information technology security
Recently Published Documents


TOTAL DOCUMENTS

561
(FIVE YEARS 78)

H-INDEX

9
(FIVE YEARS 2)

Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


2021 ◽  
Author(s):  
Kristen Csenkey ◽  
Bruno Perron

The Canadian Arctic cyber domain is set to rapidly expand in the next decade with emerging security vulnerabilities that would benefit from a multi-stakeholder Arctic Cyber Security Ecosystem. Great power competition will affect the Arctic as the United States, Russia, and now China seek to influence the resource rich region. Cyber is not only a matter of defence, but it is interconnected with education and economic development. The threat of disinformation is an example of how new ways of warfare can impact Canada through the Arctic. Cyber capacity building (CCB) could include domestic cyber education, skills training, and investment in scientific and technical (S&T) and information technology (IT) infrastructure. A focus on CCB would need to foster growth of resources available to territorial governments and local communities, hardening the region’s cyberspace and support incident response to malicious cyber actor activity. Information technology security (ITSEC) resources need to be combined with community-based media literacy and critical thinking education programs to increase the region’s resilience to malign influence.


Author(s):  
A. Shaji George ◽  
A. S. Hovan George ◽  
T. Baskar ◽  
Digvijay Pandey

The challenge of securing critical data increases year after year. Evolving technology developments, involving the growth in cloud and the Internet of Things adoption make businesses' confidential data more vulnerable to sophisticated attackers. Protect the Whole Organization by using the Industry’s First Extended Detection and Response (XDR) Platform Security teams have been inundated with inaccurate, inadequate alerts. As a result of today's siloed security tools, specialists should pivot from the console to the console to piece together investigative clues, which will result in horribly slow investigations. Although they’ve implemented countless tools, teams still lack enterprise-wide visibility as well as the deep analytics necessary to locate threats. Confronted with a lack of security professionals, teams need to streamline operations. Extended Detection and Response is the world's very first extended detection and response platform which integrates endpoint, network, as well as cloud data to halt advanced attacks. It combines prevention, investigation, detection, and response in a single platform for unparalleled security and operational effectiveness. In combination with a Managed Threat Hunting assistance, XDR offers continuous protection and industry-leading coverage. A new and more comprehensive approach to detection and response is clearly needed, one which not just includes traditional endpoints but then also includes the enhanced attack surface like the network and cloud. Luckily, these are only a few of the difficulties XDR was intended to solve. XDR unites and extends detection and response capacity through multiple security layers, offering security teams along with centralized end-to-end enterprise visibility, strong analytics, automatic response across the entire technology stack. XDR, clients can get integrated and proactive security measures designed to protect the whole technology stack, which makes it easier for security analysts to detect and stop attacks in progress prior to the impact to the business. Companies of all sizes and types, irrespective of their levels of cybersecurity expertise, is necessary to be considered sophisticated detection, improved visibility, and immediate response to sophisticated threats. The goal here is to explain what XDR is and how it empowers Information Technology, security teams, to stop threats and put them on the defensive. And also show how it provides superior extensibility and analytics which will fit the needs of the future. In the present article, we’ll describe the fundamentals of XDR, and demonstrate how it help out for organizations as well as how it facilitates new security challenges. Moreover, this research paper will be useful for organizations to understand XDR in-depth, as well as how XDR can assist organizations in preventing cyberattacks as well as simplifying and improving security processes. In addition, this paper explains XDR, the capability of current and emerging technologies to offer greater visibility, collect and correlate threat information, andutilize analytics and automation to detect today and future attacks.


2021 ◽  
pp. 123-129
Author(s):  
Андрей Дмитриевич Гнутов

Рассматривается вопрос применения информационно-технологической безопасности в процессе подготовки офицерских кадров для нужд Федеральной службы войск национальной гвардии Российской Федерации. Акцентируется внимание на том, что образовательная сфера претерпевает существенные изменения, что в свою очередь вносит огромное корректирующее значение в процесс обучения будущих офицерских кадров Росгвардии. Описывается, что военная наука существенно отличается от традиционной системы образования в гражданских образовательных учреждениях и развитие военного образования осуществляется как самостоятельная отрасль специального образования. Приводится проблематика проводимых исследований по эффективности процесса обучения в военных образовательных организациях высшего образования Росгвардии, данные исследования набирают колоссальную популярность и значимость. Описаны основные значимые тенденции развития информационно-технологической безопасности как составной части информационной безопасности, дается понятийное определение информационно-технологической безопасности, что ставит обеспечение безопасности на одну из передовых позиций, реализующих определенные интересы государства и общества в информационном обмене. Рассматриваются существующие уровни информационно-технологической безопасности по критериям ее использования. Описывается информационная направленность в военном образовании, которая позволит достичь определенных образовательных целей в ходе подготовки будущих офицерских кадров для нужд Росгвардии. Делается акцент на то, что применение информационных технологий в процессе обучения не заменит полностью опыт профессорско-преподавательского состава по направлению соответствующей отрасли, а только облегчит понимание и усвоение курсантами учебного материала. В заключительной части делается обобщающий вывод о том, что информационно-технологическая безопасность выдвигает на первоочередную позицию проблематику, имеющуюся по вопросам обеспечения информационной безопасности в ходе подготовки будущих офицерских кадров Росгвардии. The article deals with the application of information technology security in the process of training officers for the needs of the Federal Service of the National Guard of the Russian Federation. Attention is focused on the fact that the educational sphere is undergoing significant changes, which in turn makes a huge corrective value in the process of training future officers of the Russian Guard. It is described that military science differs significantly from the traditional education system in civilian educational institutions and the development of military education is carried out as an independent branch of special education. The problems of ongoing research on the effectiveness of the learning process in military educational institutions of higher education of the Russian Guard are given, that these studies are gaining tremendous popularity and significance. The main significant trends in the development of information technology security, as an integral part of information security, are described, a conceptual definition of information technology security is given, which puts security in one of the leading positions that implement certain interests of the state and society in information exchange. The main significant trends in the development of information technology security as an integral part of information security are described, a conceptual definition of information technology security is given, which puts security in one of the leading positions that implement certain interests of the state and society in information exchange. The existing levels of information technology security are considered according to the criteria for its use. The informational orientation in military education is described, which will allow achieving certain educational goals in the course of training future officers for the needs of the Russian Guard. An aspect is made that the use of information technologies in the learning process will not completely replace the experience of the teaching staff in the direction of the relevant industry, but will only facilitate the understanding and assimilation of the educational material by the cadets. In the final part, a generalizing conclusion is given to the fact that information technology security brings to the fore the issues available on the issues of providing information.


2021 ◽  
Vol 49 (1) ◽  
pp. 450-463
Author(s):  
Konstantin V. Safonov ◽  
◽  
Konstantin V. Safonov ◽  
Vyacheslav V. Zolotarev ◽  
◽  
...  

Currently, the training of students-future specialists in information security is significantly modified. The necessary skills of such a specialist now include "soft skills", super-professional skills that are responsible for the effectiveness of participation in the work process. Information security itself is becoming an integral part of business modeling. This raises the question of choosing the most effective technologies for developing such skills, expressed in the relevant competencies of an information security specialist. The purpose of the study is to evaluate the use of gamification elements in the process of training students-future information security specialists. The research was conducted at the Siberian State University of Science and Technology, at the Department of Information technology security, as well as in the framework of the project «Development of a package of game cases for the discipline «Information security management»». In total, 182 students of the 3rd-5th year of specialty, 1-2 year of master's degree, as well as students of the 4th year of bachelor's degree in Information security took part in pedagogical and experimental work. The study shows that the time required to complete tasks to master the competence decreases (the time is reduced by up to 30% during the semester), and it is also noted that students who are able to master the competence received results at the beginning of the course. At the same time, the share of passively participating in the course elements in small groups is reduced to no more than 10%, and the number of non-participants in the development is practically reduced to zero. The results of the study selective response of participants in networked collaboration showed that the involvement and study of the material remains at a consistently high level as in previous years, and the time slice at the end of the experiment. For example, the assessment of the project organizers ' communication in the social network Vkontakte for 4 years of the project: 100% of participants are connected directly through at least one project participant; 93.75% are listed as friends of at least one project participant, the share of high-intensity information connections was 21.87%.


2021 ◽  
Vol 40 (2) ◽  
pp. 16-20
Author(s):  
L.V. Zahoruyko ◽  
◽  
T.A. Martʹyanova ◽  
A.V. Skyrda ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document