scholarly journals A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service

2016 ◽  
Vol 15 (4) ◽  
pp. 63-72
Author(s):  
Suyeon Lee ◽  
Jiyeon Yoo ◽  
Jongin Lim
Energetika ◽  
2018 ◽  
Vol 63 (4) ◽  
Author(s):  
Heinz-Peter Berg

In the last years, cybersecurity has become a crucial essential element within the security framework of critical infrastructures such as process industry, railways, hospitals and also nuclear facilities. The types of threats change, and not only organizations requiring money from the affected organization but also nation states seem to be involved. The number of cyber-attacks to all types of critical infrastructure increased and these attacks are seen as a threatening problem. For the specific aspects of nuclear facilities in Germany, current experiences and future activities regarding these facilities under the German IT Act are discussed. Moreover, respective regulatory requirements recently set in force in Germany are presented. In addition, ongoing international activities in this area are discussed.


Author(s):  
Sungmoon Kwon ◽  
Seokcheol Lee ◽  
Jiwoong Jang ◽  
Taeshik Shon

Author(s):  
Zornitza Prodanoff ◽  
Cynthia White-Williams ◽  
Hongmei Chi

The authors describe a standards-based security framework for the purposes of recording security and privacy vulnerabilities discovered in mHealth apps. The proposed framework is compliant with the international standard for software architecture descriptions, ISO/IEC/IEEE 42010, relevant state-agency regulations, and US federal healthcare mandates, as well as computing standards for data interchange formats. Future real-life implementations are envisioned to consists of three key components: (1) design and implementation of a repository that links vulnerabilities to concepts from the taxonomy used by legislative and standardization bodies; (2) population of the repository with security vulnerability descriptions that follow a standard format, such as JavaScript Object Notation (JSON); and (3) implementation of a searchable user interface (e.g., Google's Firebase UI), which allows for aggregation statistics, data analytics, as well as public access to the repository. The proposed framework design promotes timely updates of regulations, standardization drafts, and app development platforms.


2015 ◽  
Vol 12 (3) ◽  
pp. 209-225 ◽  
Author(s):  
Burcu Togral Koca

Turkey has followed an “open door” policy towards refugees from Syria since the March 2011 outbreak of the devastating civil war in Syria. This “liberal” policy has been accompanied by a “humanitarian discourse” regarding the admission and accommodation of the refugees. In such a context, it is widely claimed that Turkey has not adopted a securitization strategy in its dealings with the refugees. However, this article argues that the stated “open door” approach and its limitations have gone largely unexamined. The assertion is, here, refugees fleeing Syria have been integrated into a security framework embedding exclusionary, militarized and technologized border practices. Drawing on the critical border studies, the article deconstructs these practices and the way they are violating the principle of non-refoulement in particular and human rights of refugees in general. 


2020 ◽  
Vol 22 (1) ◽  
pp. 6-12
Author(s):  
Nelia Volkova ◽  
◽  
Alina Mukhina ◽  

Abstract. Introduction. The issue of financial risk management of commercial banks is quite relevant today, because the activity of banks is the most risky of all. The presence of risks in banking can lead to unexpected losses, namely the loss of own resources. That’s why for the stable operation of the bank without loss the priority is to assess the financial risks, which is the basis for their further neutralization. Purpose. The purpose of the article is to develop conceptual provisions for assessment financial risks and justifying the need to neutralize them. Results. The article analyzes the impact of risks on the financial stability of a banking institution. The main methods of bank risk assessment are considered. All these include the statistical method, the analytical method, the expert method, the analogue method and the combined method. The necessity of neutralization of financial risks in order to avoid negative consequences is substantiated. Also the methods of bank risks neutralization are considered. It should be noted that these methods of neutralization can not only be used, but also supplement the list with new methods must be done, which in the future will protect the bank from the influence of undesirable factors. A conceptual approach to the assessment and neutralization of financial risks is proposed. This conceptual approach aims to ensure effective assessment of the level of risk with their subsequent neutralization Conclusions. Use of a conceptual approach will allow an effective risk assessment and decision-making to avoid or accept risk. Thanks to using this approach, the banking institution will be able to react swiftly to the presence of financial risks and to prevent the occurrence of negative consequences, which may lead to a violation of the financial stability of the bank.


Sign in / Sign up

Export Citation Format

Share Document