Search Results

You are looking at 1 - 5 of 5 items for

  • Author: Artur Szleszyński x
Clear All Modify Search
Open access

Artur Szleszyński

Abstract

The thesis shows the use of message hash function for integrity attribute change identification in sensitive information asset. Changes introduced to file content may suggest confidentiality attribute violation. It has been verified in what way random changes introduced into file content affect function. The minor number of bytes changed in comparison to file size that was assumed, derives from potential benefits for the attacker. Large number of changes in the file may suggest the situation of encrypting it. Such an action leads to accessibility attribute violation

Open access

Ireneusz Jóźwiak and Artur Szleszyński

Use of the Utility Tree Technique in Process of Treats Analysis for Information Security in Information and Communication Systems

This paper describes a technique of utility tree, which can be used in process of risk analysis for information security in information and communication systems. The technique uses connections between vulnerabilities of a system's element, a frequency of an event incidence (which exploits the vulnerability) and its the importance of such events for information security. It also describes and evaluates the influence of an event on information and communication system. The technique uses a qualitative risks assessment, which makes it simple in use.

Open access

Artur Szleszyński

Abstract

The work presents the proposition of inference system that evaluates the possibility of information confidentiality attribute violation. Crisp and fuzzy variables have been defined. Values of output variables from fuzzy logic system have been presented. The way of counting the modified value of information confidentiality attribute has been described.

Open access

Ireneusz Jóźwiak, Wojciech Laskowski and Artur Szleszyński

Safety of Corporation Electronic Mail Servers

The article describes potential threats for safety of corporation electronic mail servers. Electronic mail servers deliver the corporation the environment to communication with business partners, customers and employees. The unsolicited bulk mail, also known as a spam, can be the cause of improper work of the firm electronic mail system. The spam is one of channel to transmission of the malicious code, which can be used to attack on the corporation local area network. The publication describes potential threats for information security, which is transmitted through the mail servers. The article analyze some methods of reducing the risk of spam strike.

Open access

Ireneusz J. Jóźwiak and Artur Szleszyński

Abstract

In a paper an application of the architecture evaluation method used for prediction the effects of incidents for information security which is inside of Information and Communication Technology (ICT) system is described. As a base, the ATAM method is taken. During the analysis there is shown, that direct use of the ATAM technique is impossible, because it use only one set of data. Use just one view of ICT system is not adequate for measure the influence of incident on information security, which is inside ICT system. A tool which is useful for assessment effects of incidents, is an incidence matrix that presents logical connections between elements of ICT system. Knowledge of logical connections and structures of the messages being exchanged enables an assessment of operation the elements which receive modified messages.