.11610/isij.4620","DOIUrl":"https://doi.org/10.11610/isij.4620","url":null,"abstract":"The Covid19-virus outbreak during the spring of 2020 forced many changes in work, life and society Laurea University of Applied Sciences (Laurea) closed all of its six campuses on March 9, 2020, and all teaching activities were transferred to online communication and learning platforms such as Zoom, Teams and Optima This article presents qualitative case study research Six teachers of Laurea University of Applied Sciences wrote short narratives of their experiences in moving from classroom to online teaching The narratives were analysed, and the results grouped under relevant themes: Level of Preparation, Challenges and Risks, and Student Feedback and New ways of Work The transition from classroom to online teaching was relatively easy for the respondents The main reason was that the program already had created extensive online content and could be used for a fast transition The contribution of this article is in presenting one practical case of rapid transition from classroom to online learning","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Necessity to Create a National Processing Centre 论建立国家加工中心的必要性
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2821
A. Biryukov, O. Gordieiev, O. Yakimenko
{"title":"On the Necessity to Create a National Processing Centre","authors":"A. Biryukov, O. Gordieiev, O. Yakimenko","doi":"10.11610/ISIJ.2821","DOIUrl":"https://doi.org/10.11610/ISIJ.2821","url":null,"abstract":"The wide spread of Visa and Master Card international payment systems and the absence of a national processing centre in Ukraine adversely affect the development of the country’s banking system and cause further problems. This article gives a brief description of the problems and suggests measures towards their solution.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Modeling and Simulation to Enhance National and Multi-National Cooperation 应用建模和仿真来加强国家和多国合作
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0301
Roland J. Ronald
{"title":"Applying Modeling and Simulation to Enhance National and Multi-National Cooperation","authors":"Roland J. Ronald","doi":"10.11610/ISIJ.0301","DOIUrl":"https://doi.org/10.11610/ISIJ.0301","url":null,"abstract":"The article presents case studies and practical applications enabling the readers to learn about military simulations and how they are used in defense and crisis management. It is the first in a series that will describe the application of modeling and simulation to enhance country-to-country, agency-to-agency and coalition-to-coalition cooperation and understanding and provides information on the availability of M&S applications, their potential benefits and associated cost. The content is relative to company news – updating the reader on the latest developments in the military simulation and training industry and assisting in developing a hypothetical plan for the implementation and use of various M&S applications. The coverage focus is generally on the command laboratory simulation but is defined in the context of crisis management center concepts. HLA and Beyond: Interoperability Challenges Judith Dahmann, Marnie Salisbury, Phil Barry Chris Turrell and Paul Blemberg","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IMoViS: A System for Mobile Visualization of Intrusion Detection Data 入侵检测数据的移动可视化系统
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1214
A. Sanna, C. Fornaro
{"title":"IMoViS: A System for Mobile Visualization of Intrusion Detection Data","authors":"A. Sanna, C. Fornaro","doi":"10.11610/ISIJ.1214","DOIUrl":"https://doi.org/10.11610/ISIJ.1214","url":null,"abstract":"Intrusion detection applications often produce large amount of data. The visualization of this information is a key task in order to allow the user to effectively detect attacks and intrusions. Information visualization is an important sub-discipline within the field of scientific visualization and focuses on visual mechanisms designed to communicate clearly to the user the structure of information and to facilitate the access to large data repositories. Information visualization helps people in dealing with all this information by taking advantage of the visual perception capabilities of the human being. By presenting the information in a more graphically oriented fashion, it is possible for the human brain to take advantage of its perceptual system in the initial information acquiring, rather than immediately relying entirely on the cognitive system. Some of the most important papers in the field are collected in a book. Information visualization algorithms require merging of data visualization methods, computer graphics solutions, and graphical interface design.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Naval Craft, Weapon and Sensor Systems 海军舰艇、武器和传感器系统
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1304
Lürssen Werft
{"title":"Naval Craft, Weapon and Sensor Systems","authors":"Lürssen Werft","doi":"10.11610/ISIJ.1304","DOIUrl":"https://doi.org/10.11610/ISIJ.1304","url":null,"abstract":"The article provides an inside view on trends in technology of current and future naval construction programmes as seen by Lürssen, the German shipyard for naval vessels located in Bremen, Germany. The changing operational requirements recognised in many western European and overseas navies focus on a surface combatant such as a corvette-sized ship with advanced capabilities to meet the specific demands for littoral warfare operations. Based on these new requirements the article outlines technologies in current and future designs for Corvetteand Frigatesized ships. It includes different types of platforms together with their specific benefits and capabilities for the intended employment in littoral warfare. In addition, measures to reduce the ship’s signatures for enhanced survivability are broadly discussed. With respect to adequate sea-keeping, manoeuvrability, speed and endurance (properties) in the littoral environment, the article also expands on the development and characteristics of new propulsion systems emphasising the overall need for a high degree of automation in all system components. The discussion on modern combat system technology once again underlines the need for a modular and flexible system design with open system architecture. The highest possible level of system automation reducing the number of personnel in the CIC and ensuring immediate reaction in a threat scenario is a further topic. Full integration of all sensors and weapons coupled with proven operational software is the essential technical requirement in this context. Finally, the article comments on some economical aspects of current building philosophies touching thereby on possibilities for crew reduction, costs reduction, potential capabilities for midlife refit, and growth potential. The overall issue of ―Transforming the Bulgarian Navy‖ is aimed at a permanent adaptation of Bulgarian Naval Forces to achieve high performance standards and combat effectiveness to meet the requirements of maritime warfare in the 21 st century including those of interoperability and joint forces operations. This article on ―Technologies for Advanced Naval Capabilities‖ has been developed from a leading modern shipyard’s point of view, based on some essential convictions:  A glance at trends of technologies in current and future naval construction programmes will show that evolution in modern shipbuilding has not come to an end and is continuing; Naval Craft, Weapon and Sensor Systems 52  Changing operational requirements for surface combatants due to the current global threat perception are demanding that these new technologies are integrated into combat ships of the future;  The most important aspect driving future shipbuilding programmes worldwide will be the overall requirement for the vessels’ littoral warfare capability and effectiveness to counter asymmetric attacks;  Procurement programmes will increasingly be ruled by nations’ restricted defence budgets. Background of L","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125557345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Validation Of Metamodels For Intelligent Agents In Conflict 冲突智能体元模型的实验验证
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1205
James Moffat, S. Witty
{"title":"Experimental Validation Of Metamodels For Intelligent Agents In Conflict","authors":"James Moffat, S. Witty","doi":"10.11610/ISIJ.1205","DOIUrl":"https://doi.org/10.11610/ISIJ.1205","url":null,"abstract":"As discussed in a previous paper, we are attempting to develop mathematical ‘metamodels’ of agent-based simulation models. These meta-models fall within the area of what is loosely referred to as complexity theory, and exploit the mathematical approaches which are being developed to gain understanding of natural non-linear systems (such as ecosystems of species, or the physics of spin systems). Such an approach is most likely to be relevant to future command and control structures such as Network Centric Warfare. In particular, Moffat discusses in detail the connection between the mathematics of complexity and the likely emergent behaviour of future command and control driven ‘Information Age’ conflict.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信