Development of information security quest based on use of information and communication technologies

Author(s):  
Ishchukova Evgenia ◽  
Maro Ekaterina ◽  
Veselov Gennady
Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


Author(s):  
V. N. Strelnikova

The article deals with significant changes that are associated with total informatization, which is a powerful converter of economic, social and other types of life activity of society. The author notes that at the same time, the satisfaction of information needs, the state of the information space for minors should be subject to moderate regulation. Attention is drawn to the fact that the intensive growth of the diversity of information and communication technologies is today the dominant environment for the development of a modern child. The characteristics of information harmful to the health and development of children are given. It is proved that relying on the principles of a systematic approach makes it possible to competently organize and correctly carry out the process of achieving the state of protection of children in the information space by various methods and means. Ensuring the information security of childhood is defined by the author as a system; the components of the system of ensuring the information security of childhood (methodological, regulatory, organizational and activity, effective) are highlighted.


2020 ◽  
Vol 2 (1) ◽  
pp. 82-98
Author(s):  
M. А. Efremova ◽  

Introduction. One of the components of the national security of the Russian Federation is information security. In the context of the information society in the Russian Federation, the role of the information component of national security has increased significantly. There are new challenges and threats to the information security of the Russian Federation, which require the reaction of the legislator. However, the conditions of globalization require States to take joint measures to address such a complex problem as information security. Consequently, international information security cannot be achieved by a single state. It is necessary to consolidate efforts and develop a uniform approach to this issue. Theoretical Basis. Methods. The Information society is characterized by a high level of development of information and communication technologies and their use in almost all spheres of life. The emergence of the global information society, the increased role of information and information and communication technologies have stimulated the adoption of a number of international legal instruments in this area. In addition, a number of other guidance documents have been developed and adopted that define the ways and directions of law-making and cooperation at the level of regional organizations. Their distinctive feature was the realization of the lack of unified and clear conceptual and categorical apparatus. This also applies to the concept of “information security”, a unified approach to the understanding of which is not available at the international level. General scientific methods (materialistic dialectics) and private scientific methods: formallogical, comparative-legal, historical-legal. Results. Currently, at the international level, there is not only no legal act regulating issues in the field of criminal law protection of information security, but also there is no common understanding of information security, its main threats of possible joint measures to prevent and eliminate them. Discussion and Conclusion. As the interstate information confrontation will continue and gain new momentum, there is an urgent need for the adoption of an international legal act aimed at the criminal law protection of information security, containing the classification of crimes against information security and recommendations to States on the criminalization of acts against information security in national legislation.


2017 ◽  
Vol 7 (1) ◽  
pp. 83-114 ◽  
Author(s):  
Ramazan Yılmaz ◽  
Fatma Gizem Karaoğlan Yılmaz ◽  
H. Tuğba Öztürk ◽  
Tuğra Karademir

Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome with these threats. In this research, it was aimed to reveal internet security and computer usage awareness profiles of students studying in the secondary school.  The data were collected from 2029 students studying in the secondary schools in Bartın Province in Turkey by using a questionnaire developed by the researchers. The data obtained from the questionnaire were analyzed based on the pre-determined themes and the students' information security and computer usage awareness profiles were revealed. The findings indicate that the majority of the students are insufficient regarding information security and computer usage awareness and they could be under risk in online settings towards the threats. In the discussion section, some measures for the parents, schools and policy makers were mentioned to increase students' information security and computer usage awareness.


Author(s):  
Ionica Oncioiu ◽  
Anca Gabriela Petrescu

Along with the incontestable benefits for the modern society, the information and communication technology developments induce new vulnerabilities. Mobile computing devices, cloud computing, and privacy issues are just a few elements that should be taken into account when shaping the modern information security that is essential to our modern way of life. Since information security risks are rapidly evolving and taking new forms, the real benefits of information and communication technologies may be exploited only if trust is built on every layer of responsibility. This study explores of the present main information security threats faced by Romanian organizations, as well as of the attitude of Romanian organizations towards information security, as resulted from a research and detailed survey questionnaire performed by the authors. Following the results of this research, the authors propose a way to improve the security posture of Romanian organizations, as well as knowledge, capabilities, and decision making of business managers.


2015 ◽  
pp. 192-212
Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


2020 ◽  
Author(s):  
N. Romashkina ◽  
◽  
A. Markov ◽  
D. Stefanovich ◽  
◽  
...  

The monograph is devoted to topical issues of international security and strategic stability in the context of accelerated development of information and communication technologies. It justifies the importance of ensuring international information security. The monograph examines the possibility of establishing an ITarms control regime under the UN auspices. Different aspects of regulation of software security systems and of the use of supercomputers in the context of the international information security are examined. The impact of information and communication technologies on strategic stability is analyzed. This monograph is addressed to specialists in the field of information and communication technologies and international security, university lecturers, students and graduate students of universities, as well as a wide range of readers.


Author(s):  
E. S. Zinovieva

Information and communication technologies (ICT) play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.


Sign in / Sign up

Export Citation Format

Share Document