Problems of information security

ANCIENT LAND ◽  
2021 ◽  
Vol 03 (03) ◽  
pp. 32-35
Author(s):  
İxtiyar Bəxtiyar oğlu Xanızadə ◽  

The present stage of development is characterized by strong scientific and technical development, which includes high-tech industries. Thus, information and communication technologies (ICT) are one of the main factors influencing the formation of 21st century society. Their revolutionary influence is constantly growing on the security of people's livelihoods, their work and education, and the interaction between the state and civil society. ICT is becoming more and more important stimulus for world community development. However, more precisely, ET development is always accompanied by negative social impacts, including various types of crimes. The rapid development of computer technology, in particular, has led to the expansion of crimes related to electronic processing of information, including crime-related types of terrorism. The article explores the problems of Information Security at the Airports, and cyber security caused by information security. Particular attention is paid to the illegal acquisition of information, the methods used to protect information, the use of illegally obtained information for personal gain, and the interference in the operation of life support facilities. Key words: information, information security, cyberterrorizm

Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2021 ◽  
Vol 7 (3A) ◽  
pp. 504-511
Author(s):  
Volodymyr Bekh ◽  
Valerii Akopian ◽  
Sergiy Yashanov ◽  
Ilya Devterov ◽  
Bogdan Kalinichenko

The rapid development in the world of information and communication technologies makes it possible to say that now they are one of the most common ways of teaching. These technologies influence the formation of methods and methods of pedagogical activity, open up new opportunities for communication and obtaining information. Informatization and computerization of education acts as a component of the general trend of global processes of world development, as an initial information and communication basis for the harmonious development of the individual and social systemic information. Preparing a student for an active and fruitful life in a modern digital information society is one of the main tasks of the modern stage of modernization of the education system.


Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


Author(s):  
Sirje Virkus

The rapid development of information and communication technology (ICT) over the past decades has created new challenges and opportunities for libraries and librarians. As a result of ICT, library services to users have changed, the management of libraries has evolved and the roles of librarians have multiplied. The new millennium presents new opportunities to exploit an ever-growing array of information and communication technologies in the provision of library services. As one millennium draws to a close and a new one begins, there are a lot of questions to answer:


Author(s):  
V. N. Strelnikova

The article deals with significant changes that are associated with total informatization, which is a powerful converter of economic, social and other types of life activity of society. The author notes that at the same time, the satisfaction of information needs, the state of the information space for minors should be subject to moderate regulation. Attention is drawn to the fact that the intensive growth of the diversity of information and communication technologies is today the dominant environment for the development of a modern child. The characteristics of information harmful to the health and development of children are given. It is proved that relying on the principles of a systematic approach makes it possible to competently organize and correctly carry out the process of achieving the state of protection of children in the information space by various methods and means. Ensuring the information security of childhood is defined by the author as a system; the components of the system of ensuring the information security of childhood (methodological, regulatory, organizational and activity, effective) are highlighted.


Sign in / Sign up

Export Citation Format

Share Document