Weapon Security Control System for Respond to Cyber Warfare

2021 ◽  
Vol 21 (4) ◽  
pp. 101-107
Author(s):  
Seok-Woo Jang ◽  
◽  
Yong-Joon Lee
2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


Author(s):  
Joshua Lubell

This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity.


2018 ◽  
Vol 44 ◽  
pp. 00067
Author(s):  
Evgeny Pavlenko ◽  
Dmitry Zegzhda

The authors have offered the homeostatic control system architecture for digital manufacture security based on the software-defined network technology. We have highlighted the development features of digital manufacture systems and defined the technology advantages of software- defined networks, which allow these networks to be successfully applied with flexible and adaptive topology for a highly efficient new generation of cyber-physical systems. We have also described the main operating principles of software-defined networks in digital manufacture systems. A description of homeostatic security control technology, which includes a combination of engines to provide stability of the system’s internal environment and structural and functional resistance to external disturbances, is provided. We have proposed and described in detail the homeostatic security control system architecture including three generalized components: monitoring unit, decision-making unit, protection and control unit.


2019 ◽  
Vol 1176 ◽  
pp. 052026
Author(s):  
Xiao Liu ◽  
Guozhen Shi ◽  
Jinpo Fan

Sign in / Sign up

Export Citation Format

Share Document