scholarly journals INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER

2019 ◽  
Vol 45 (1) ◽  
pp. 6-10
Author(s):  
Iman Hadi

Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.

Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2021 ◽  
Vol 13 (12) ◽  
pp. 6627
Author(s):  
Shichao Sun ◽  
Yuanqian Liu ◽  
Yukun Yao ◽  
Zhengyu Duan ◽  
Xiaokun Wang

Sustaining the development of car-sharing is considered an efficient way to counter environmental issues worldwide. Against this background, college students are recognized as a promising customer group of car-sharing service providers in China. However, the determinants that promote students’ willingness to use car-sharing services are rarely studied, and the uniqueness of college students in China in the context of car-sharing is justified. Therefore, this paper examines the key factors that affect Chinese college students’ adoption of car-sharing. An empirical study using samples from Dalian Maritime University was conducted, and survey data were collected via the Internet. Specifically, respondents’ socio-demographics were obtained, and their latent attitudes on car-sharing services were measured in terms of willingness to use car-sharing services, perceived usefulness, perceived ease of use and safety concerns. In addition, nine hypothetical travel scenarios were defined, and regarding each travel scenario, the respondents were asked to state whether they were willing or not to use car-sharing services. On this basis, a hybrid logit model was established to investigate the key factors that influenced the willingness to use car-sharing services. Aside from the common findings in line with previous studies, the results indicate that with the increase in the number of travel fellows, willingness to use car-sharing services went up. Furthermore, college students’ willingness to use car-sharing services was significantly affected by money costs rather than time costs. Additionally, college students in China are more likely to use car-sharing services during workday off-peak hours and weekends. Separately, among the respondents’ latent attitudes, only the perceived usefulness of car-sharing services was found to have a significant and positive impact on students’ willingness to use them. Relevant policy implications with regards to theoretical findings are also offered in this paper to car-sharing service providers in China.


Agronomy ◽  
2021 ◽  
Vol 11 (7) ◽  
pp. 1283
Author(s):  
Vasileios Ziogas ◽  
Georgia Tanou ◽  
Giasemi Morianou ◽  
Nektarios Kourgialas

Among the various abiotic stresses, drought is the major factor limiting crop productivity worldwide. Citrus has been recognized as a fruit tree crop group of great importance to the global agricultural sector since there are 140 citrus-producing countries worldwide. The majority of citrus-producing areas are subjected to dry and hot summer weather, limited availability of water resources with parallel low-quality irrigation water due to increased salinity regimes. Citrus trees are generally classified as “salt-intolerant” with high water needs, especially during summer. Water scarcity negatively affects plant growth and impairs cell metabolism, affecting the overall tree growth and the quality of produced fruit. Key factors that overall attempt to sustain and withstand the negative effect of salinity and drought stress are the extensive use of rootstocks in citriculture as well as the appropriate agronomical and irrigation practices applied. This review paper emphasizes and summarizes the crucial role of the above factors in the sustainability of citriculture.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


2020 ◽  
Vol 1 (12) ◽  
pp. 118
Author(s):  
Viktorija Maļkeviča ◽  
Anda Zvaigzne ◽  
Sandra Murinska

The development of telecommunications plays an essential role in the economy, as it affects the opportunities for communication between economic actors at both the national and global levels. Today mobile communication companies, which provide quality communication and information retrieval opportunities through the variety of their services, technological features and tariff plans, are important telecommunication providers. The aim of the present research is to examine the leading mobile communication service providers in Latvia by employing the theoretical findings of communication technology and telecommunications.The research used the following methods: monographic, induction and deduction, graphic, comparison, as well as competitiveness assessment based on the competitiveness index.The research described the theoretical aspects of telecommunications, examined the leading mobile communication service providers in Latvia, their most important financial performance indicators, services and tariff plans offered as well as assessed their competitiveness.Examining the mobile tariff plans and the services included therein, it was found that they were quite similar. However, an examination of each offer in more detail revealed that there were many nuances that were important to the client and that should be paid attention to.After assessing the competitiveness of the leading mobile communication providers, it was concluded that Latvijas Mobilas Telefons scored the highest number of points, Bite Latvija was in second place and Tele 2 took third place. An assessment of the key factors of competitiveness for the providers revealed that the company Latvijas Mobilais Telefons needed to improve the positions where its competitors had higher ratings: its discount system, the prices of services and the supply of services.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2020 ◽  
Vol 20 (2) ◽  
pp. 382-394
Author(s):  
Tatyana Ivanovna Ponka ◽  
Mirzet Safetovich Ramich ◽  
Yuyao Wu

The subject of the study is the new course of the PRC information policy, which was launched by the Fifth generation of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the Strong cyberpower strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. Chinas new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRCs information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The Peoples Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the countrys information security system and requires detailed study. The purpose of the article is to identify the evolution of Chinas information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the Peoples Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.


Author(s):  
A.V. Pecheniuk

The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative legal acts aimed at bringing to civil, administrative and criminal responsibility for illegal collection, disclosure and use of information constituting a trade secret. The main stages of building an information security policy are summarized, the most common types of information threats related to the use of modern computer technologies are described. The necessity of developing a domestic original accounting (management) program that could be used in the long term by the vast majority of Ukrainian enterprises is pointed out. There are three groups of tools that are applied in the theory and practice of information security of the enterprise (active, passive and combined), emphasizing the need for planning and continuous monitoring in real time of all important processes and conditions that affect data security. It is noted that even if the information security system is built taking into account all modern methods and means of protection, it does not guarantee one hundred percent protection of the information resources of the enterprise, but a well-designed information security policy allows to minimize the corresponding risks. Key words: information security, information policy, information security, confidential information, information threats, information and communication technologies, software.


Sign in / Sign up

Export Citation Format

Share Document