STEGANOGRAPHIC METHODS FOR EMBEDDING INFORMATION IN DIGITAL OBJECTS TO PROVIDE INFORMATION SECURITY IN THE CONCEPT OF "INTERNET OF THINGS"

Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.

Author(s):  
Kåre Synnes ◽  
Matthias Kranz ◽  
Juwel Rana ◽  
Olov Schelén

Pervasive computing was envisioned by pioneers like Mark Weiser but has yet to become an everyday technology in our society. The recent advances regarding Internet of Things, social computing, and mobile access technologies converge to make pervasive computing truly ubiquitous. The key challenge is to make simple and robust solutions for normal users, which shifts the focus from complex platforms involving machine learning and artificial intelligence to more hands on construction of services that are tailored or personalized for individual users. This chapter discusses Internet of Things together with Social Computing as a basis for components that users in a “digital city” could utilize to make their daily life better, safer, etc. A novel environment for user-created services, such as social apps, is presented as a possible solution for this. The vision is that anyone could make a simple service based on Internet-enabled devices (Internet of Things) and encapsulated digital resources such as Open Data, which also can have social aspects embedded. This chapter also aims to identify trends, challenges, and recommendations in regard of Social Interaction for Digital Cities. This work will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead of now. The purpose is to create a common outlook on the future of Information and Communication Technologies (ICT) based on the extrapolation of current trends and ongoing research efforts.


Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


2019 ◽  
pp. 1393-1406
Author(s):  
Dmitry Namiot ◽  
Manfred Sneps-Sneppe

In this paper, the authors discuss Internet of Things educational programs for universities. The authors' final goal is to provide a structure for a new educational course for Internet of Things and related areas such as Machine to Machine communications and Smart Cities. The Internet of Things skills are in high demands nowadays and, of course, Internet of Things models, as well as appropriate Big Data proceedings elements should have a place in the university courses. The purpose of the proposed educational course is to cover information and communication technologies used in Internet of Things systems and related areas, such as Smart Cities. The educational course proposed in this paper aims to introduce students to modern information and communication technologies and create the formation of competencies needed for such areas as Machine to Machine communications, Internet of Things, and Smart Cities. Also, the authors discuss Big Data issues for IoT course and explain the importance of data engineering.


Author(s):  
Jorge Lanza ◽  
Pablo Sotres ◽  
Luis Sánchez ◽  
Jose Antonio Galache ◽  
Juan Ramón Santana ◽  
...  

The Smart City concept is being developed from a lot of different axes encompassing multiple areas of social and technical sciences. However, something that is common to all these approaches is the central role that the capacity of sharing information has. Hence, Information and Communication Technologies (ICT) are seen as key enablers for the transformation of urban regions into Smart Cities. Two of these technologies, namely Internet of Things and Big Data, have a predominant position among them. The capacity to “sense the city” and access all this information and provide added-value services based on knowledge derived from it are critical to achieving the Smart City vision. This paper reports on the specification and implementation of a software platform enabling the management and exposure of the large amount of information that is continuously generated by the IoT deployment in the city of Santander.


Author(s):  
Andrey Paramonov ◽  
Vadim Kharin

The relevance of the study is confirmed by the fact that extremism is one of the most dangerous phenomena in the security of the world community, which pose a threat to the whole society both with committed crimes and the destruction of generally recognized rules of morality, law and human values. We point out that in modern conditions the dissemination of extremist ideas is actively promoted by information and communication technologies, especially the Internet. It is emphasized that extremists have the opportunity not only to demonstrate their materials to a multimillion audience, but also to enter into discussions and uphold their ideas and views. The Internet is very promising for extremists. This study considers the benefits that the Internet provides in disseminating extremist information. We believe that the problem of the spread of extremist information on the Internet is especially perceptible to young people. Due to personal and psychological characteristics, this social group is very vulnerable, as they are easily imposed on the ideas and views of extremists. In the context of the active spread of extremism on the Internet, the regulatory framework for combating these crimes is extensively presented. We indicate some problems with the practical implementation of countering extremism on the Internet.


Author(s):  
Subarna Shakya ◽  
Sanjita Lamichhane

<p>Information Exchange has always been an integral part of our lives. With the rapid advancement in Information and communication technologies, communication and information exchange have become much easier and faster but at the same time the issues regarding security of data and its confidentiality have become our major concern. Cryptography and Steganography are two such data hiding techniques that can be combined together in order to enhance data security. Cryptography scrambles a message so that it cannot be understood whereas Steganography hides its existence. In this process, message is first encrypted using an algorithm based on Fibonacci series or the Rijndael cryptographic algorithm and then the encrypted message is embedded inside an image using improved Least Significant Bit substitution method where the secret information is stored into a specific position of Least Significant Bit of an image based on the security key entered. This combinational methodology will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel.</p><p><strong>Journal of Advanced College of Engineering and Management</strong>, Vol. 2, 2016, Page: 105-112</p>


Author(s):  
V. N. Strelnikova

The article deals with significant changes that are associated with total informatization, which is a powerful converter of economic, social and other types of life activity of society. The author notes that at the same time, the satisfaction of information needs, the state of the information space for minors should be subject to moderate regulation. Attention is drawn to the fact that the intensive growth of the diversity of information and communication technologies is today the dominant environment for the development of a modern child. The characteristics of information harmful to the health and development of children are given. It is proved that relying on the principles of a systematic approach makes it possible to competently organize and correctly carry out the process of achieving the state of protection of children in the information space by various methods and means. Ensuring the information security of childhood is defined by the author as a system; the components of the system of ensuring the information security of childhood (methodological, regulatory, organizational and activity, effective) are highlighted.


2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


Sign in / Sign up

Export Citation Format

Share Document