scholarly journals Video Capture Systems as a Means of Investigating Information Security Incidents at the Enterprise

2019 ◽  
pp. 33-37
Author(s):  
Egor Zhuykov ◽  
Elena Maksimova

Today’s trend is the growth of information security incidents. Confirmation of this is the data of the company InfoWatch, according to which the number of leaks of confidential information in the first half of 2017 has increased by 10% as compared to the same period of 2016, and equals to 925 cases. However, 53% out of these 925 cases of diversion were sold by company employees, and 1.7% – by potential insiders. In the modern world, an insider is a very common concept. It is applicable in different spheres of economic activity. In a general sense, an insider is a natural or legal person who, due to his or her position, has access to valuable (mainly, of course, from an economic point of view) information. Valuable information is also called insider information. The article is devoted to the consideration of video capture systems that can help prevent leakage of information from personal computers in the enterprise. The proposed scheme of expert evaluation of video capture allows you to determine the system based on the selected criteria and specified weight coefficients, and lets the user make the best choice in the decision-making process of a specific problem.

2021 ◽  
Vol 6 (3) ◽  
pp. 20-25
Author(s):  
Anastasia A. Voronina ◽  
◽  
Irina I. Skripina ◽  

Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term "information security". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of these problems. In the course of his work, the developer may accidentally make a mistake as a consequence of which a future vulnerability may be formed at this point. Vulnerability is a weak point of a program or software; having discovered this point, an attacker can easily harm information. If the threat came out deliberate, then there are methods to ensure the security of information. This article discusses information protection measures.


2020 ◽  
Vol 2 (10) ◽  
pp. 144-157
Author(s):  
Oleh Harasymchuk ◽  
Ivan Opirskyy ◽  
Yaroslav Sovyn ◽  
Ivan Tyshyk ◽  
Yevhenij Shtefaniuk

This paper is devoted to the consideration of information security problems in distance learning systems (DLS), which are becoming widespread in the modern world of educational services, as one of the most effective and promising training systems. The basic information about DLS that exist in the Ukrainian and foreign educational markets is given. The general principle of application of such training, the main functional components and objects of interaction within the framework of DLS are considered. The basic problems of information protection in modern distance learning systems and threats from the point of view of information security for such systems are analyzed in detail, the main goals that an attacker may pursue while carrying out attacks on DLS and vulnerabilities due to which he carries out these attacks are listed. Threats and destabilizing effects of accidental nature are also mentioned. The most common DLS's are compared according to such key parameters as threats of corrupt registration and authentication, threats of reliability of knowledge control results and threats of malicious software implementation. The main focus is on the approaches to the protection of DLS from threats of user substitution (both during the authorization and for an authorized user), threats of the usage of software bots and scripts (by applying the method of protection against the use of scripts based on hidden elements and the method of protection based on behavioral analysis), and also threats to the usage of lectures, electronic reference books and other third-party teaching materials. The mechanism of protection against threats to the reliability of knowledge control results is proposed, which describes actions of the DLS user and the server at the following stages: registration, login, user in the process of filling in the questionnaire, user completed the questionnaire, user starts the test / task and completed testing. This algorithm can be used in any distance learning system to protect from threats to the authenticity of knowledge, and its novelty consists in the usage of methods of user authentication and limiting the functionality available to those users.


Author(s):  
I. Blishchenko ◽  
N. Shdanov

States are closely connected with each other in the modern world. This interconnection is due to the objective necessity for all of them to enter into certain relations. Peaceful co-existence of states with different economic and social systems determines the growing significance of co-operation between them. The necessity for cooperation can be explained not only from the economic point of view but also by the fact that a number of crises in the international intercourse still remain unregulated, thus presenting a threat to maintenance of the peace in many parts of the world.


2021 ◽  
Vol 12 (2) ◽  
pp. 128-144
Author(s):  
Jiumin Feng

Purpose: of the study is to determine the possibilities of borrowing the Chinese experience of strategic planning of innovative development in Russia.Methods: the study of the innovative experience of the PRC in strategic planning and the prospects for Chinese-Russian cooperation in this area was carried out using a content analysis of the features of strategic planning of the scientific, technological and innovative potential of the PRC and the Russian Federation, as well as analysis of statistical data on innovative and economic development presented in statistical collections of Russia and the PRC.Results: it is shown that the systems of strategic planning of Russia and the PRC are in many respects similar. Many of the strategic initiatives of the PRC are adopted in Russia. At the same time, the attitude to strategic planning in the two countries is different. In Russia in the field of strategic management of science, it is recommended to strengthen international scientific and technical cooperation between Russia and the PRC in the difficult conditions of the modern world.Conclusions and Relevance: taking into account global trends, it is proposed to introduce such innovations into the strategic planning of the scientific and innovative sphere of Russia. First, there is a clearer linking of the tasks of innovative development to the general tasks of the country (long-term national and sectoral development goals). Also, a detailed substantiation of the possibility of implementing the selected priorities. Finally, greater clarity of the planned ones. mechanisms for ensuring partnership between the state and business in achieving strategic objectives of scientific and innovative development.The principles and approaches of the China to strategic planning of development in general and innovative development in particular in Russia should be used carefully and creatively. From an economic point of view, it would be expedient to integrate research more closely, create large joint projects and plan them together in a mutually respectful dialogue between scientists and experts from Russia and China.


2003 ◽  
Vol 42 (2) ◽  
pp. 170-172
Author(s):  
Mir Annice Mahmood

To implement any successful policy, research about the subject-matter is essential. Lack of knowledge would result in failure and, from an economic point of view, it would lead to a waste of scarce resources. The book under review is essentially a manual which highlights the use of research for development. The book is divided into two parts. Part One informs the reader about concepts and some theory, and Part Two deals with the issue of undertaking research for development. Both parts have 11 chapters each. Chapter 1 asks the basic question: Is research important in development work? The answer is that it is. Research has many dimensions: from the basic asking of questions to the more sophisticated broad-based analysis of policy issues. The chapter, in short, stresses the usefulness of research which development workers ignore at their own peril.


2014 ◽  
Vol 30 (2) ◽  
pp. 113-126 ◽  
Author(s):  
Dominic Detzen ◽  
Tobias Stork genannt Wersborg ◽  
Henning Zülch

ABSTRACT This case originates from a real-life business situation and illustrates the application of impairment tests in accordance with IFRS and U.S. GAAP. In the first part of the case study, students examine conceptual questions of impairment tests under IFRS and U.S. GAAP with respect to applicable accounting standards, definitions, value concepts, and frequency of application. In addition, the case encourages students to discuss the impairment regime from an economic point of view. The second part of the instructional resource continues to provide instructors with the flexibility of applying U.S. GAAP and/or IFRS when students are asked to test a long-lived asset for impairment and, if necessary, allocate any potential impairment. This latter part demonstrates that impairment tests require professional judgment that students are to exercise in the case.


Author(s):  
Ramesh Raghavan

This chapter presents an overview of how D&I research can be evaluated from an economic point of view. Dissemination and implementation imposes costs upon knowledge purveyors, provider organizations, public health organizations, and payers (including governments). However, whether these added costs will result in improved service delivery and, perhaps more importantly, client outcomes and improvements in population health remain as open questions. If emerging studies reveal that defined implementation strategies are more cost effective than “usual” implementation, then policymakers and service providers will need to resource these added costs of implementation in order to assure the success and sustainability of high-quality health services over the long term.


Energies ◽  
2021 ◽  
Vol 14 (3) ◽  
pp. 565
Author(s):  
Nikolaj Kaae Kirk ◽  
Clara Navarrete ◽  
Jakob Ellegaard Juhl ◽  
José Luis Martínez ◽  
Alessandra Procentese

To make biofuel production feasible from an economic point of view, several studies have investigated the main associated bottlenecks of the whole production process through approaches such as the “cradle to grave” approach or the Life Cycle Assessment (LCA) analysis, being the main constrains the feedstock collection and transport. Whilst several feedstocks are interesting because of their high sugar content, very few of them are available all year around and moreover do not require high transportation’ costs. This work aims to investigate if the “zero miles” concept could bring advantages to biofuel production by decreasing all the associated transport costs on a locally established production platform. In particular, a specific case study applied to the Technical University of Denmark (DTU) campus is used as example to investigate the advantages and feasibility of using the spent coffee grounds generated at the main cafeteria for the production of bioethanol on site, which can be subsequently used to (partially) cover the campus’ energy demands.


Sign in / Sign up

Export Citation Format

Share Document