Search Results

1 - 10 of 25 items :

  • "IT security" x
Clear All
It Security System Development for State Institution

систем. - Феникс, 2008. - 173 p. Miķelsons U. Informācijas tehnologiju noziegumu izmeklēšanas īpatnības: Monogrāfija. - Rīga: Biznesa augstskola Turība, 2003. - 387 p. ISO/IEC 27002:2005. Information Technology - Security Techniques - Code of Practice for Information Security Management. ISO/IEC, 2005(E). - 125 p. Игнатьев, В. А. Информационная безопасность современного коммерческого предприятия. - Старый Оскол: ТНТ, 2005. - 448 стр. McCarthy L. IT Security: Risking

Open access
The Principles of Classified Information Protection Handled in Communication and Information Systems Within the Realisation of European Defence Agency Research Projects

Abstract

The article presents the aspects of Communication and Information Systems security principles for classified Information Security Management System implemented within the realization of European Defence Agency research and technology projects. In the content of article, author characterised the rules and procedures, resulting from the legal acts, which regulates IT security procedures of classified information processing, obtained during the realisation of research process. Special attention has been focused on the European Defence Agency projects during which common IT security procedures are very important to provide not only the proper level of secrecy but also to ensure confidentiality, integrity and availability of all information processed during the research process.

Open access
Building an Intrusion Detection System for IT Security Based on Data Mining Techniques

Building an Intrusion Detection System for IT Security Based on Data Mining Techniques

This paper aims to research various data mining techniques applied to solve intrusion detection problems. In general, intrusion detection techniques can be divided into two major categories: misuse detection and anomaly detection. Taking into consideration effectiveness of the anomaly detection technique not only against known types of attacks (like misuse detection does by exploiting signature database) but also against new ones, it has become a topical issue in majority of data and computer security researches.

The techniques discussed in the paper include the Hidden Markov Model (HMM) method for modelling and evaluating invisible events based on system calls, further development of Stephanie Forrest's idea of the fixed-length audit trail patterns, the principle component analysis based method for anomaly intrusion detection with less computation efforts, algorithm based on k-nearest neighbour method, as well as applying association rule algorithm to audit data.

Open access
Pension Payment as A Critical Infrastructure

Abstract

Today, the state, its organizations and its citizens have become vulnerable to the complexity of complex electronic information systems in the cyberspace of Hungary, without which state operations and the provision and use of different services become unworkable. In addition to the modern economic system, society is not prepared to operate without lost infrastructure, assets or services, so they must clearly be protected especially because the information used and generated in their operation and the data managed represent significant assets.

Open access
Information Security Aspect of Operational Risk Management

Information Security Aspect of Operational Risk Management

Improving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management

Open access
Use of the Utility Tree Technique in Process of Treats Analysis for Information Security in Information and Communication Systems

References Białas A.: Bezpieczeństwo informacji i usług we współczesnej firmie i instytucji , WNT, Warszawa 2006. Hayakin S.: Systemy telekomunikacyjne t.1 , Wydawnictwa Komunikacji i Łączności, Warszawa 2004. International Standard ISO/IEC TR 13335-1 Information technology - guidelines for management of IT security - Part 1: Concept and models for IT security - International Standard Organization, Geneva 1996. International Standard ISO/IEC 15408

Open access
Vulnerability Analysis of A Smart Heating System

Abstract

The opportunities offered by the smart city and the smart home to create livelier cities and homes in cities of increasing populations. [1] Meanwhile, there may be more problems which the average user does not yet think about. Focusing on these issues will be of utmost importance for information security and IT security, as the development of technology may not be able to keep up with a society such technologies are used in. On a theoretical and practical level, I examine an intelligent heating system for IT vulnerability, as well as some cases of attacks against IoT in recent years.

Open access
Quality and Dynamic Characteristics of Control System Visualization in Control Web

References BÍLÝ, R. 1999. Control Web 2000 . Praha: Computer Press, 1999. ŠIMON, M. IT security in process control systems. In Infokommunikacionnye technologii v nauke, proizvodstve i obrazovanii: tretja meždunarodnaja naučno-trechničeskaja konferencija . Časť I. - Stavropoľ: Severo-Kavkazskij Gosudarstvennyj Techničeskij Universitet, 2008, pp. 94-100. ISBN UDK 004 (06) TRNKA, A. 2010. Six Sigma Methodology with Fraud Detection. In Advances in Data Networks, Communications

Open access
Adaptive predictions of the euro/złoty currency exchange rate using state space wavelet networks and forecast combinations

Abstract

The paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day-ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space wavelet network model is, in contrast to econometric forecast combinations, a non-parametric prediction technique which does not make any distributional assumptions regarding the underlying input variables. Both methods can be used as forecasting tools in portfolio investment management, asset valuation, IT security and integrated business risk intelligence in volatile market conditions.

Open access