Authentication System for Biometric Applications Using Mobile Devices

2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.

2021 ◽  
Vol 6 ◽  
pp. 235-239
Author(s):  
Anton V. Obidenko ◽  
Aelita V. Shaburova

The relevance of information security research aimed at reducing information risks and optimizing enterprise costs for information protection. The results make it possible to increase the degree of information protection at enterprises by using methods, algorithms and practical procedures in the formation of an information security system aimed at reducing information risks.


2017 ◽  
Vol 9 (1) ◽  
pp. 25-32
Author(s):  
Nandi Syukri ◽  
Eko Budi Setiawan

Business Card is the most efficient, effective and appropriate tool for every business men no matter they are owners, employees, more over marketers to provide information about their businesses. Unfortunately, it is very difficult to bring and manage business card in large numbers also to remember the face of the business card owner. A Business Card application need to be built to solve all those issues mentioned above. The Application or software must be run in media which can be accessed anywhere and anytime such as smart phone. Kuartu is as business card application run in mobile devices. Kuartu is developed using object base modeling for mobile sub system. The platform of the mobile sub system is android, as it is the most widely used platform in the world. The Kuartu application utilizing NFC and QR Code technology to support the business card information exchange and the Chatting feature for communication. Based on the experiment and test using black box methodology, it can be concluded that Kuartu application makes business card owner to communicate each other easily, business card always carried, easy to manage the cards and information of the business card owner can be easily obtained. Index Terms— Business Card, Android, Kuartu, NFC, QrCode, Chatting.


Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


2020 ◽  
Author(s):  
Jorge Andres Delgado-Ron ◽  
Daniel Simancas-Racines

BACKGROUND Healthcare has increased its use of information technology over the last few years. A trend followed higher usage of Electronic Health Record in low-and-middle-income countries where doctors use non-medical applications and websites for healthcare-related tasks. Information security awareness and practices are essential to reduce the risk of breaches. OBJECTIVE To assess the internal reliability of the Spanish translation of three areas of the Human Aspects of Information Security Questionnaire (HAIS-Q), and to assess the knowledge, attitudes, and practices of medical doctors around information security. METHODS This is a cross-sectional descriptive study designed as a questionnaire-based. We used focus areas (Password management, social media use, and mobile devices use) from the Human Aspects of Information Security Questionnaire (HAIS-Q). Medical doctors in Ecuador answered an online survey between December 2017 and January 2018. RESULTS A total of 434 health professionals (response rate: 0.65) completed all the questions in our study. Scores were 37.4 (SD 5.9) for Password Management, 35.4 (SD 5.0) for Social Media Use and 35.9 (SD 5.7) for Mobile Devices. Cronbach’s alpha coefficient (α) was 0.78 (95% CI: 0.75, 0.81) for password management, 0.73 (95%CI: 0.69, 0.77) for mobile devices and 0.77 (95% CI: 0.73, 0.78) for Social Media Use. CONCLUSIONS Our study shows that three components of the Spanish translation of the HAIS-Q questionnaire were internally reliable when applied in medical doctors. Medical doctors with eagerness to receive infosec training scored higher in social media use and mobile device use categories.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2020 ◽  
Vol 23 (6) ◽  
pp. 99-114
Author(s):  
B. S. Dongak ◽  
A. S. Shatohin ◽  
R. V. Meshcheryakov

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 


Sign in / Sign up

Export Citation Format

Share Document