Vladimirs Lajevskis, Pjotrs Dorogovs and Andrejs Romanovs
систем. - Феникс, 2008. - 173 p.
Miķelsons U. Informācijas tehnologiju noziegumu izmeklēšanas īpatnības: Monogrāfija. - Rīga: Biznesa augstskola Turība, 2003. - 387 p.
ISO/IEC 27002:2005. Information Technology - Security Techniques - Code of Practice for Information Security Management. ISO/IEC, 2005(E). - 125 p.
Игнатьев, В. А. Информационная безопасность современного коммерческого предприятия. - Старый Оскол: ТНТ, 2005. - 448 стр.
McCarthy L. ITSecurity: Risking
The article presents the aspects of Communication and Information Systems security principles for classified Information Security Management System implemented within the realization of European Defence Agency research and technology projects. In the content of article, author characterised the rules and procedures, resulting from the legal acts, which regulates IT security procedures of classified information processing, obtained during the realisation of research process. Special attention has been focused on the European Defence Agency projects during which common IT security procedures are very important to provide not only the proper level of secrecy but also to ensure confidentiality, integrity and availability of all information processed during the research process.
Pjotrs Dorogovs, Arkady Borisov and Andrejs Romanovs
Building an Intrusion Detection System for IT Security Based on Data Mining Techniques
This paper aims to research various data mining techniques applied to solve intrusion detection problems. In general, intrusion detection techniques can be divided into two major categories: misuse detection and anomaly detection. Taking into consideration effectiveness of the anomaly detection technique not only against known types of attacks (like misuse detection does by exploiting signature database) but also against new ones, it has become a topical issue in majority of data and computer security researches.
The techniques discussed in the paper include the Hidden Markov Model (HMM) method for modelling and evaluating invisible events based on system calls, further development of Stephanie Forrest's idea of the fixed-length audit trail patterns, the principle component analysis based method for anomaly intrusion detection with less computation efforts, algorithm based on k-nearest neighbour method, as well as applying association rule algorithm to audit data.
Today, the state, its organizations and its citizens have become vulnerable to the complexity of complex electronic information systems in the cyberspace of Hungary, without which state operations and the provision and use of different services become unworkable. In addition to the modern economic system, society is not prepared to operate without lost infrastructure, assets or services, so they must clearly be protected especially because the information used and generated in their operation and the data managed represent significant assets.
Information Security Aspect of Operational Risk Management
Improving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management
Białas A.: Bezpieczeństwo informacji i usług we współczesnej firmie i instytucji , WNT, Warszawa 2006.
Hayakin S.: Systemy telekomunikacyjne t.1 , Wydawnictwa Komunikacji i Łączności, Warszawa 2004.
International Standard ISO/IEC TR 13335-1 Information technology - guidelines for management of ITsecurity - Part 1: Concept and models for ITsecurity - International Standard Organization, Geneva 1996.
International Standard ISO/IEC 15408
The opportunities offered by the smart city and the smart home to create livelier cities and homes in cities of increasing populations.  Meanwhile, there may be more problems which the average user does not yet think about. Focusing on these issues will be of utmost importance for information security and IT security, as the development of technology may not be able to keep up with a society such technologies are used in. On a theoretical and practical level, I examine an intelligent heating system for IT vulnerability, as well as some cases of attacks against IoT in recent years.
German Michaľčonok, Maximilián Strémy and Andrej Eliáš
BÍLÝ, R. 1999. Control Web 2000 . Praha: Computer Press, 1999.
ŠIMON, M. ITsecurity in process control systems. In Infokommunikacionnye technologii v nauke, proizvodstve i obrazovanii: tretja meždunarodnaja naučno-trechničeskaja konferencija . Časť I. - Stavropoľ: Severo-Kavkazskij Gosudarstvennyj Techničeskij Universitet, 2008, pp. 94-100. ISBN UDK 004 (06)
TRNKA, A. 2010. Six Sigma Methodology with Fraud Detection. In Advances in Data Networks, Communications
Mietek A. Brdyś, Marcin T. Brdyś and Sebastian M. Maciejewski
The paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day-ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space wavelet network model is, in contrast to econometric forecast combinations, a non-parametric prediction technique which does not make any distributional assumptions regarding the underlying input variables. Both methods can be used as forecasting tools in portfolio investment management, asset valuation, IT security and integrated business risk intelligence in volatile market conditions.