scholarly journals Applying intelligent methods of risk analysis in information communication systems

2019 ◽  
Vol 30 ◽  
pp. 04018
Author(s):  
Maria Maslova

In the modern world there is a constant growth of information and information technologies, a risk-oriented approach to managing information security of information and communication systems of companies seems increasingly promising. But apart from development, there are threats and risks that affect both the image and the financial component of companies. Therefore, one of the main tasks is to assess, analyze and prevent the risks of information security in information communication systems using modern methods in conjunction with the use of intelligent analysis methods.

Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2020 ◽  
Vol 72 (4) ◽  
pp. 162-167
Author(s):  
S.A. Аdiljanova ◽  
◽  
G.A. Тulepberdinova ◽  
M.J. Sakypbekova ◽  
N.A. Тekesbayeva ◽  
...  

The article discusses the possibility of modifying the genetic algorithm (GA) to solve the problems of selection, optimization and management of the dynamic configuration of information security means for the security chain of information and communication systems (ICS). The scientific novelty of the work lies in the fact that GA recommends using the total cost of information loss risks, as well as cost indicators for each class of information security systems as a criterion for optimizing the composition of the information security system. The genetic algorithm is considered as a kind of problem associated with multiple choice when optimizing the choice of information content of information security and solving problems of dynamic management of cybersecurity resources. In this concept, the optimization of the placement of the information security system along the security chain is considered as a modification of the combined backpack problem. The proposed approach allows not only to quickly calculate various versions of software and hardware information systems and their combinations for ICS, but also to dynamically manage the proposed algorithm with existing models and algorithms to optimize the composition of ICS cybersecurity chains and cybersecurity resources of various information objects. It is possible that such a combination of models and algorithms will quickly restore ICS protection by configuring profiles in accordance with the classes of new threats and cyber attacks.


Pharmacia ◽  
2021 ◽  
Vol 68 (1) ◽  
pp. 9-14
Author(s):  
Kristina Kilova ◽  
Anna Mihaylova ◽  
Lily Peikova

This article discusses the opportunities of information and communication technologies for providing pharmaceutical care in the context of the COVID-19 pandemic. The global COVID-19 pandemic has necessitated a reorientation of the concept of providing health care to large-scale implementation of information technologies to improve the quality of medical and pharmaceutical services for the population. It had a significant impact on pharmacy, which necessitated changes in the management of pharmaceutical care for patients. Rapid and urgent measures were taken by the pharmacists, who found themselves at the forefront. Telepharmacy has proven to be a successful solution in the fight against the virus in the conditions of physical distance. The introduction of modern information and communication technologies worldwide will create significant advantages for more efficient use of resources and management of pharmaceutical care.


Author(s):  
Ogochukwu Thaddaeus Emiri ◽  
Chukwunweike Gracious Omede

This chapter examines the problems of e-governance data/information security. In order to adequately achieve this objective, the chapter after the introduction, deals with the information and communication technology (ICT) security network, followed by effects of the changing nature of security threats in e-governance. The use of ICT internet security balancing requirements for achieving effective e-governance security network is considered. The chapter observes that strong security for internet transactions (information communication) is one of the last technical hurdles to be overcome in achieving true e-governance, enabling the broadest range of online government services while streamlining bureaucracy and providing efficient alternatives to in-person contact between government agencies and their constituents. The chapter argues that the problems of information security threats, if not tackled effectively, can hinder e-governance implementation success. The use of ICT internet security balancing requirements for achieving effective e-governance security network is recommended.


2022 ◽  
pp. 50-72
Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2020 ◽  
Author(s):  
Choon Hwee Koh

Prevailing historiography views the use of contractors by states as indicative of a loss or decentralization of power. This article takes the case of the Ottoman postmaster to demonstrate how contracting could in fact strengthen early modern empires and to argue that the binary spatial metaphors of ‘centralization’ and ‘decentralization’ cannot adequately explain how power worked in the early modern world (about 1500–1800). Indeed, recent scholarship has highlighted the scale and significance of military contractors in early modern European warfare. However, contractors were not confined to expanding military capacity; they were also employed to expand administrative capacity in diverse arenas. Evidence from Ottoman fiscal documents and judicial registers shows how contracted postmasters played a crucial role in strengthening the imperial bureaucracy’s supervision of a sprawling postal system. In contrast to war-making, which involved the short-term mobilization of vast resources, maintaining a large-scale infrastructure required long-term co-ordination across multiple dispersed nodes, and this entailed a different spatial configuration of power that disrupts the dichotomous paradigm of centralization and decentralization. Ultimately, a holistic appraisal of early modern state-building needs to consider not just cases of war-making or provincial administration, but also pan-imperial infrastructures like information and communication systems.


Radiotekhnika ◽  
2021 ◽  
pp. 25-32
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula

Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.


2021 ◽  
Vol 100 ◽  
pp. 01010
Author(s):  
Marta Shkvaryliuk ◽  
Liliana Horal ◽  
Inesa Khvostina ◽  
Alla Maksymova ◽  
Vira Shyiko

The paper considers the problems consider the problems of enterprises digitalization. Based on the research of the scientific literature, it is established that enterprises in the modern world need the active introduction of information and digital technologies to ensure the competitiveness of production and active development in the future. The analysis and assessment of the use and development of communication and information technologies by domestic enterprises is carried out. According to its results, it is established that the main areas of information and communication technologies implementation in domestic enterprises are cloud computing services, sources of "big data" for the analysis of "big data", 3D printing, external links to the Internet, own websites and electronic trade via the Internet, etc. It is determined that due to the rather intensive growth of the number of enterprises in the information and communication industry, the use of their developments in production is rather insignificant. Only 5% of enterprises during the study period used all the above information technologies in their activities. Based on the analysis, the problem areas of the process of implementation and development of communication and information technologies at domestic enterprises are identified and recommendations for improving the efficiency of information and communication technologies are provided. The MatLab Statistic Toolbox built into MatLab is used to determine the trends of the impact of digital innovations and the number of information and communication enterprises on GDP.


Author(s):  
Albert Malikov ◽  
Vladimir Avramenko ◽  
Igor Saenko

Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the diagnostics is prompt identification of security violation characteristics. This problem is complicated due to the amount and variability of the initial data on information security violation. Purpose: Development of a model for diagnosing a computer incident, along with a method which would allow you to quickly determine the characteristics of a security violation. Results: Security breach characteristics important for making a decision about responding to an identified computer incident can be determined via deep artificial neural networks. A structural feature of the proposed deep artificial neural network is combining the coding part of the autoencoder and a multilayer perceptron. In addition, the method implements a parallel mode of processing information events which have occurred in the information and communication system before the incident was detected, by using a separate proposed artificial neural network for each secondary characteristic of the security breach. The method of determining the values of these secondary characteristics allows you to greatly improve the diagnostics efficiency, having acceptable values of precision and recall for the security violation characteristics to determine. The dependence has been studied of the completeness and classification accuracy on the number of neurons in the hidden layer. A sufficient number of neurons in the hidden layer for achieving the required training efficiency is experimentally determined. Practical relevance: The developed model and method can be implemented using standard software and hardware (servers) of an information and communication system. Their combined use with the existing models and methods of monitoring and diagnostics can significantly improve the efficiency of an information security system.


Author(s):  
Anca Gabriela Petrescu ◽  
Marius Petrescu ◽  
Ioana Panagore ◽  
Florentina Raluca Bîlcan

During the last period, information and communication systems became an essential component of our society that, at its turn, became more and more dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process which, besides its benefits come to raise specific threats to their users' interests. Due to the high level of interconnectivity, it is essential that all members of the cyber community to be aware of their responsibilities in information security. Rising awareness is the first step towards a more trustful and credible communication information environment that is a pre-requisite of the information society. This chapter demonstrates, on the one hand, how Romanian organizations are able to optimize their information security risk in order to streamline their activities and, on the other hand, how security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information.


Sign in / Sign up

Export Citation Format

Share Document