INFORMATION AND CYBER SECURITY OF ATTORNEY'S ACTIVITY: THEORETICAL AND PRACTICAL ASPECTS (THE EXPERIENCE OF THE USA)

2020 ◽  
pp. 321-324
Author(s):  
A.A. Zavadskyi
Keyword(s):  
2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Yee-Yin Choong ◽  
Mary F Theofanos ◽  
Karen Renaud ◽  
Suzanne Prior

Abstract Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and culture will be dependent on today’s youth, it is imperative to conduct cyber-security research with children. We conducted surveys of 189 3rd to 8th graders from two Midwest schools in the USA. We found that children have on average two passwords for school and three to four passwords for home. They kept their passwords private and did not share with others. They created passwords with an average length of 7 (3rd to 5th graders) and 10 (6–8th graders). But, only about 13% of the children created very strong passwords. Generating strong passwords requires mature cognitive and linguistic capabilities which children at this developmental stage have not yet mastered. They believed that passwords provide access control, protect their privacy and keep their “stuff” safe. Overall, children had appropriate mental models of passwords and demonstrated good password practices. Cyber-security education should strive to reinforce these positive practices while continuing to provide and promote age-appropriate developmental security skills. Given the study’s sample size and limited generalizability, we are expanding our research to include children from 3rd to 12th graders across multiple US school districts.


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 289-295
Author(s):  
Mohammed I. Alghamdi

The cyber-security development for future generations is at stake as a global concern. The existing strategic and policy structures on cyber security and awareness-raising at many levels needs more investigation in order to formulate workable and efficient strategic vision that addresses actual needs and challenges. The justification for this work is therefore to test the robustness, in contrast with some of the most technologically advanced countries on the Asian Continent and others like the USA, Japan, of Saudi Arabia's current cyber security strategy in order to keep the NCSS up-to-date. This research aimed to develop a strategic vision to combat cybercrime to enhance cyber security. The research results confirmed the approval of the members of the study community to a medium degree on the reality of digital extremism and cyber terrorism as seen by the researcher. Moreover, the approval of the members of the study community was to a high degree on the role of combating cybercrime in promoting human security as seen by the researcher. The members of the study community agreed with a high degree on the obstacles identified by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia. There was a high approval of the study community members on the strategic vision developed by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia.


2021 ◽  
pp. 139-144
Author(s):  
S. STEZHKO ◽  
T. SHEVCHENKO

The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's capabilities in the field of cyber security has been identified.


Author(s):  
M. A. Nazarenko ◽  
A. I. Gorobets ◽  
D. V. Miskov ◽  
V. V. Muravyev ◽  
A. S. Novikov

The article is dedicated to issues in certification of antivirus software and industrial cyber security systems. It was shown that certification time in Russia is much longer than in the USA, European Union and Germany. The life time and the development time of products of this field were analyzed in the article. Each variable was specified for new products and for new versions of existing products. Some statistical methods were used in the article: Cronbach’s alfa, t-statistics, and median value similarity that are typical for the articles in quality management. As a result, it was found that certification time in Russia for industrial cyber security systems is significantly longer than in other analyzed countries, up to three-fold. Product development and life time are also longer. However, the most important result is that certification in Russia adds from 32.1 to 40 percent of time to the development of a new version or a new product, correspondingly, whereas in other investigated countries these numbers are about 17 percent. Reduction of certification time will increase new product development efficiency in the field of cyber security, which will improve positions of Russian products at the international mark et.


2021 ◽  
Vol 3 ◽  
Author(s):  
Nawaf Alhalafi ◽  
Prakash Veeraraghavan

Saudi Arabia has a goal of ensuring that it has at least two cities among the top 100 smart cities of the future. However, increasing connectivity and incorporation of smart solutions in cities still raises concerns over cyber security with threats arising daily including denial of services and phishing as some of the most significant. Saudi Arabia, therefore, needs a cybersecurity policy framework that will ensure effective protection for all stakeholders in the smart city from these cyber threats. User acceptance is foremost important in any new technology, including smart-cities. Due to ongoing cyber threats and in the absence of an efficient cyber policies, Saudi end-user community is not keen to accept newer technologies where their interaction with online medium is required. The proliferation of smart cities globally affords the opportunity to analyze and compare the efforts made in Saudi Arabia with other nations like the USA, India and Singapore which is the premier smart city model in the globe currently. This review looks at the similarities and differences between KSA’s cyber security policy framework with these three nations. The review will note some of the defining characteristics and approaches to cyber security in the smart cities of USA, India, and Singapore. After reviewing the current framework in Saudi Arabia, this paper will make suggestions such as updating Saudi’s cybercrime legislation like in the US or formulating a master cyber security plan as seen in Singapore that will improve KSA’s framework creating the best framework model for cyber security in its smart cities.


2021 ◽  
Vol 1 (80) ◽  
pp. 199-216
Author(s):  
Weronika Jakubczak ◽  
Hon-min Yau

The authors of the article focus on the main trends observed within cyber security regulations of Taiwan (Republic of China). In fact, Taiwanese governmental websites faced approximately 5 million attacks every day in 2021 [8]. Despite these attacks, the Taiwanese government operates in a steady way to improve its cyber capability, progressing on its cyber security increase path. The main document behind it in the form of strategic regulation is the National Cyber Security Program of Taiwan (NCSP 2021–2024). It explains the structure of the entities responsible for cyber security and describes both goals that have been accomplished and the ones that are/will be implemented. In particular, Taiwan focuses on providing higher cyber security protection standards, including critical infrastructure elements, private-public cooperation, the use of new technologies, and scouting for new talents. International collaboration is also highly valued as an example of joint cyber exercises between Taiwan and the USA in 2019.


2001 ◽  
Vol 120 (5) ◽  
pp. A16-A16 ◽  
Author(s):  
N VAKIL ◽  
S TREML ◽  
M SHAW ◽  
R KIRBY

Sign in / Sign up

Export Citation Format

Share Document