scholarly journals New Functionality, Security and Protection of CCTV Systems: Technological Progress and Digital Society Development

2019 ◽  
Vol 71 ◽  
pp. 03003 ◽  
Author(s):  
R. Vaníčková

The objective of the paper is to analyse and evaluate the current state of the project of integrated security CCTV systems including the description of the original plan, the course of multiannual implementation, analysis of partial results. Next discussion of the current state and developmental technological changes in information and communication systems of the 21st century digital society including accepting the trends in developments, changes and forecasts in the field of cyber security. In the analytical part of the contribution, the author analyses and evaluates the planned/unplanned activities, the course of multiannual implementation and achievement of the strategic objectives including the characteristics of the current protection and security of the CCTV systems and the impacts of the installed security and monitoring systems in a banking institution. The final part of the contribution evaluates the project success with respect to the protection and security of the systems.

2021 ◽  
Vol 17 (3) ◽  
pp. 3-13
Author(s):  
Antonina Yerina ◽  
Ihor Honchar ◽  
Svitlana Zaiets

Introduction. The scale and destructive consequences of the unlawful impact on cyberspace is a key problem of modern geopolitics, and cyber reliability is recognized as one of the most important security priorities by the subjects of international relations.Problem Statement. Monitoring of cyber incidents and anomalies in information and communication systems and prompt response to risks determined by cyber threats require the development of a system of indicators and criteria for cybersecurity assessment.Purpose. Summarize the international experience of assessing the cybersecurity, to position countries by their level of development in the global space, to identify strengths and weaknesses in cybersecurity management, and to ensure effective protection of cyberspace at the national level.Materials and Methods. Used the component indices of the international rankings characterizing the potential of the digital economy (ICT IDI, NRI, EGDI) and the participation of countries in the field of cybersecurity(GCI and NCSI).Results. It has been argued that cybersecurity ratings play the role of a kind of identifier of the relative advantages and vulnerabilities of the national cyber strategies, and indicate the need for their review in order tostrengthen protection against cyber-attacks and improve the cyber risk management system. In countries with a high level of economic development, which is largely based on the contribution of IT technologies to the national production, the cybersecurity potential is significantly higher, regardless of geolocation. The discovered correlation between GCI, information society development indices (IDI, NRI, EGDI) and GDPper capita confirms that the digital transformation of the economy and society acts as a key driver of economicdevelopment if the information- and cyber-security are assured only. The best practices are highlighted, andcritically weak segments of the national cybersecurity are identified.Conclusions. Using the NCSI indicators, the preparedness of Georgia and Ukraine to prevent the implementation of fundamental cyber threats and to manage cyber incidents and large-scale cyber crises is assessed.


2020 ◽  
Vol 1(16) (2020) ◽  
pp. 80-84
Author(s):  
Oleksiy Samoуlenko ◽  

The article presents the method of conducting video lectures and online broadcasts in the system of training bachelors in cybersecurity in an educational and digital environment. It is determined that professional training of personnel in various industries in the modern world is an extremely important task of the state. Its solution becomes significant depending on how close these or those specialists are to the sphere of society. The meaning of the concept of "training" is defined, which is defined as a set of special knowledge, skills, qualities, work experience and norms of behavior that provide the opportunity to work successfully in a particular profession; as a process of communicating relevant knowledge and skills. " It is specified that the educational and digital environment can be understood as a set of organizational and pedagogical conditions for learning that contribute to the motivation of higher education students to self-development, self-education and is a key component of professional development of future professionals through information resources and services. It is emphasized that video lecture is the main form of conducting educational classes in the educational-digital environment, intended for mastering theoretical material. Each individual lecture is a component of the course of lectures in the educational and digital environment of the course discipline. Let's outline the general requirements for video lectures for bachelors in cybersecurity in the educational and digital environment. It has been determined that online broadcasting is a convenient way to communicate with bachelors in cybersecurity in real time in an educational and digital environment. At the expense of such broadcast it is possible to arrange for them game streams, to hold online seminars or to answer questions. The presented method of conducting video lectures and online broadcasts for the training of bachelors in cybersecurity is characterized by mandatory professional training for bachelors to obtain the qualification of information security specialist in information and communication systems and provides practice to provide training conditions in the real environment of future professional activities. Prospects for further research are the development of technology for the introduction of video lectures and online broadcasts in the system of training bachelors in cybersecurity and verification of the results.


2020 ◽  
Vol 2 (10) ◽  
pp. 113-122
Author(s):  
Valeriy Lakhno ◽  
Andriy Blozva ◽  
Maksym Misiura ◽  
Dmytrо Kasatkin ◽  
Borys Gusev

The article proposes a model for estimating the quantitative indicator of current risks of threats and cyber attacks on transport information and communication systems (TICS). The model differs from the existing one in taking into account the degree of impact of each threat or cyber attack within the class on the probability of an accident that occurs during cyberattacks on components of transport information and communication systems, which in many cases can be attributed to critical computer systems. It is shown that the current risks may be insignificant if all potentially dangerous parameters of transport information and communication systems are maintained within the established limits, or increase, becoming threatening, when such parameters deviate from the norm. The necessity to describe the degree of current danger of risks of threats and cyberattacks with the help of some quantitative indicator is substantiated. The value of this indicator may depend on the deviations of the parameters related to the cyber security of information and communication systems of transport. An appropriate calculation formula is proposed to determine the current risk of the threat to information and communication systems of transport. To test the proposed model, a simulation experiment was conducted, the results of which are also presented in the article. Simulation modeling was also performed to verify the adequacy of the proposed model and the algorithm for estimating the current risk indicator for components of transport information and communication systems. It is taken into account that many components of transport information and communication systems work in real time. It is shown that the proposed model takes into account the current values of information security metrics and new classes of cyber threats for transport information and communication systems.


2016 ◽  
Vol 1 (3(79)) ◽  
pp. 4 ◽  
Author(s):  
Валерій Анатолійович Лахно ◽  
Андрій Володимирович Грабарєв

2021 ◽  
Vol 12 (4) ◽  
pp. 35-42
Author(s):  
Thomas Alan Woolman ◽  
Philip Lee

There are significant challenges and opportunities facing the economies of the United States in the coming decades of the 21st century that are being driven by elements of technological unemployment. Deep learning systems, an advanced form of machine learning that is often referred to as artificial intelligence, is presently reshaping many aspects of traditional digital communication technology employment, primarily network system administration and network security system design and maintenance. This paper provides an overview of the current state-of-the-art developments associated with deep learning and artificial intelligence and the ongoing revolutions that this technology is having not only on the field of digital communication systems but also related technology fields. This paper will also explore issues and concerns related to past technological unemployment challenges, as well as opportunities that may be present as a result of these ongoing technological upheavals.


Author(s):  
Venelin Krastev Terziev ◽  
◽  
Vladimir Klimuk ◽  

The model of a modern society is a „digital society” based on the widespread use of information and communication technologies. Information is of utmost importance. However, „unprocessed“, „unprepared“ information is not valuable, but quite the opposite – it causes great damage economic, technical, psychological, political and others). First of all, this concerns young people, who are exposed to the influence of „harmful factors“ (information messages, appeals) more than other categories of the population.


Author(s):  
С.А. БАГРЕЦОВ ◽  
Э.А. БУДАРИН ◽  
О.С. ЛАУТА ◽  
М.В. МИТРОФАНОВ

Сетевой трафик, проходящий через современные вычислительные системы, представляет собой огромный информационный поток, который содержит сведения различной степени важности. Показана необходимость использования наиболее рациональных приемов повышения устойчивости сети в радиоэлектронной борьбе, чтобы заставить противника затрачивать больше времени на подбор новых принципов воздействия на системы связи. Network traffic passing through modern computing systems is a huge information flow, which contains information of varying degrees of importance. It is shown the necessity of using the most rational methods of increasing the stability of the network in electronic warfare to force the enemy to spend more time on selecting new principles of influence on communication systems.


Sign in / Sign up

Export Citation Format

Share Document