security strategy
Recently Published Documents


TOTAL DOCUMENTS

1248
(FIVE YEARS 373)

H-INDEX

18
(FIVE YEARS 3)

2022 ◽  
Author(s):  
G Sowmiya ◽  
S. Malarvizhi

Abstract During testing utmost all appropriate and suitable strategy needs to be established for consistent fault coverage, improved controllability and observability. The scan chains used in BIST allows some fine control over data propagations that is used as a backdoor to break the security over cryptographic cores. To alleviate these scan-based side-channel attacks, implementing a more inclusive security strategy is required to confuse the attacker and to ensure the key management process which is always a difficult task to task in cryptographic research. In this work for testing AES core Design-for-Testability (DfT) is considered with some random response compaction, bit masking during the scan process. In the proposed scan architecture, scan-based attack does not allow finding out actual computations which are related to the cipher transformations and key sequence. And observing the data through the scan structure is secured. The experimental results validate the potential metrics of the proposed scan model in terms of robustness to the scan attack and penalty gap that exists due to the inclusion of scan designs in AES core. Also investigate the selection of appropriate location points to implement the bit level modification to avoid attack for retrieving a key.


2022 ◽  
pp. 101-108
Author(s):  
E. A. Sharyapova ◽  
A. V. Shuvaev ◽  
I. O. Zhavoronkova

The topic of the article is relevant — the problem of radioactive waste management, since the task of increasing the level of security of organizations of the country’s nuclear power-industrial complexes is one of the priorities for ensuring state and public security in the National Security Strategy of the Russian Federation. The growth of radioactive waste is a hazard to human health and the environment. The state needs a unified regulation of the radioactive waste management policy and prevention of radioactive disasters.


2022 ◽  
pp. 512-525

This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs. The typical targets of cyberattacks are then considered, followed by a discussion about how to prevent cybercrime. The chapter next reviews digital security indicators that can provide valuable information about cybercrime and cyberattacks. After this, the chapter discusses cyberwar, which involves cyberattacks not just used against individuals and companies, but against entire states. The chapter concludes by advancing a digital security strategy that can be used in the 21st century.


2021 ◽  
Vol 10 (2) ◽  
pp. 37-50
Author(s):  
Andreea DRAGOMIR

The article aims to highlight issues related to the risks to both the European Union and the Member States, but at the same time seeks to highlight current legislative and political approaches applicable in cyberspace. This set of tools used in cyber diplomacy includes the concepts of cooperation and diplomatic dialogue (common cyber network of EU states, common cyber defense unit) but also measures to prevent cyber-attacks (European Union Cyber Security Strategy), as well as sanctions. Throughout this presentation, the main idea is supported by the cross-border nature of cyberspace.


Author(s):  
Mihai Christopher Marian Radovici

The EU seeks to affirm itself as a major actor within the realm of international relations, trying to promote key democratic values throughout its network of diplomatic missions. Thus, EU’s foreign and internal policies are constructed as to commonly represent member states in global issues as a well-defined political entity of its own. It is through these lenses that we can observe the ways in which EU’s efforts, to remain a major global actor, are diminished because the entity lacks the force (self-reliant army) through which it could efficiently represent its military interests. The only military might, at EU’s disposal, being member state’s own troops, which can be deployed in emergency-related situations through the common security policy. As such, there are some foreign and defence ministers from the community block which are demanding, after the Afghanistan chaotic developments, an increased military independence for both the EU and its intervention forces. On a similar tone, Josep Borrell Fontelles, the High Representative of the Union for Foreign Affairs and Security Policy, believes that it is the right time for EU to form its own military corps. Furthermore, overseeing the emerging security contexts, to which NATO responded by engaging into an ample transformation and adaptation process, we can underline some key developments, which showcase the need to revaluate EU’s military efforts, especially in terms of using its capabilities and capacities as a primordial source of credibility. As citizens’ security remains one of Brussels’ main objectives, and one of the primordial European institutions’ responsibilities, they have put forward and accepted, almost two decades ago, the European Security Strategy, which has established, for the first time, tangible goals, and objectives when it comes to protecting EU’s interests in terms of security and defence. It is this document which transforms the current approach across the continent, and its analysis can prove a starting ground for punctual optimizations to take place, to gain resilience in the face of alternative or emerging threats and risks.


Author(s):  
MAZARAKI Anatolii ◽  
MELNYK Tetiana

The article analyses theoretical and conceptual approaches to define the essence of economic security.The global economic transformations are characterized in the context of the impact on the national economic security. Indicators of all economic security com­ponents are analyzed by comparing them in dynamics with the critical level and proposals for the implementation of economic policy measures which are provided to secure Ukrai­nian economic policy.


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 44
Author(s):  
Leiting Tao ◽  
Xiaofeng Wang ◽  
Yuan Liu ◽  
Jie Wu

Cyber-physical systems (CPSs) based on space-ground integrated networks (SGINs) enable CPSs to break through geographical restrictions in space. Therefore, providing a test platform is necessary for new technical verification and network security strategy evaluations of SGINs. User behavior emulation technology can effectively support the construction of a test platform. Given the inherent dynamic changes, diverse behaviors, and large-scale characteristics of SGIN users, we propose user behavior emulation technology based on a cloud platform. First, the dynamic emulation architecture for user behavior for SGINs is designed. Then, normal user behavior emulation strategy driven by the group user behavior model in real time is proposed, which can improve the fidelity of emulation. Moreover, rogue user behavior emulation technology is adopted, based on traffic replay, to perform the security evaluation. Specifically, virtual Internet Protocol (IP) technology and the epoll model are effectively integrated in this investigation to resolve the contradiction between large-scale emulation and computational overhead. The experimental results demonstrate that the strategy meets the requirement of a diverse and high-fidelity dynamic user behavior emulation and reaches the emulation scale of 100,000-level concurrent communication for normal users and 100,000-level concurrent attacks for rogue users.


2021 ◽  
pp. 166-181
Author(s):  
R. Chernysh ◽  
L. Osichnyuk

The article examines the possibility of restricting the right to freedom of speech in order to protect the national interests of the state. An analysis of normative legal acts prohibiting the dissemination of destructive information, such as calls for a violent change in the constitutional order of Ukraine, the outbreak of aggressive war, incitement to national, racial or religious hatred, etc. The right to freedom of expression is not absolute and may be limited. The article substantiates the criteria for state intervention in the information sphere, which allow limiting the dissemination of destructive information and preserving democratic values. Such criteria include the legality of the procedure, the legality of the purpose and the minimum amount of intervention. The article considers the existing mechanisms in Ukraine to respond to harmful informational influences. The law provides for liability for disseminating false information at several levels: civil, administrative and criminal. At the same time, these mechanisms are insufficient, as the concepts of «misinformation», «fake», etc. are not normatively defined. The article describes the state policy to combat destructive information influence. The bases of activity of state bodies created for the purpose of counteraction to dissemination of misinformation and propaganda are considered, namely the Center of counteraction of misinformation at Council of National Security and Defense of Ukraine and the Center of Strategic Communications and Information Security at the Ministry of Culture and Information Policy. The strategies of the state on counteraction to harmful information influence are analyzed. The Doctrine of Information Security of Ukraine is considered, which clarifies the basics of the state information policy in the direction of counteracting the destructive information influence of the Russian Federation in the conditions of the hybrid war unleashed by it. The main provisions of the Information Security Strategy, which defines the general principles of information security, are also considered. The strategies of the state on counteraction to harmful information influence are analyzed. The Doctrine of Information Security of Ukraine is considered, which clarifies the basics of the state information policy in the direction of counteracting the destructive information influence of the Russian Federation in the conditions of the hybrid war unleashed by it. The main provisions of the Information Security Strategy, which defines the general principles of information security, are also considered.


2021 ◽  
Vol 17 (6) ◽  
pp. 3-12
Author(s):  
O. KALINICHENKO ◽  
V. LESYUK

Introduction. In the context of the development of globalization processes and the integration of the national economy into the global financial space, the issue of forming the financial security of Ukraine becomes increasingly important. It affects and links together all sectors of the national economy, business entities, society, politics, finance, etc.Problem Statement. At the present stage of Ukraine's economic development, one of the primary task of government policy is to ensure the financial security of the state, after all, its ensuring aims at overcoming the economic crisis and improving the well-being of Ukrainian citizens.Purpose. The assessment of the financial, monetary, and banking systems of Ukraine as well as the development of practically significant proposals are necessary for ensuring the financial security of Ukraine.Materials and Methods. The analytical material is the data of the National Bank of Ukraine, which have been studied by economic and mathematical methods, statistical and indicative analysis.Results. It has been determined that the state budget imbalance is the main destabilizing factor of the crisis in public finance. The dynamics of the number of banks in Ukraine have been studied: despite a decrease in the number of banks with foreign capital, their share in recent years has increased significantly, which hinders theeffective development of the banking system of Ukraine. A significant underestimation of the domestic currency and large-scale devaluations in the previous years created unfavorable conditions for Ukrainian exporters, which resulted in a foreign trade balance deficit, an outflow of foreign currency and, accordingly, a decrease in theforeign exchange reserves.Conclusions. The financial security strategy should determine the prospects for ensuring the stability of the financial, monetary, and banking systems and the development of the national economy. The implementation of financial, currency, credit measures, the adoption of amendments to the legislative framework, and the development of a financial security strategy for Ukraine become increasingly important, given the problems that exacerbate the financial security of Ukraine.


Sign in / Sign up

Export Citation Format

Share Document