{"title":"Perceived severity of vulnerability in cybersecurity: cross linguistic variegation","authors":"Wiktor Sedkowski, Karol Bierczyński","doi":"10.1109/ICCST52959.2022.9896488","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896488","url":null,"abstract":"The emergence of artificial intelligence [AI] , computer vision, and speech recognition systems have made significant growth in all areas of human life including cybersecurity. Multiple cybersecurity companies are trying to leverage AI to help combat cyberattacks as AI and machine learning can faster and cheaper monitor for any suspicious activity in the network, informing security specialists and network administrators only in case of a true emergency. As modern AI-powered systems are cooperating with human users by not only providing raw reports but also producing information based on text generation algorithms and text-to-speech functions, it is essential to ensure that this sensitive, security related information is not biased. In this pilot study, we are trying to showcase the problem of the perceived severity of a vulnerability by recipients speaking different native languages. Also, we are trying to answer the following question: how should an AI system present the information in order for the user to correctly understand the severity of the finding?","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the most important fire threats of the building","authors":"Adam Malatinský, M. Hromada","doi":"10.1109/ICCST52959.2022.9896486","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896486","url":null,"abstract":"The article deals with analysing the most important threats in industrial buildings and also evaluates the top 12 most important threats using a quantitative and qualitative threat analysis method, dividing them into primary, secondary and tertiary according to their significance. Based on the results, preventive measures can be created and applied for the most important threats that could significantly affect the proper operation of the building.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries","authors":"H. Muhammad, M. Hromada","doi":"10.1109/ICCST52959.2022.9896521","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896521","url":null,"abstract":"With improvements in Internet technology, the majority of governments throughout the world have adopted Information and Communication Technologies (ICTs) to deliver more efficient and effective services to their agencies, companies, and people. In general, e-Government refers to the use of information and communication technologies (ICTs) by government agencies to offer and improve public service delivery. Developing countries are extremely enthusiastic about implementing e-government. But these emerging countries are still in the beginning stages of development and suffer from shortages. In e-government, individuals are concerned about their privacy since e-government frequently deals with personal information. This article studies the concerns and obstacles that affect personal information security in e-government, taking into account the majority of security viewpoints, this research proposes models of e-government from perspective of protecting personal data. The study is qualitative in terms of methodology, it depends on documentary studies, content analysis and comparative study.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Interactive Education of People in the Field of Protection of Soft Targets","authors":"Lukas Kotek, M. Hromada, Dora Kotkova","doi":"10.1109/ICCST52959.2022.9896591","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896591","url":null,"abstract":"This article discusses the possibilities of interactive online education of people in the field of protection of soft targets. The initial premise is the fact that at the time of the attack, the victims of the attack (people) are always present and professional assistance is not available until their arrival. In our opinion, educating the general public in suitable areas is key to reducing the negative effects of violent attacks. Our research seeks to find a time- and cost-effective way to educate and train people in this area. The article presents the current progress in our research on this issue.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Garzia, F. Borghini, Ekaterina Makshanova, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of cybersecurity attacks during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Ekaterina Makshanova, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST52959.2022.9896577","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896577","url":null,"abstract":"The assessment of perceived safeness and risk by persons is especially valuable for security and safety managing. Each person is founded on the opinion of other people to make a selection and the Internet embodies the place where these opinions are mostly pursued, taken, and estimated. From this point of view, social networks are characterized by a considerable influence. Due to this reason, Opinion Mining and Sentiment Analysis have found outstanding employs in diverse environments and one of the most remarkable is expressed by public security and safety.The purpose of the present work is to investigate the perception of safeness and risk of cybersecurity attacks during COVID-19 pandemic by means of the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management","authors":"A. Veľas, Z. Zvaková, M. Boroš","doi":"10.1109/ICCST52959.2022.9896606","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896606","url":null,"abstract":"The article focuses on the issue of physical protection management, especially guarding, in organizations during a pandemic. The need to solve this issue was determined by the spread of COVID-19. The positives and negatives of implementing the asset protection by own employees and private security service (outsourced) were compared. The platform for this comparison was personal interviews with security managers. The cost of physical protection - guarding service in both ways (by own employees and private security service) were compared. The article contains a solution generally usable in designing asset protection outside the pandemic.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Loveček, Jakub Durica, K. Kampová, Katarína Petrlová
{"title":"Biometric Identity Verification as Part of Physical Protection Systems","authors":"T. Loveček, Jakub Durica, K. Kampová, Katarína Petrlová","doi":"10.1109/ICCST52959.2022.9896544","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896544","url":null,"abstract":"The presented article is focused on access control systems like the basic elements of the property protection system, designed for intelligent access/exit control of persons to/from the protected area and for their movement tracking. The authors highlight the importance of identity verification within alarm systems designed to detect unauthorized access and describe the possibilities of applying various authentication information within access control systems. They focus on the method of authentication using the unique biometric characteristics of a man. In addition to the many advantages, that this approach presents, there are limitations in its application, resulting from the technological means and procedures used. These limitations can be summarized as metrics of biometric system performance. However, these metrics are often evaluated on ideal, so-called zero effort impostor datasets, which distort the design of physical protection systems. In this article, the authors emphasize the need to focus on the quantification of biometric performance, including spoof attacks. By testing the selected biometric system, authors outline the possibilities for real evaluation of the performance level. The results from testing can be used for physical protection systems models and for simulating the violation of the protected area (e.g. elements of critical infrastructure).","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economic Evaluation of Cost and Benefits of Implementing Monitoring and Tracking System of Persons in Medical Facilitates","authors":"K. Kampová, Katarína Mäkká, Katarína Petrlová","doi":"10.1109/ICCST52959.2022.9896566","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896566","url":null,"abstract":"Healthcare is one of the most important systems of the state, the non-functioning of which causes a serious impact on the health and life of its population. From the point of view of the continuous provision of health care, it is necessary to consider measures that would reduce the risk of potentially spreading infectious respiratory diseases (such as COVID - 19) to health professionals. Continuous provision of health care is conditioned by the staffing of health facilities. One of the possible and long-term measures that contributes to reducing the transmission of COVID-19 as well as other infectious diseases is the monitoring and tracing of people. Within the project APPV-20-0457 Monitoring and Tracing of Movement and Contacts of Persons in Medical Facilities, researchers at the Faculty of Security Engineering of the University of Žilina address this issue. The research focuses on creating cost-effective tool for tracking and monitoring people in healthcare facilities using appropriate innovative technological solutions. The presented article focuses on solving a part of the researched issue of the economic evaluation of monitoring and tracing of persons in health care facilities. It points out the possibilities of applying the method of cost-benefit analysis when deciding on the implementation of monitoring and tracing systems for selected medical facilities.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Smart Meters with Custom Application","authors":"David Kohout, P. Mlynek","doi":"10.1109/ICCST52959.2022.9896543","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896543","url":null,"abstract":"This paper presents a solution for testing smart meters and other related technologies in relation to their cyber security. To test all possible requirements from electricity distribution companies and from the Czech Republic legislation there is a need for a flexible tool. None other solutions were acceptable for our needs, so we designed and developed a custom application for testing smart meters. Our solution can be used for testing smart meters and their interoperability, compatibility with communication technologies, security of the smart meters and all the data, that can be read from them. All testing takes place at our Smart Grid Lab at BUT.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Bespalov, L. Kovalchuk, Hanna Nelasa, R. Oliynykov, Alberto Garoffolo
{"title":"Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains","authors":"Y. Bespalov, L. Kovalchuk, Hanna Nelasa, R. Oliynykov, Alberto Garoffolo","doi":"10.1109/ICCST52959.2022.9896484","DOIUrl":"https://doi.org/10.1109/ICCST52959.2022.9896484","url":null,"abstract":"In sidechains with Latus consensus, a block forger generates a block using SNARK-proofs, created by decentralized provers and organized in a perfect binary tree (proof tree). One of the most important questions is to assign incentives for these proofs. In this paper, the game theory instruments are used to investigate incentive distribution in proof trees for SNARK-based sidechains to provide stable and efficient block generation. Two different models are considered: when only one sidechain exists, and when there exist a lot of sidechains among which provers may switch any time, trying to get a higher incentive. Utilization of Stirling numbers with non-integer arguments turns out to be very efficient for the second model.","PeriodicalId":364791,"journal":{"name":"2022 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":" 67","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120834651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}