Information & Security: An International Journal最新文献

筛选
英文 中文
Modern Information Technologies and General Public Protection in the Republic of Bulgaria 保加利亚共和国的现代信息技术和一般公共保护
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1004
Svetoslav Andonov, K. Kostadinova, Emil Simeonov
{"title":"Modern Information Technologies and General Public Protection in the Republic of Bulgaria","authors":"Svetoslav Andonov, K. Kostadinova, Emil Simeonov","doi":"10.11610/ISIJ.1004","DOIUrl":"https://doi.org/10.11610/ISIJ.1004","url":null,"abstract":"ulgaria is in the process of adapting its system for crisis and emergency management to the requirements of democratic governance, market economy and membership in NATO and the European Union. With the start of the comprehensive defense reform in 1999, the Civil Protection Agency, until that time part of the Ministry of Defense, received the status of a State Agency as a first-level budget holder directly subordinated to the Council of Ministers. Dealing with a variety of natural and man-made disasters, the Agency cooperates with numerous organizations, including the Ministry of Defense, the Ministry of the Interior, local authorities, etc. The Agency has a range of capabilities allowing it to serve as the central national authority in dealing with civil emergencies. With a history of timely and efficient contribution to mitigating the consequences of natural disasters in neighboring countries, it further plays a very active role in promoting emergency management cooperation in South East Europe. 1 After describing the roles of the Agency, this paper presents major developments in implementing advanced information and communications technologies both in national and international setting. The recently signed Agreement on the establishment of the Civil-Military Emergency Planning Council for Southeastern Europe is given in the appendix.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness MonSys:用于监控数字服务可用性、威胁情报和网络弹性态势感知的可扩展平台
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4611
George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, G. Zahariev
{"title":"MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness","authors":"George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, G. Zahariev","doi":"10.11610/isij.4611","DOIUrl":"https://doi.org/10.11610/isij.4611","url":null,"abstract":"Today’s digital society implies interconnectivity between the online operations of different sectors of everyday life and economy alike. As a consequence, malicious activities targeted towards a single online service could hurt entire industries and multiple private and public organizations. This interdependence between online services and economic units is an imperative for targeted efforts ensuring the integrity and availability of individual systems and complex systems-of-systems alike. This article presents MonSys, a flexible, robust, and scalable monitoring platform, implemented as a cloud-based service and an onpremise solution, specifically designed to address the need for ensuring service availability at an individual level. MonSys provides several standardized services availability checks, such as web-based services from multiple geographical locations, and a flexible platform and tools for defining customized complex services. Particular attention is paid to the processes of metrics collection, processing, storage, and querying. MonSys can perform custom availability checks for different types of infrastructures, such as various black-box, grey-box, and white-box availability checks/metrics. The article presents also results from piloting the platform on performance and scalability and options for integration in early-warning and intelligent signaling, based on behavioral pattern analysis and predictive simulations. A R T I C L E I N F O : RECEIVED: 7 JULY 2020 REVISED: 31 AUG 2020 ONLINE: 7 SEP 2020 K E Y W O R D S : scalability, cyber threat, vulnerability analysis, cyber risk, resilience, early warning, situational awareness Creative Commons BY-NC 4.0 G. Sharkov et al., ISIJ 46, no. 2 (2020): 155-167","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129642431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Warfare and Security 信息战与安全
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0408
I. Monitor
{"title":"Information Warfare and Security","authors":"I. Monitor","doi":"10.11610/ISIJ.0408","DOIUrl":"https://doi.org/10.11610/ISIJ.0408","url":null,"abstract":"In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks 可信网络倡议:荷兰对DDoS攻击的响应
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3202
M. Rademaker, Marc Gauw
{"title":"Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks","authors":"M. Rademaker, Marc Gauw","doi":"10.11610/isij.3202","DOIUrl":"https://doi.org/10.11610/isij.3202","url":null,"abstract":"Cybercrime is on the rise and distributed denial of services attacks are among the most used by hacktivists, criminals, and even states. This article focuses on a Dutch solution to that problem, namely the Trusted Networks Initiative. The initiative aims at a global trust concept that provides website operators with a last resort option in case a large or long-lasting DDoS attack cannot be mitigated by other anti-DDoS means. The paper describes the foundational principles of the initiative, and more specifically the intended solution via the trusted routing concept.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains 评估欧盟作为全球行动者和关键基础设施和供应链保护者的职能的交叉影响
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2903
T. Tagarev, Venelin Georgiev, J. Ahokas
{"title":"Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains","authors":"T. Tagarev, Venelin Georgiev, J. Ahokas","doi":"10.11610/ISIJ.2903","DOIUrl":"https://doi.org/10.11610/ISIJ.2903","url":null,"abstract":"The paper presents main results of the analysis of cross impact between two of the ‘big themes’ in the FOCUS project: “EU as a global actor based on the wider Petersberg Tasks” and “Critical infrastructure & supply chain protection.” The cross impact was evaluated by experts from both EU and non-EU countries. For each theme they were asked to estimate significance and interrelation of trends, thus allowing the research team to identify centres of gravity within each theme. Then they estimated the pairwise linkage of trends from the two themes. The study resulted in identification of key linkages among trends, to be further explored in the analysis of respective contexts, mission roles, and security research scenarios. This practical test of the presented model—having relatively limited number of domains and trends—contributes to the transparency and illustrative power of FOCUS methodology and can be expanded in future studies.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 基于网络态势感知概念的农业企业管理信息系统保护
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4612
Valentin V. Nekhai, M. Dorosh, Valentin A. Nekhai
{"title":"Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems","authors":"Valentin V. Nekhai, M. Dorosh, Valentin A. Nekhai","doi":"10.11610/isij.4612","DOIUrl":"https://doi.org/10.11610/isij.4612","url":null,"abstract":"There are similarities in information management between military and agricultural systems, e.g. distribution, impact of the environment, mobile agents, and the human factor are functioning in 2and 3-dimensional space. This allows spin-offs in the implementation of the concept of Cyber Situational Awareness (CSA), which is studied intensively in the defence field, but so far has not been applied with the aim to protect agricultural enterprise management systems. The purpose of this study is to substantiate the directions for the implementation of the CSA concept for the protection of corporate networks of agricultural enterprises, with the hypothesis that this will allow effective protection. The methodological basis is formed by the current provisions of the CSA concept, system analysis and synthesis. Results. The stability of communication channels and security is largely determined by the reliability of data transmission in the network, which is ensured by the design of the appropriate network structure. This in turn will provide opportunities to implement the first level of the CSA concept in IT to protect agricultural management systems. A R T I C L E I N F O : RECEIVED: 31 MAY 2020 REVISED: 04 SEP 2020 ONLINE: 18 SEP 2020 K E Y W O R D S : Cyber Situational Awareness, network protection, information system, control system Creative Commons BY-NC 4.0 Using the CSA Concept for Protection of Agricultural Enterprise Management IS","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Agent Systems to Support Coalition Forces 支持联军的多智能体系统
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.0809
Z. Maamar, P. Labbé
{"title":"Multi-Agent Systems to Support Coalition Forces","authors":"Z. Maamar, P. Labbé","doi":"10.11610/isij.0809","DOIUrl":"https://doi.org/10.11610/isij.0809","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security Architecture: An Integrated Approach to Security in the Organization 信息安全架构:组织安全的综合方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0409
I. Monitor
{"title":"Information Security Architecture: An Integrated Approach to Security in the Organization","authors":"I. Monitor","doi":"10.11610/ISIJ.0409","DOIUrl":"https://doi.org/10.11610/ISIJ.0409","url":null,"abstract":"In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies 参与国防学院和安全研究所和先进信息技术联盟
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0508
Petar Mollov
{"title":"Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies","authors":"Petar Mollov","doi":"10.11610/ISIJ.0508","DOIUrl":"https://doi.org/10.11610/ISIJ.0508","url":null,"abstract":"The participation of Rakovski Defense College in the activities of the Consortium of Defense Academies and Security Studies Institutes creates an opportunity for effective implementation of advanced information technologies in the educational and research activities of the College and promotes the reform in the military education system. It also contributes to the active participation of the Republic of Bulgaria in the \"Partnership for Peace\" (PfP) program and assists Bulgarian preparation for joining NATO. Knowledge of the purpose, aims, tasks and structure of the Consortium allows Rakovski Defense College, as well as other governmental and non-governmental, military and civil organizations and individuals, working in the sphere of security and defense, to take active and productive part in the process.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality in an Enhanced Command and Control Application 增强现实在增强指挥和控制中的应用
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5023
Alexander Kolev, Lilia Pavlova
{"title":"Augmented Reality in an Enhanced Command and Control Application","authors":"Alexander Kolev, Lilia Pavlova","doi":"10.11610/isij.5023","DOIUrl":"https://doi.org/10.11610/isij.5023","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信