scholarly journals STABILITY OF THE STATE CYBER SECURITY SYSTEM

2020 ◽  
Vol 10 (1-2) ◽  
pp. 84-89
Author(s):  
Khoroshko V.O. ◽  
◽  
Khokhlachova Yu.Ye. ◽  
Ayasrah A. ◽  
Al-Dalwash A. ◽  
...  
2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2021 ◽  
pp. 115-122
Author(s):  
Y. MANUILOV

The current threats to cyber security in modern conditions have been identified. The components of the functioning of the national cyber security system are regulated. The powers of the State Special Communications Service in the field of building effective cyber defense in the domestic territory are outlined. The directions of development of organizational and technical model of the national cyber defense system are detailed. The components of the organizational and technical model of cyber defense are generalized. The expediency of accelerating the approval at the state level of the Concept of the organizational and technical model of cyber defense has been updated.


2020 ◽  
Vol 14 (1) ◽  
pp. 183-200
Author(s):  
Olena Illiashenko ◽  
Yevhenii Rudnichenko ◽  
Tetiana Momot ◽  
Nataliia Havlovska

2021 ◽  
Vol 21 (3) ◽  
pp. 593
Author(s):  
Sulaiman ghani ◽  
Sahalu Junaidu ◽  
Afolayan Obiniyi ◽  
Mustapha Bagiwa ◽  
Garba Aliyu

Author(s):  
Robert Gwardyński

The Police constitute a major element in the state security system. Their operation has both a national and local dimension. The Police have an impact on a local community’s security, ensuring the safety of people, their health, life, property, as well as maintaining public safety and order. This article aims to indicate the areas of the Police’s operation that result in an improvement of the residents’ safety and an increase in their sense of security.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


Author(s):  
Wahyuni Kurniasih ◽  
Abdul Rakhman ◽  
Irma Salamah

The house is the most valuable asset, therefore security at home is also very important. Therefore a home security system is created that combines a microcontroller with an Android smartphone application. The microcontroller used is the Raspberry Pi which is equipped with a camera as a home security monitoring system and various sensors as detectors such as magnetic, PIR sensors and solenoids as automatic door locks. So if the sensors that are installed detect something at home, then the homeowner will immediately get a notification sent by the database to the smartphone application, and the homeowner can monitor the state of the house right then through photos and videos recorded by cameras that have been installed at home.


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2019 ◽  
Vol 16 (4) ◽  
pp. 169
Author(s):  
I M Yannikov ◽  
M V Telegina

The paper assesses the existing approaches to the problem of assessing the security of hazardous facilities. It is proposed to carry out an assessment using the system of modeling and calculating the state of protection of hazardous objects developed on the basis of the Clements-Hoffman method, in which a set of threats, protection mechanisms and objects of protection are used to describe the system of protection with full overlap. This system can be used to calculate any type of protection of hazardous objects when entering data on any threats and appropriate means of protection. The paper provides a block diagram of the security system, a functional diagram, the main parameters and stages of development and testing.


Sign in / Sign up

Export Citation Format

Share Document