scholarly journals PROBLEMS AND SOLUTIONS FOR ENSURING INFORMATION SECURITY OF ELECTRONIC LIBRARIES

2019 ◽  
pp. 47-50
Author(s):  
S. B. Normatov

Information technologies development has led to intensification of distant information exchange, sharp increase in the speed of data retrieval, storage and processing of large amounts of information. At the same time, just these opportunities gave rise to such problems as unauthorized access to information resources, threat to the library resources security, need to ensure the users’ personal information protection. Extension in the volume and value of information scientific- technical and educational resources leads to an increase in the threats of unauthorized access to them. This requires the creation of reliable means of protecting information sources.

2006 ◽  
Vol 25 (4) ◽  
pp. 222 ◽  
Author(s):  
Samuel T. C. Thompson

Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.


2007 ◽  
Vol 9 (2) ◽  
Author(s):  
P. L. Wessels ◽  
L. P. Steenkamp

One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information. 


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


1994 ◽  
Vol 116 (2) ◽  
pp. 531-538
Author(s):  
W. J. Rasdorf

Researchers and materials engineers require a greater understanding of the problems and solutions that emerge when integrating composite materials data with computer technology so that utilitarian composite materials databases can be developed to effectively and efficiently support analysis and design software. This paper primarily serves to analyze several of the problems facing developers of composite materials databases, evolving from the complexity of the materials themselves and from the current lack of testing and data representation standards. Without a clear understanding of the scope and nature of these problems, there is no possibility of designing concise yet comprehensive composites data models, yet we feel that such an understanding is presently lacking.


Author(s):  
Александр Вильямович Бабурин ◽  
Лариса Александровна Глущенко ◽  
Борис Николаевич Добряков ◽  
Григорий Александрович Остапенко ◽  
Андрей Петрович Преображенский

Цель исследования состоит в разработке методов защиты от несанкционированного доступа информации, циркулирующей в беспроводных ИК-каналах передачи данных. Показаны возможные способы несанкционированного доступа к каналу передачи данных от ИК-клавиатуры к компьютеру. Основной способ несанкционированного доступа к ИК-каналу передачи данных - это регистрация диффузно-отраженного от элементов интерьера излучения. Проведены теоретические оценки, подтверждающие возможность получения информации, циркулирующей в беспроводных ИК-каналах передачи данных при несанкционированном доступе. Рассмотрен типичный случай распространения излучения в помещении при использовании ИК-канала передачи данных при несанкционированном доступе. Неуполномоченный наблюдатель может регистрировать через оконный проем диффузно-отраженное излучение, используя специальную оптико-электронную систему. Для расчетов были приняты типовые фотометрические характеристики интерьера помещения и предельно достижимые на современном уровне техники характеристики фотоприемных устройств. Размер диаметра входного зрачка оптической системы принят не слишком большим из того соображения, что он не должен привлекать внимание (служить демаскирующим признаком). Предложен метод защиты информации, циркулирующей в беспроводных ИК-каналах передачи данных, основанный на формировании засветочных помех. Приведены схемы формирования засветочных помех. Для помехи может быть использовано диффузно-отраженной излучение или специально сформированное излучение, направленное на оконный проем помещения. The purpose of the research is to develop methods of protection against unauthorized access to information circulating in wireless infrared channels of data transmission. Possible ways of unauthorized access to the data transmission channel from the IR keyboard to the computer are shown. The main method of unauthorized access to the IR data transmission channel is the registration of radiation diffusely reflected from interior elements. Theoretical estimates have been carried out confirming the possibility of obtaining information circulating in wireless infrared channels of data transmission under unauthorized access. A typical case of propagation of radiation in room when using an IR data transmission channel with unauthorized access to information is considerd. An unauthorized observer can register diffusely reflected radiation through a window opening using a special optoelectronic system. For the calculations, the standard photometric characteristics of the interior of the room and the maximum achievable at the modern level of technology characteristics of photodetectors were taken. The size of the diameter of the entrance pupil of the optical system is taken not too large for the reason that optoelectronic system should not attract attention (serve as a unmasking feature). The method for protecting of information ciculating in optical wireless channels of data transmission, based on the formation of optical intentional noise, is proposed. It provides a brief overview of methods for generating pseudorandom sequences, wich can serv as a basis for the formation of an illumination noise channel. For optical intentional noise can be used diffusely reflected radiation or specially formed radiation, directed at the window opening of the room.


2000 ◽  
Vol 16 (01) ◽  
pp. 1-11
Author(s):  
Richard W. Bolton ◽  
Paul Horstmann ◽  
Darcy Peruzzotti ◽  
Tom Rando

Shipbuilding in the United States is characterized by large teams of suppliers and subcontractors who collaborate and support shipbuilders. It is important that these shipbuilding teams function as a single integrated organization: A Virtual Enterprise. The inefficiencies and impediments caused by each team member using their own choice of information technologies, software, data management and processes must be addressed to increase overall US shipbuilding efficiency and cost effectiveness. The NIIIP SPARS project is developing the information infrastructure and protocols to enable shipbuilding Virtual Enterprises that will improve collaboration and information exchange within the US shipbuilding community.


Information technologies have changed the way people search for information inside and outside the library environment. As a result, one of the core functions of librarians—instruction—has changed. Initially, library instruction, also known as bibliographic instruction, focused on teaching patrons how to find library resources. Databases and the Internet with keyword searching abilities shifted the focus of library instruction away from library resources to search techniques that are applicable in a variety of information settings. Web 2.0 technologies have further impacted information literacy instruction as they have helped make the searching for, use of, and creation of information nearly seamless. These technologies have changed user expectations and librarians have adjusted the way they provide instruction services to patrons. This chapter examines the impact of new technologies on how librarians frame their relationship with patrons, specifically students and faculty in the academic library context. Librarians use new technologies to compliment their existing instruction sessions and as a tool to frame themselves as information experts.


Author(s):  
Roel During ◽  
Marcel Pleijte ◽  
Rosalie I. van Dam ◽  
Irini E. Salverda

Open data and citizen-led initiatives can be both friends and foes. Where it is available and ‘open', official data not only encourages increased public participation but can also generate the production and scrutiny of new material, potentially of benefit to the original provider and others, official or otherwise. In this way, official open data can be seen to improve democracy or, more accurately, the so-called ‘participative democracy'. On the other hand, the public is not always eager to share their personal information in the most open ways. Private and sometimes sensitive information however is required to initiate projects of societal benefit in difficult times. Many citizens appear content to channel personal information exchange via social media instead of putting it on public web sites. The perceived benefits from sharing and complete openness do not outweigh any disadvantages or fear of regulation. This is caused by various sources of contingency, such as the different appeals on citizens, construed in discourses on the participation society and the representative democracy, calling for social openness in the first and privacy protection in the latter. Moreover, the discourse on open data is an economic argument fighting the rules of privacy instead of the promotion of open data as one of the prerequisites for social action. Civil servants acknowledge that access to open data via all sorts of apps could contribute to the mushrooming of public initiatives, but are reluctant to release person-related sensitive information. The authors will describe and discuss this dilemma in the context of some recent case studies from the Netherlands concerning governmental programmes on open data and citizens' initiatives, to highlight both the governance constraints and uncertainties as well as citizens' concerns on data access and data sharing. It will be shown that openness has a different meaning and understanding in the participation society and representative democracy: i.e. the tension surrounding the sharing of private social information versus transparency. Looking from both sides at openness reveals double contingency: understanding and intentions on this openness invokes mutual enforcing uncertainties. This double contingency hampers citizens' eagerness to participate. The paper will conclude with a practical recommendation for improving data governance.


Author(s):  
Maria José Sousa ◽  
Rui Cruz ◽  
Ivo Dias ◽  
Carla Caracol

This chapter analyzes the importance of technologies as drivers for managing supply chains. The focus will be on the advantages of the use of information technologies to improve company's efficiency to be competitive and for the reduction of costs, improvement of operations, improvement of relationships with customers, suppliers and partners, shortening of delivering times, streamlining and optimization of business processes and operations. The use of new technologies contributes to improve efficiency of supply chain management: raw material suppliers, component manufacturers, finished product manufacturers, wholesalers and retailers. Technologies allow an integrated approach to planning, control and monitoring of product flows, from suppliers to end users. They aim at improve customer service at reduced overall costs, and leads to the development of important relationships with logistics providers, suppliers, and customers in order to enhance information exchange and the coordination of business activities, which are the key advantages of an integrated supply chain with the collaboration among all the participants in the value chain.


Sign in / Sign up

Export Citation Format

Share Document