scholarly journals Cyber Security System With SIEM And Honeypot In Higher Education

Author(s):  
Jarot S. Suroso ◽  
Caesario Putra Prastya
2021 ◽  
Vol 21 (3) ◽  
pp. 593
Author(s):  
Sulaiman ghani ◽  
Sahalu Junaidu ◽  
Afolayan Obiniyi ◽  
Mustapha Bagiwa ◽  
Garba Aliyu

2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2020 ◽  
Vol 10 (1-2) ◽  
pp. 84-89
Author(s):  
Khoroshko V.O. ◽  
◽  
Khokhlachova Yu.Ye. ◽  
Ayasrah A. ◽  
Al-Dalwash A. ◽  
...  

2022 ◽  
Vol 7 (1) ◽  
Author(s):  
Muh Yusuf S

Indonesia is currently ranked 24th in the Global Cybersecurity Index (GCI) 2020. Indonesia's ranking can be improved by improving the assessment pillars of the GCI survey, one of the efforts is to improve the cyber security system of government agencies through Security Assessment. For this reason, the purpose of this study is to provide alternative solutions in order to optimize the public services of the State Intelligence Agency (BIN) in the form of Security Assessment in the perspective of the GCI 2020 survey. This research is a qualitative research using data related to BIN public services and then juxtaposed with data from the Global Cybersecurity survey. Index 2020 as a reference. The results of the study indicate that the optimization of the Security Assessment can be done by implementing cyber counterintelligence and optimizing the publication of services by paying attention to the rules of intelligence secrecy. With the optimization of the Security Assessment, it will affect the assessment of the Technical and Organizational pillars in the GCI survey so that it is expected that Indonesia's ranking will increase in the next survey.


Author(s):  
Aivars Mednis

Civil protection is an essential part of the national security system. One of the main conditions for successful functioning of any system is a properly organized regulatory framework - laws, Cabinet of Minister’s regulations that clearly define the civil protection structure and the responsibilities and rights of legal and natural persons involved in the processes. This study identifies the current situation and concludes that the norms of the Civil Defence and Disaster Management Law adopted by the Saeima in 2016 eliminate the discrepancies of the Civil Protection Law of 2006 and administrative-territorial reform of 2009, and specifically determine the areas of responsibility and activities of the state and municipal institutions, but the changes in the regulations governing the training of students and employees ensure compulsory civil protection courses for higher education institutions.


2021 ◽  
pp. 98-105
Author(s):  
Y. MANUILOV

The provisions of the updated Cyber Security Strategy of Ukraine are analyzed. The effectiveness of the Cyber Security Strategy of Ukraine in 2016 has been determined. The issue of organizational and legal bases of cyber security is studied. The components of the national cyber security system are considered. The practical component of the Cyber Security Strategy of Ukraine and the priority tasks of the security and defense sector are detailed. The strategic principles of cyber security in Japan are highlighted. The prospects of implementation of the Cyber Security Strategy of Ukraine in the conditions of modern geopolitical confrontation are generalized.


Sign in / Sign up

Export Citation Format

Share Document