scholarly journals A Review on Role of Cyber Security in Data Science

Author(s):  
Meenakshi Bhrugubanda ◽  
A.V. L. Prasuna

Cyber security alludes to an assemblage of advancements, procedures and practices intended to forestall an assault, harm or unapproved access to systems, gadgets, projects and information. It is likewise can be alluded to as Information security. Clients must comprehend and follow the essential standards of information security, for example, email connections watchfulness, solid passwords, and information reinforcement. Today is particularly testing to implement fruitful cyber security activities since a greater number of gadgets than individuals are available and more imaginative attackers. Data science is a subset of AI, and it alludes more to the covering regions of statistics, scientific methods, and data analysis—which are all used to remove significance and bits of knowledge from information. This paper analyses the role of Data science in Cyber Security.

2021 ◽  
Vol 10 (37) ◽  
pp. 86-92
Author(s):  
Vitalii Makarchuk

The purpose of the article is to examine the role of the National Police of Ukraine in ensuring the information security of Ukraine. The subject of the study: The subject of the study is the competence of the National Police of Ukraine in ensuring the information security of Ukraine. Methodology: Dialectical method, epistemological method, analytical method, formal and legal method, normative and dogmatic method, the methods of legal modeling and forecasting were used in the research. The results of the study: The definition of “information security” and “cyber security” is provided. The main factors that negatively affect the information space in Ukraine, as well as current threats to Ukraine’s national security in the information sphere are identified. Practical implications: It is established that the number of crimes in the information sphere is growing every year. In this regard, the task of the National Police is to combat crimes and other offenses in this area, as well as to protect relevant rights and freedoms of citizens, society and the State. Value/originality: The tasks and powers in the area of information security protection of the National Police in general and the Department of Cyber Security, in particular, are defined.


2021 ◽  
Vol 10 (39) ◽  
pp. 238-244
Author(s):  
Serhii Bratel ◽  
Nataliia Makarenko ◽  
Valentyn Bortnyk ◽  
Yurii Levchenko ◽  
Andrii Mykytchyk

The purpose of the article: is to study the threats to the information security of Ukraine and to analyze the legislative acts that define the tasks and functions entrusted to rule-of-law institutions to ensure information security of the State. Research methods: Logical method, normative and dogmatic method, monographic method, system and structural method, grouping method, the method of generalization are applied in the course of the study. Results of the research. Scientific approaches to the concepts of "information security", "cyber security" and "rule-of-law institutions" are considered. The threats to legal relations in this area are identified. Practical meaning. The role, mission and powers of the rule-of-law institutions in ensuring information and cyber security of Ukraine are established. Scientific novelty. The normative and legal acts, which enshrine the tasks and powers of rule-of-law institutions in ensuring the information security of the State in general and cyber security in particular, are analyzed in detail.


2020 ◽  
Vol 2 (1) ◽  
pp. 82-98
Author(s):  
M. А. Efremova ◽  

Introduction. One of the components of the national security of the Russian Federation is information security. In the context of the information society in the Russian Federation, the role of the information component of national security has increased significantly. There are new challenges and threats to the information security of the Russian Federation, which require the reaction of the legislator. However, the conditions of globalization require States to take joint measures to address such a complex problem as information security. Consequently, international information security cannot be achieved by a single state. It is necessary to consolidate efforts and develop a uniform approach to this issue. Theoretical Basis. Methods. The Information society is characterized by a high level of development of information and communication technologies and their use in almost all spheres of life. The emergence of the global information society, the increased role of information and information and communication technologies have stimulated the adoption of a number of international legal instruments in this area. In addition, a number of other guidance documents have been developed and adopted that define the ways and directions of law-making and cooperation at the level of regional organizations. Their distinctive feature was the realization of the lack of unified and clear conceptual and categorical apparatus. This also applies to the concept of “information security”, a unified approach to the understanding of which is not available at the international level. General scientific methods (materialistic dialectics) and private scientific methods: formallogical, comparative-legal, historical-legal. Results. Currently, at the international level, there is not only no legal act regulating issues in the field of criminal law protection of information security, but also there is no common understanding of information security, its main threats of possible joint measures to prevent and eliminate them. Discussion and Conclusion. As the interstate information confrontation will continue and gain new momentum, there is an urgent need for the adoption of an international legal act aimed at the criminal law protection of information security, containing the classification of crimes against information security and recommendations to States on the criminalization of acts against information security in national legislation.


2008 ◽  
pp. 2958-2969
Author(s):  
Dieter Fink ◽  
Tobias Huegle ◽  
Martin Dortschy

This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. Previous IT governance frameworks, such as those provided by the IT Governance Institute, Standards Australia, and The National Cyber Security Partnership, have not given the connection between IT governance and e-business security sufficient attention. The proposed model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.


2021 ◽  
Vol 1 (13) ◽  
pp. 123-132
Author(s):  
Nataliia Rotanova ◽  
Tetiana Shabelnyk ◽  
Serhii Krivenko ◽  
Yulianna Lazarevska

The study substantiates the urgent need to train qualified specialists capable of responding to cyber incidents and countering cyber threats in a short time, conducting state audits and creating effective management systems for information security and cybersecurity. The aim of the work is to reveal the ways and features of the organization of the study of mathematical disciplines in order to effectively train higher education students majoring in 125 «Cybersecurity». The role of the mathematical component of cybersecurity and the organization of the educational process of mathematical disciplines for the purpose of effective professional training of future cybersecurity specialists is considered. It is concluded that most professionally-oriented disciplines that provide basic knowledge in all aspects of information security are based on fundamental mathematical training. The study argues that the applied problems solved by the students of the specialty 125 «Cybersecurity» must meet the methodological requirements for real practical content, which provides an illustration of the practical value and significance of the acquired mathematical knowledge in the cyber- and/or information security field. The solution to the problem of improving the quality of mathematical training of the students is considered through the use of intra-subject and interdisciplinary links, the introduction of applied orientation of mathematical disciplines and the principle of continuity. The paper presents examples of professionally oriented tasks that are offered to higher education students majoring in 125 «Cybersecurity» studying mathematical disciplines. It is proved that the introduction of applied orientation of mathematical disciplines creates the necessary conditions and attracts students to the professional sphere, which is an important step towards improving the quality of training of cybersecurity professionals.


Author(s):  
M. Govindarajan

This chapter focuses on introduction to the field of data science. Data science is the area of study which involves extracting insights from vast amounts of data by the use of various scientific methods, algorithms, and processes. The term data science has emerged because of the evolution of mathematical statistics, data analysis, and big data. Data science helps to discover hidden patterns from the raw data. It enables to translate a business problem into a research project and then translate it back into a practical solution. The purpose of this chapter is to provide emphasis on integration and synthesis of concepts, techniques, applications, and tools to deal with various facets of data science practice, including data collection and integration, exploratory data analysis, predictive modeling, descriptive modeling, data product creation, evaluation, and effective communication.


Author(s):  
Dieter Fink ◽  
Tobias Huegle

This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. Previous IT governance frameworks, such as those provided by the IT Governance Institute, Standards Australia, and The National Cyber Security Partnership, have not given the connection between IT governance and e-business security sufficient attention. The proposed model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.


Author(s):  
Dieter Fink ◽  
Tobias Huegle ◽  
Martin Dortschy

This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. Previous IT governance frameworks, such as those provided by the IT Governance Institute, Standards Australia, and The National Cyber Security Partnership, have not given the connection between IT governance and e-business security sufficient attention. The proposed model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.


2009 ◽  
pp. 2143-2154
Author(s):  
Dieter Fink ◽  
Tobias Huegle ◽  
Martin Dortschy

This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. Previous IT governance frameworks, such as those provided by the IT Governance Institute, Standards Australia, and The National Cyber Security Partnership, have not given the connection between IT governance and e-business security sufficient attention. The proposed model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.


Sign in / Sign up

Export Citation Format

Share Document