security components
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 29)

H-INDEX

5
(FIVE YEARS 1)

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8451
Author(s):  
Dmitry Levshun ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is based on the methodology, is modular and extensible, takes into account the security of the physical layer of the system, works with the abstract system representation and is looking for a trade-off between the security of the final solution and the resources expended on it. Moreover, unlike existing solutions, the methodology has a strong focus on security. It is aimed at ensuring the protection of the system against attacks at the design stage, considers security components as an integral part of the system and checks if the system can be designed in accordance with given requirements and limitations. An experimental evaluation of the methodology was conducted with help of its software implementation that consists of Python script, PostgreSQL database, Tkinter interface and available for download on our GitHub. As a use case, the system of mobile robots for perimeter monitoring was chosen. During the experimental evaluation, the design time was measured depending on the parameters of the attacker against which system security must be ensured. Moreover, the software implementation of the methodology was analyzed in compliance with requirements and compared with analogues. The advantages and disadvantages of the methodology as well as future work directions are indicated.


2021 ◽  
Author(s):  
Carlos Natalino ◽  
Carlos Manso ◽  
Ricard Vilalta ◽  
Paolo Monti ◽  
Raul Munoz ◽  
...  

Author(s):  
Leila Shokrizadeh Arani

In an objective sense, security measures the absence of threats to acquired values, whereas, in a subjective sense, it refers to the absence of fear that such values will be attacked. Bioterrorism is a threat. Therefore, any threat to the country's vital goals and security components, such as population, land, and property, is a national security threat. Establishing a robust information system is critical for detecting Bioterrorism outbreak, which is considered a threat to national security. Real-time surveillance and monitoring, fast communication, data collection, and analysis at the regional and national level are the main functions of this information system. Early detection of bioterrorism is an important step in national security promotion. If the BIS is appropriately designed based on critical factors such as multidimensional, real-time, manage by the security agency, and have the capability for pattern recognition and detection, it will more effectively manage bioterrorism attacks by relying on its capabilities, features, and technologies. Therefore, this study investigates the features and capabilities of the Bioterrorism Information System (BIS) in national security improvement and promotion.


Author(s):  
Leila Shokrizadeh Arani

In an objective sense, security measures the absence of threats to acquired values, whereas, in a subjective sense, it refers to the absence of fear that such values will be attacked. Bioterrorism is a threat. Therefore, any threat to the country's vital goals and security components, such as population, land, and property, is a national security threat. Establishing a robust information system is critical for detecting Bioterrorism outbreak, which is considered a threat to national security. Real-time surveillance and monitoring, fast communication, data collection, and analysis at the regional and national level are the main functions of this information system. Early detection of bioterrorism is an important step in national security promotion. If the BIS is appropriately designed based on critical factors such as multidimensional, real-time, manage by the security agency, and have the capability for pattern recognition and detection, it will more effectively manage bioterrorism attacks by relying on its capabilities, features, and technologies. Therefore, this study investigates the features and capabilities of the Bioterrorism Information System (BIS) in national security improvement and promotion.


Author(s):  
Evgeny M. Buchwald

The adoption in 2014 of the Federal law No. 172 “On strategic planning…” not only fully returned the concept of “planning” to the legal and institutional “field” of the system of state and municipal administration, but also outlined the need to establish long-term priorities and goals for such planning. It is also important that the law directly linked the goal setting of socio-economic strategy-making with ensuring the requirements of national and economic security of the country. Strategies and other security documents were developed before the adoption of Federal law No. 172. But only this legislative act has established security strategies as an integral element of strategic planning practices and confirmed their role as one of the key sources of goal setting for strategic planning documents. However, it appeared not possible to implement such setting in real management practice in complete and consistent way. Although formally Federal law No. 172 is saturated with a variety of references to security requirements, in reality it’s almost impossible to determine what national and economic security requirements are meant in each particular case and to what extent they are practically implemented in a particular strategic planning document. There is a situation, in which references to national security requirements have become an excessive and even burdensome attribute of strategic planning practice. The reasons for such a situation, however, cannot be attributed only to the miscalculations of Federal law No. 172 and current law enforcement practice. Rather we should talk about the obsolescence of Federal law No. 390 “On security” and, of course, the problematic content of the two current federal documents on security. These documents, although they are known as “strategies”, can hardly be considered as such type documents and even more, they can hardly be actually accepted as a source of goal setting for other strategic planning documents. Meanwhile, security components are not an encumbrance and not an alternative to the main documents of strategic planning. The article proves that it’s important to define more concrete security components and the mechanisms of their realization in such a way so that their role should be not less and not more than it’s really necessary for systematic goal setting in the framework of strategic planning. The purpose of this article is to identify the conditions under which security strategies would overcome their current formal status and could be actively integrated into the practice of strategic planning as one of the main sources of goal setting.


Author(s):  
Al'bina Sokolova ◽  
Ilia Chernyshov

the article examines the key features and problems of economic safety of labor in the conditions of remote work format. The need to develop measures to protect the labor and socio-economic rights of users in the digital space is shown. Classification of security components is presented, functional components and structural elements of economic security are analyzed.


Sign in / Sign up

Export Citation Format

Share Document