computer systems
Recently Published Documents


TOTAL DOCUMENTS

4382
(FIVE YEARS 493)

H-INDEX

63
(FIVE YEARS 3)

2022 ◽  
pp. 394-413
Author(s):  
Brian S. Grant

This chapter provides a case study where a systematic, organized method of storytelling, presented as the Story-based Learning model, is used to design a series of integrated and engaging activities for cybersecurity training (to protect computer systems and networks) that fosters deliberate practice and improves performance. To address the talent shortage in the global cybersecurity workforce, the client developed a blended curriculum designed to provide practical experience to prospective cybersecurity professionals. A key component of this curriculum was the capstone exercises, activities focused on application of the content introduced in the courseware. Essentially, this is a story of using stories, one of humanity's oldest technologies, to solve the problem of training and cultivating expertise in future cybersecurity personnel. Based on solid prior evidence supporting the use of stories to increase engagement and retention, this case study focuses on detailing the thought process used to reach this set of solutions, as captured by the Story-based Learning model.


2022 ◽  
pp. 39-55
Author(s):  
Gregory B. White ◽  
Natalie Sjelin

With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.


2021 ◽  
Vol 9 (3) ◽  
pp. 031-037
Author(s):  
Godson S Olusanya ◽  
Charles Okunbor ◽  
Oghenetega Avwokuruaye

The internet being a major tool in the globalization of the world has made it possible for human beings to interact, share and access information on a very large scale without distance being a barrier. Computer systems with broad functionalities like the desktop, laptop and smart phone are connected through the internet. But going beyond just connecting computer systems to the internet, the Internet of Things connects devices and objects together and to the internet. The Internet of Things (IoT) is a developing paradigm that makes communication and gathering of data possible between electronic devices, objects and sensors through internet technology, with the aim of improving quality of life. IoT is seen to be a big player in the networking of future devices and the internet but has some challenges that needs to be addressed. This paper through extensive literature review, highlighted the progress made by IoT, its applications in different sectors, the challenges faced by this technology for its full actualization and also its future projections.


Author(s):  
I. Voronko

The article considers the reliability and protection of information of computer systems of transport infrastructure and describes the synthesis and analysis of differential game models and methods of modeling cyberattack processes on the server of computer information and diagnostic systems of the railway power supply distance. A unified differential-game model of the cyberattack process on the multi-task server of the information-diagnostic computer system of the lower level of the railway has been developed, which allows to obtain optimal strategies for information protection in cyberattacks. The results of modeling the cyberattack process are presented, to assess the integrated indicators of server security, using the optimal strategies for each of the functions. The appearance of the unified model of the computer information system is shown, and the graphs of the transient processes of the probability of the server being in a protected state and the probability of server failure for any of the functionalities are given.


Author(s):  
E.V. Pestryakov ◽  

The technical platforms for solving the problems of using artificial intelligence in the field of agriculture are described. Creation of new computing devices that allow storing and processing large amounts of information and software makes it possible to form integrated computer systems to increase maximum productivity.


2021 ◽  
pp. 45-52
Author(s):  
L. B. Ivanov

In this lecture, the state of the practical use of spectral analysis of EEG is analyzed in detail. The author focuses on the reasons for the slow introduction of spectral analysis into everyday practice and identifies ways to overcome this deficiency. The reason for the need to master this useful analysis technique has been substantiated. The algorithm for performing spectral analysis of EEG in practice, both at the stage of processing and at the stage of data interpretation, is presented in detail. In the lecture, the author outlined the features of the options for the spatial organization of the alpha rhythm and their relationship with the characteristics of the human psyche. One of the reasons that hinders the use of EEG spectral analysis in practice is the lag of the software of electroencephalographic computer systems of leading manufacturers from modern requirements of the time.


Author(s):  
Victoriia Ol'hovs'ka
Keyword(s):  

Розглянуто можливості застосування технології інформаційних комп’ютерних систем у різновидах прикладів та задач навчання студентів. Проведено та проаналізовано: бізнес-процеси обраної предметної області, визначення бізнес-функцій та бізнес-процесів, постановка задачі. Розроблені вимоги до інформаційної системи, та визначення функціональних вимог до інформаційної системи. Визначені критерії логічного та фізичного моделювання баз даних; розроблено UML моделювання клієнтської частини  інформаційної системи. Проведена розробка вимог до функцій серверної частини та інтерфейсу клієнтської частини інформаційної системи, описані можливості проектних рішень, розроблено інтерфейс клієнтської частини системи, створено базу даних для обраної платформи; розроблені засоби збереження процедур, функції для серверної частини інформаційної системи (ІС) та інтерфейс клієнтської частини ІС. Описане математичне обґрунтування застосованого алгоритму та зроблені необхідні висновки.


Author(s):  
Shruti Sunil Ajankar ◽  
Aditi Rajesh Nimodiya

Cyber Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. So basically it is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. Whenever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on some of the techniques and perspectives on transforming the cyber security. Here we have discussed a new posture for cyber security in a networked world which explains how companies can use organizational structure and governance to enhance cyber security protections.


Sign in / Sign up

Export Citation Format

Share Document