scholarly journals Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy

Author(s):  
Dennis Broeders ◽  
Fabio Cristiano ◽  
Daan Weggemans
2008 ◽  
pp. 3442-3450
Author(s):  
Leslie Leong ◽  
Andrzej T. Jarmoszko

The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and white-collar crimes, the demand for a stronger security mechanism in cryptography becomes apparent. Although wireless cryptography is still in its infancy, there are encryption technologies that may support the limitations of a mobile device.


2020 ◽  
pp. 89-106
Author(s):  
Jacek Gerwatowski

This article analyses issues in the feld of information and IT securityand attempts to explain what is meant by information security and presentspotential opportunities and threats in this feld. The article discusses various types of information security threats, from those with a “traditional” character, such as espionage, through to threats resulting from the developmentof new technologies, e.g. cyber-terrorism and threats resulting from the activities of natural forces. The article presents the tasks of public administration and local government units in the feld of information security resulting,inter alia, from the provisions of the Act on access to public information orregulations on the protection of personal data.


Author(s):  
Leslie Leong ◽  
Andrzej T. Jarmoszko

The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and white-collar crimes, the demand for a stronger security mechanism in cryptography becomes apparent. Although wireless cryptography is still in its infancy, there are encryption technologies that may support the limitations of a mobile device.


Author(s):  
K. V. Kasparyan ◽  
M. V. Rutkovskaya

The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium (taking into account the background of this issue). This research examines the influence of functioning of e-government bodies in Сhina on the internal political situation in the country – taking into account such aspects as building a dialogue between authorities and society, perfection of the public service system providing the Chinese citizens with essential public goods, the merits and the demerits of China’s online government are taken into account. This article examines such significant factors in the development of e-government in China as the impact of the global situation at the present stage on international politics and the country’s information security system. This article analyzes the features of the relationship between the Chinese authorities and media corporations operating on the Internet market of the Middle Kingdom (such as, for example, Google), and studies the reasons for the contradictions between them. The study also comprehended strategy of the authorities of the People’s Republic of China in matters of information security of the state, including the active use of Chinese hackers in network conflicts with Western countries, and the actions of special units of the Chinese armed forces created to counter foreign cyber terrorism.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


Sign in / Sign up

Export Citation Format

Share Document