scholarly journals Development of information security in the world - a historical aspect

2018 ◽  
Vol 11 (24) ◽  
pp. 26-31
Author(s):  
Ryzhenko O.S. ◽  
Author(s):  
A. Binder ◽  
A. Kononov

The article analyzes the distinctive features of the PRC foreign exchange policy from the historical perspective, taking the national color into account and emphasizing the traditions-modernity unity in its strategy. It reviews the debates over renminbi exchange rate, disclosing the weakness of the modern international foreign exchange law. It systemizes the practices of international pressures applied to China in this aspect. It is stated, that China’s foreign exchange reforming process is of a long-term nature, and it will be completed only by the time the Chinese economy gets adjusted to the world market’s requirements.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


Author(s):  
Oleksandr Dzhuzha ◽  
◽  
Dmytro Tychyna ◽  
Valeriy Syuravchik ◽  
◽  
...  

The relevance of the article is due to the need to clarify the historical aspect, the genesis of victimology, as well as the content of its conceptual apparatus, the formulation of hypotheses and the improvement of its scientific tools. The concept of victimization is a reflection of essential means and relationships, phenomena and processes that are directly related to crime. The problematic aspects of the relatively complex nature of the conceptual apparatus of victimology have been identified, as a result of which a large number of concepts of non-legal origin in criminology are fraught with the danger of destroying the mechanism of legal assessments and conclusions on crime, its causes, the identity of the offender and the victim, and prevention measures. Elucidation of the historical aspect, genesis of victimology, as well as the content of its conceptual apparatus, is a dynamic process of reconciling hypotheses and positions, thoughts and views of criminologists, victimologists, lawyers, sociologists and psychologists, the results of which form the doctrinal basis of victimology. The stated positions are an attempt to somewhat streamline the diversity of scientific approaches to the content of individual elements of the subject of victimology, which, in turn, forms the motivation for further discussion of representatives of domestic and foreign criminological schools. Justification of the genesis and content of the conceptual apparatus of victimology, its individual theoretical provisions is an integral part of the development of the concept of combating crime and has not only scientific, but also important practical importance. Consequently, the tasks of victimology include the study of not only those who was the victim, but also those who have never acquired the status of a direct victim of the crime. The purpose of such studies are to identify a complex of certain properties capable of imported in criminal manifestations, which allows to carry out the victimological forecast for both individual and mass levels. The study of crime victims is necessary to solve many problems, especially related to the organization of their physical protection.


Author(s):  
Yulia Cherdantseva ◽  
Jeremy Hilton

Information Assurance (IA) is an intensively discussed discipline. Perhaps the most striking feature of IA is that everyone has a different opinion about what it actually is. The literature analysis enables us to distinguish three different approaches to Information Assurance: 1) Technical approach, concentrated on protection of networks; 2) Business approach, where IA is perceived as the comprehensive and systematic management of Information Security (InfoSec); 3) General approach, where IA is considered as a way to establish a level of confidence in information. Interviews with InfoSec practitioners reveal that they interpret the term IA differently and have contradictory views on how IA relates to InfoSec. It was felt that a survey with a greater number of practitioners might help to identify a commonly accepted perception of IA and to clarify the goals of the discipline. In 2011, a survey was conducted among one hundred InfoSec and IA professionals across the world. This chapter presents the results of the survey.


2013 ◽  
pp. 1208-1218
Author(s):  
James Suleiman ◽  
Terry Huston

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.


2014 ◽  
Vol 644-650 ◽  
pp. 3212-3215
Author(s):  
Shuang Liu

Digital library is a development direction of library, which has attracted the attention of the countries around the world widely. Digital library is an important part of informationization in university. As an information system, digital library is the backbone of the digital library information resources; the safety of library digital information resources is the key to the normal operation and development of digital library, which is also the guarantee for library to service. How to guarantee the security of information resources and the information system in open network environment has been considered by many people in the industry, the digital library information security has become one of core issues in digital library construction and development.


2020 ◽  
Author(s):  
Bekzod Baidzhanov

This article examines the development of the Uzbek language,its place and importance in the world, its integrative features, important aspects ofinformation security.


Author(s):  
T. Venkat Narayana Rao ◽  
Vemula Shravan

In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.


2019 ◽  
Vol 16 (4) ◽  
pp. 1-13
Author(s):  
Kateryna Molodetska

Today social networking services are one of the most popular virtual platforms for implementing social communication in the information space. In this case, social networking services provide the basic needs of actors in communication, belonging to virtual communities, new knowledge, self-realization, security, etc. At the same time, social networking services can be used by the world leading countries to achieve one-sided advantages in the national information space and influence on social and political processes in the state, public opinion, social exacerbation, interethnic and interreligious conflicts, etc. That’s why providing the state’s information security in social networking services is one of the most acute problems in Ukraine and around the world. It is established that the most promising direction of counteracting the threats to state information security in social networking services and managing the dynamics of interaction between the actors is the use of the concept of synergetic management. However, currently there are no practical recommendations for the implementation of synergistic management with the use of social control for self-organization in social networking services. The article systematizes the basic components of social control in social networking services. It is established that they are divided into social norms and social sanctions. The structure of each component of social control in social networking services and the peculiarities of their implementation are revealed. The synergetic model of interaction between the actors in social networking services is synthesized, which will ensure the formation of a stable virtual community. Such a virtual community is capable of counteracting the threats to the state’s information security in the information space of services through the implementation of social control over the members of the virtual community and the dissemination of a strategic narrative to counteract the content of destructive nature. The experimental research of the proposed model of synergetic control for a hidden artificially controlled transition of the virtual community of actors in social networking services to the state of state information security is performed. It is proved that the effectiveness of such a management compared to the unmanaged processes of the formation of stable virtual communities increases 3.3 times and allows to attract a greater number of actors of social networking services.


Sign in / Sign up

Export Citation Format

Share Document