LANGUAGE AND EDUCATION INTEGRATION - INFORMATION SECURITY AS ONE OF THE IMPORTANT FACTORS OF SUPPLY

2020 ◽  
Author(s):  
Bekzod Baidzhanov

This article examines the development of the Uzbek language,its place and importance in the world, its integrative features, important aspects ofinformation security.

Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


Author(s):  
Yulia Cherdantseva ◽  
Jeremy Hilton

Information Assurance (IA) is an intensively discussed discipline. Perhaps the most striking feature of IA is that everyone has a different opinion about what it actually is. The literature analysis enables us to distinguish three different approaches to Information Assurance: 1) Technical approach, concentrated on protection of networks; 2) Business approach, where IA is perceived as the comprehensive and systematic management of Information Security (InfoSec); 3) General approach, where IA is considered as a way to establish a level of confidence in information. Interviews with InfoSec practitioners reveal that they interpret the term IA differently and have contradictory views on how IA relates to InfoSec. It was felt that a survey with a greater number of practitioners might help to identify a commonly accepted perception of IA and to clarify the goals of the discipline. In 2011, a survey was conducted among one hundred InfoSec and IA professionals across the world. This chapter presents the results of the survey.


2013 ◽  
pp. 1208-1218
Author(s):  
James Suleiman ◽  
Terry Huston

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.


2014 ◽  
Vol 644-650 ◽  
pp. 3212-3215
Author(s):  
Shuang Liu

Digital library is a development direction of library, which has attracted the attention of the countries around the world widely. Digital library is an important part of informationization in university. As an information system, digital library is the backbone of the digital library information resources; the safety of library digital information resources is the key to the normal operation and development of digital library, which is also the guarantee for library to service. How to guarantee the security of information resources and the information system in open network environment has been considered by many people in the industry, the digital library information security has become one of core issues in digital library construction and development.


Author(s):  
T. Venkat Narayana Rao ◽  
Vemula Shravan

In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.


2019 ◽  
Vol 16 (4) ◽  
pp. 1-13
Author(s):  
Kateryna Molodetska

Today social networking services are one of the most popular virtual platforms for implementing social communication in the information space. In this case, social networking services provide the basic needs of actors in communication, belonging to virtual communities, new knowledge, self-realization, security, etc. At the same time, social networking services can be used by the world leading countries to achieve one-sided advantages in the national information space and influence on social and political processes in the state, public opinion, social exacerbation, interethnic and interreligious conflicts, etc. That’s why providing the state’s information security in social networking services is one of the most acute problems in Ukraine and around the world. It is established that the most promising direction of counteracting the threats to state information security in social networking services and managing the dynamics of interaction between the actors is the use of the concept of synergetic management. However, currently there are no practical recommendations for the implementation of synergistic management with the use of social control for self-organization in social networking services. The article systematizes the basic components of social control in social networking services. It is established that they are divided into social norms and social sanctions. The structure of each component of social control in social networking services and the peculiarities of their implementation are revealed. The synergetic model of interaction between the actors in social networking services is synthesized, which will ensure the formation of a stable virtual community. Such a virtual community is capable of counteracting the threats to the state’s information security in the information space of services through the implementation of social control over the members of the virtual community and the dissemination of a strategic narrative to counteract the content of destructive nature. The experimental research of the proposed model of synergetic control for a hidden artificially controlled transition of the virtual community of actors in social networking services to the state of state information security is performed. It is proved that the effectiveness of such a management compared to the unmanaged processes of the formation of stable virtual communities increases 3.3 times and allows to attract a greater number of actors of social networking services.


Author(s):  
Yurii I. Khlaponin ◽  
Svitlana V. Kondakova ◽  
Yevheniia Ye. Shabala ◽  
Liliia P. Yurchuk ◽  
Pavlo S. Demianchuk

The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.


2011 ◽  
pp. 154-161
Author(s):  
Jeffrey W. Seifert ◽  
Harold C. Relyea

The United States is frequently ranked among the most advanced e-government countries in the world (Accenture, 2004; United Nations, 2003; West, 2004). While many of these surveys emphasize the importance of technological issues, such as Web sites, interoperable data standards, and security protections, considerably less attention has been focused on the legislative environment that either facilitates or hinders the development of e-government at the national level. Like all countries, the United States has long grappled with the problem of how to centrally coordinate a diverse and sometimes incongruous collection of departments and agencies to achieve improved efficiencies, while maintaining a level of flexibility that enables these entities to carry out their specialized responsibilities effectively. This challenge can be made harder by the integration of information technology into government, by reifying organizational boundaries in the form of so-called “stove pipes” and “islands of automation.” To combat these problems, national governments are attempting to use legislative means to harmonize a cacophony of independent initiatives, and establish benchmarks for oversight. On December 17, 2002, President George W. Bush signed the E-Government Act of 2002 (116 Stat. 2899; P.L. 107-347) into law. Although there are many existing laws regarding issues such as information technology (IT) management, privacy, and information security, the E-Government Act of 2002 is the first national law that specifically addresses e-government in the United States. Prior to the passage of the E-Government Act, the law frequently cited as the most comprehensive information technology-related law was the Clinger-Cohen Act, signed into law in 1996, just 5 years after the development of the World Wide Web (1991) and at a time when the potential uses of the Internet were just beginning to be recognized by the larger, general public. The Clinger-Cohen Act provisions focus primarily on a narrow range of issues, including the decentralization of IT management within the U.S. federal government, pilot testing of new IT procurement procedures, and the establishment of chief information officer (CIO) positions in the major departments and agencies. In contrast, the provisions of the E-Government Act, described in greater detail below, address a much more comprehensive range of issues, suggesting that the integration of IT into government operations has reached a critical turning point. Some of these provisions include information security, IT management and training, the digital divide, and the creation of an Office of Electronic Government to coordinate and oversee e-government initiatives government-wide, among other duties.


Sign in / Sign up

Export Citation Format

Share Document