scholarly journals Awareness and Following of Information Security Policies as the Main Rule to Protect Against Threats in Digital Communication Processes. Cybersecurity as the Arena of Modern Warfare

2021 ◽  
Vol 7 (1) ◽  
pp. 124-142
Author(s):  
Piotr Łuczuk

Abstract Nowadays, due to the benefits of technological development and the spread of the Internet, various threats have started to be recognized. Still, the awareness of society, especially politicians and state administration in this area is insufficient. This is also evidenced by the fact that initially this topic was not discussed at all in the scientific and even popular literature. The author of the article poses a question: is there, then, an effective method of defense against cyber threats, since their effects can be so disturbing? According to the author, the key to cyber security is the awareness of users of the digital communication process, both at the administrative and social levels.

2020 ◽  
Vol 4 (1) ◽  
pp. 044-046
Author(s):  
Beretas Christos P

Industrial control systems (ICS) are critical, as in these systems, cyber threats have the potential to affect, disorganize, change their mode of operation, act as an information extraction vehicle, and ultimately turn against itself. Creating risks to the system itself, infrastructure, downtime, leakage of sensitive data, and even loss of human life. Industrial control systems (ICS) are vital to the operation of all the modern automated infrastructure in the western world, such as power plant and power stations. Industrial control systems (ICS) differ from the traditional information systems and infrastructures of organizations and companies, a standard cyber security strategy cannot be implemented but part of it adapting to the real facts and needs of each country, legislation and infrastructure. These systems require continuous operation, reliability and rapid recovery when attacked electronically with automated control, isolation and attack management processes. Incorrect settings and lack of strategic planning can lead to unprotected operation of critical installations, as they do not meet the cyber security requirements. Industrial control systems (ICS) require special protection in their networks, as they should be considered vulnerable in all their areas, they need protection from cyber attacks against ICS, SCADA servers, workstations, PLC automations, etc. Security policies to be implemented should provide protection against cyber threats, and systems recovery without affecting the operation and reliability of operating processes. Security policies such as security assessment, smart reporting, vulnerability and threat simulation, integrity control analysis, apply security policy to shared systems, intrusion detection and prevention, and finally firewall with integrated antivirus and sandbox services should be considered essential entities.


Author(s):  
Khushpreet Kaur

Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc. for technological development. The data can be in many forms like data of employees in the organization, an individual’s data present on a social media website, the data stored in mobile devices or on the cloud. This data is stored mostly on networks including the company’s websites, servers, the cloud which is the main reason for data to be hacked. Numerous cyber threats are increasing day by day and to ensure cybersecurity and privacy of internet users various challenges have been faced by IT industries. Those challenges include data security, mobile security, network security, Application Security, Biometric authentication. The elaboration of these cybersecurity challenges and cyberattacks will be discussed in this paper. Cyber attacks are not only harmful to organizations, but it is also dangerous for individuals. Those attacks are the attacks done by cyber attackers for their advantage or to harm individuals for their revenge. Some common cyber threats are phishing, ransomware attack, malware, etc. whose description is given below in the ‘Types of cyber-attacks’ section. Moreover, this paper includes cybersecurity techniques that will be helpful to reduce data breaches, identity theft, or other cyber threats. Awareness of those cyber techniques will help both individuals and organizations to protect their information from various types of cyberattacks.


Author(s):  
Hatun Boztepe Taşkıran

In today's world, it has become more significant to understand the effect of digital media on the communication of the contents about culture and arts, which are the common heritages of mankind. In this chapter, the concepts of digital communication, digital media, and digital publics which are the most concrete results of the digitalization process in communication was examined. Also, the digitalization of culture and arts communication was investigated in relation to the organizations working in the field of culture and arts and artists' adaptation to the digitalized communication processes; and the role of digital media was explored in connection with the communication process management of culture and arts contents. In research conducted as part of this study, the digitalization of culture and arts communication was evaluated by analyzing a sample application as a digital database and determining the perspectives of target audiences. According to the data obtained in the research, Google Arts & Culture, which has been investigated as part of the study as a sample application, should be benefitted from in the digital culture and arts communication thanks to the features it has. The application supports the accessibility of artworks and cultural products from any society for digital media users. As the data gathered during the interviews done to present target audiences' points of views about the digitalization of culture and arts communication indicate, digital communication offers important opportunities for target audiences in reaching arts and culture contents without time and place restrictions; and target audiences appreciate accessing to these contents free of charge.


Author(s):  
Ion PARASCHIVA

The field of cyber security is evolving at an alert pace and requires constantly updated strategies, and from the IT specialists, extensive knowledge and experience. In addition to the technical knowledge regarding cyber security, IT specialists of the Romanian Police need to understand very well the nature of the activity carried out. It should be made aware that there is no valid general success recipe and that the development of security policies should start from analyzing the particularities of human resources. Once their activity is understood, a dedicated security strategy can be outlined, ensuring a high degree of security for the organization and the information held by it.


2018 ◽  
Vol 30 (2) ◽  
pp. 71-87 ◽  
Author(s):  
Angela K. Hollman ◽  
Sonja H. Bickford ◽  
Janet L. Lear

This article seeks to explain the key variables of internal communication processes of information technology executives, specifically chief information officers (CIOs), at higher education institutions. By understanding the key variables that influence the IT communication process, leaders and administrators, such as the CIO, can better communicate with their stakeholders leading to a successful, technology-integrated organization. While others have sought to model this business-IT relationship using communication as one part of a model, this study focuses upon only the CIO communication process adding value to current information technology management literature. This exploratory pilot article offers empirical insights about how CIOs communicate within their own team and up through the executive ranks of an organization. It suggests that CIOs can be divided into two categories; these two categories, keying off of communication variables, appear to directly affect the ultimate success or failure regarding the integration of technology into the mission and vision of the organization.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2021 ◽  
Vol 4 (02) ◽  
pp. 221-233
Author(s):  
Riko Aji Pratama

Abstract  Couples of different religions are prone to conflicts related to issues, especially regarding beliefs. In interfaith marriages, the inner bond that exists between a man and a woman but of different religions gives rise to state and religious administrative obstacles as well as other non-administrative obstacles. The purpose of this study was to determine the communication process in building relationships between interfaith couples. This study uses interpersonal communication theory and social penetration theory. This research using qualitative descriptive methods and interviews to collect data. The data obtained is the result of in-depth interviews with 2 sources who have become husband and wife of different religions. The research process from data reduction, data presentation, then analyzed to draw conclusions. The results of this study explain that through the process intimate relations. Interpersonal communication processes that are intertwined become a means to build better and harmonious relationships. The process is influenced by the memory of each partner. In building relationships through interpersonal communication there are factors that influence relationships, such as two-way communication, openness, comfort, trust, and supportiveness is a way of maintaining relationships  Keywords: Communication Process; Different religion; Interpersonal Communication; Interfaith Couples  Abstrak Penelitian ini membahas tentang proses komunikasi dalam membangun relasi pasangan beda agama. Pasangan beda agama rentan adanya konflik yang berhubungan dengan permasalahan khususnya menyangkut keyakinan. Dalam perkawinan beda agama, ikatan batin yang terjalin antara seorang pria dan wanita tetapi berbeda agama sehingga memunculkan kendala administratif negara dan agama serta kendala non administratif lainnya. Tujuan penelitian ini adalah untuk mengetahui proses komunikasi dalam membangun relasi pasangan beda agama. Penelitian ini menggunakan teori komunikasi interpersonal, proses komunikasi dari pengenalan sampai dengan yang lebih intim pemetaan dari pengertian teori penetrasi sosial. Penelitian ini merupakan penelitian kualitatif dengan menggunakan metode deskriptif kualitatif dan wawancara  untuk mengumpulkan data. Data yang diperoleh merupakan hasil wawancara mendalam dengan 2 narasumber yang telah menjadi suami istri yang berbeda agama. Proses penelitian dari reduksi data, penyajian data, kemudian dianalisis untuk pengambilan kesimpulan. Hasil Penelitian ini menjelaskan bahwa melalui proses dari intim menuju ke lebih intim. Proses komunikasi interpersonal yang terjalin menjadi sarana untuk membangun relasi yang lebih baik dan harmonis. Proses komunikasi membangun relasi tidak semata-mata langsung dekat ada proses didalamnya. Proses tersebut dipengaruhi oleh memori dari masing-masing pasangan. Penelitian sebelumnya menjelaskan mengenai kecerdasan dalam berkomunikasi dalam perbedaan agama antar pegawai dalam suatu instansi untuk mengetahui strategi dalam berkomunikasi. Dalam membangun relasi melalui komunikasi interpersonal ada faktor-faktor yang memengaruhi relasi seperti komunikasi dua arah, keterbukaan, kenyamanan, sikap percaya, suportif dan mendukung adalah cara dalam pemeliharaan hubunganKata Kunci: Beda Agama; Komunikasi Interpersonal; Pasangan Suami Istri; Proses Komunikasi


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


Sign in / Sign up

Export Citation Format

Share Document