Search Results

1 - 10 of 14 items :

  • "Security Defenses" x
Clear All

Abstract

The paper deals with the interpretation of public opinion polls in the Czech Republic related to security, defence and armed forces. In recent years, we can observe concern about the security situation development in the relatively close vicinity of the Czech Republic. In particular, information regarding the activities of the so-called Islamic State, the conflict in Ukraine and media presentation of recent terrorist attacks, as well as the dominant securitization of migration, have a major impact on the public opinion and the level of support for specific steps of the government in the field of security and defence policy. In the surveys, we can trace not only the growing public concern, but also the increasing support for higher defence spending and possible reintroduction of some form of compulsory military service. Special attention is paid to the public perception of the armed forces and the interpretation of the latest public opinion polls at the turn of 2016/2017. The growing support for the military and the increasing willingness of the public to engage in the Active Reserve System are positive factors that can be used to meet the recruiting goals of the Czech Armed Forces.

Abstract

We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches. We describe what requirements are met by existing security technologies and propose future research directions to thwart data breaches.

Abstract

Human factors remained unexplored and underappreciated in information security. The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors, in fact, 95% of all cyber incidents are human-enabled. Research indicates that existing information security plans do not account for human factors in risk management or auditing. Corporate executives, managers, and cybersecurity professionals rely extensively on technology to avert cybersecurity incidents. Managers fallaciously believe that technology is the key to improving security defenses even though research indicates that new technologies create unintended consequences; nonetheless, technological induced errors are human-enabled. Managers’ current perspective on the human factors problem information security is too narrow in scope and more than a training problem. The management of complex cybersecurity operations accompanied by mounting human factor challenges exceeds the expertise of most information security professionals; yet, managers are reluctant to seek the expertise of human factors specialists, cognitive scientists, and behavioral analysts to implement effective strategies and objectives to reduce human-enabled error in information security.

Abstract

Processes and problems of the creation of networking society and network-based economy are described in this theoretical article. Networking processes and the network-based new development tendencies in various sectors of economy and social life in the context of contemporary global changes are defined as an especially important field of the scientific research and studies. The main aspects of the networking and network-based development tendencies are analysed. The complexity and systematics of the networking processes and the networking society creation under conditions of globalisation and contemporary changes in various areas of social and economic life are analysed. The main attention is focused on the idea that networking processes and the creation of networking society and network-based economy could be perceived as one of the most important priorities of the modernisation of contemporary social and economic systems, as well as of social, economic, political development, science, and technological progress in general. The creation of networking society and network-based economy is assessed as the most important assumption and the main way to solve most of the social, economic, technological, even security, defence and ecological problems worldwide, as well as in various countries or regions in general and in various countries or regions in the space of the European Union. The processes of the creation of networking society and network-based economy express the essential qualitative changes in all areas of social, economic, political life, science, and technological progress, and interaction with nature. The processes of the creation of networking society and network-based economy deeply influence the content of globalisation and internationalisation processes and the effect on a situation in the modern world. The processes of the creation of networking society and network-based economy must be analysed in complexity. This analysis should be orientated towards the systematically examined and assessed changes and development processes. It is particularly important that the processes of the creation of networking society and networkbased economy are taking place on a global scale and could be defined as the processes belonging to the category of global processes and changes: it also means that the complex interaction between the processes of global changes and the processes of the creation of networking society and network-based economy is a very important factor of the positive development in the societal life in the general context of globalisation. Problem is that the networking society and the network-based economy creation processes and other processes of global changes are usually analysed separately: the factor of the complex interaction between different global processes and the processes of the creation of networking society and network-based economy is often ignored. It means, that a complex analysis of the processes of various types, as well as an evaluation of the factors of interaction between different processes could be defined as a perspective way to solve some actual theoretical and practical problems of the development of contemporary economy and of the creation of networking society and network-based economy in general, especially in the context of globalisation. The complex analysis and the multidimensional evaluation of the general processes of global changes and of the specific processes of networking society and the network-based economy creation as a perspective theoretical approach in research on societal changes in the context of globalisation is defined and described in this theoretical article. The variety and the main phenomena and regularities of the global changes are identified, their impact on real processes of networking society and network-based economy creation is characterised. The main principles of the networking society and the network-based economy creation in the context of global changes are formulated . The main idea of the complex analysis and of the evaluation of the factors of interaction between different processes of global changes and the processes of networking society and network-based economy creation could be briefly described as follows: the complex analysis and evaluation of these factors includes two aspects - first, all these processes should be defined and analysed as the global changes in general, secondly, the processes of the creation of networking society and networks based economy should be identified as an specific and especially important priority of contemporary social, economic, organizational and technological changes in the global space. This idea is described in details in the article.

Bălcescu”, Sibiu, 2016. [10] https://www.paconsulting.com/insights/developing-an-effective-cyber-security-strategy/ . [11] https://www.nato.int/cps/en/natohq/topics_78170.htm , accessed on 23.02.2020. [12] Science and Technology Committee (STC), NATO in the cyber age: strengthening security & defence, stabilising deterrence , 087 STC 19 E, Draft General Report, 18 April 2019, p. 1, retrieved from https://www.nato-pa.int/document/2019-nato-cyber-age-strenghtening-security-and-defence-stabilising-deterrence , accessed on 21.02.2020. [13] Science and Technology

Reality?. World Politics, 26(1), 1-27. Stringer, K. D. (2008). Energy security: applying a portfolio approach. Baltic security & defence review, 10(1), 121-142. Wigand, F. (2013, March). GG2022 - Connecting Systems: EU’s Internal Energy Market and Future Cooperation with MENA. Global Policy Journal , s. 44. Retrieved August 6, 2018, from https://www.globalpolicyjournal.com/blog/13/03/2013/gg2022-connecting-systems-eu%E2%80%99s-internalenergy-market-and-future-cooperation-mena Yergin, D., & Hillenbrand, M. (1982). Global insecurity: a strategy for energy and economic

University Press. Värk, R. 2013. The Legal Framework of the Use of Armed Force Revisited. Baltic Security & Defence Review, 15, 39. Naval War College (1918). International Law Documents 1917: Neutrality, Breaking of Diplomatic Relations, War , Washington, Government Printing Office. Charter of the United Nations , 1 UNTS xvi, adopted 26 June 1945, became effective on 24 October 1945. Covenant of the League of Nations , 225 CTS 188, adopted 28 June 1919, became effective on 10 January 1920. Dalmia Cement Ltd v National Bank of Pakistan , International Chamber of

Distributed Low-Rate Denial of Service Attacks. - The Journal of China Universities of Posts and Telecommunications, Vol. 18, December 2011, No 2, 113-118. 5. Chonka, A., Yang Xiang, Wanlei Zhou, Alessio Bonti. Cloud Security Defense to Protect Cloud Computing Against HTTP-DoS and XML-DoS Attacks. - Journal of Network and Computer Applications, Vol. 34, July 2011, No 4, 1097-1107. 6. Lombardi, F., R. Di Pietro. Secure Virtualization for Cloud Computing. - Journal of Network and Computer Applications, Vol. 34, July 2011, No 4, 1113-1122. 7. Janczewski, Dr L. J., D. Reamer, J

.” Baltic Security & Defence Review 15 (2013): 144–184. 12. Gazprom. “Annual Report 2011” (2011) // http://www.gazprom.com/f/posts/51/402390/annual-report-2011-eng.pdf . 13. Gnansounou, Edgard. “Assessing the energy vulnerability: Case of industrialized countries.” Energy Policy 36 (2008): 3734–3744 //DOI: http://dx.doi.org/10.1016/j.enpol.2008.07.004 . 14. Grost, Isabel, and Nina Poussenkova. Petroleum Ambassadors of Russia: State versus Corporate Policy in the Caspian Region . Kent: Rice University, 1998. 15. Grigas, Agnia. “Energy Policy: The Achilles Heel of the

and after FY 1996, December 1995 , Ministry of Foreign Affairs of Japan. Retrieved from http://www.mofa.go.jp/policy/security/defense96/capability.html [accessed 25 Sep 2014] MOFA (1996a), Japan-US Joint Declaration on Security: Alliance for the 21st Century, 17 April 1996 , Ministry of Foreign Affairs of Japan. Retrieved from http://www.mofa.go.jp/region/n-america/us/security/security.html [accessed 25 Sep 2014] MOFA (1996b), U.N. Peace-keeping Operations , Tokyo: Ministry of Foreign Affairs of Japan. Retrieved from http://www.mofa.go.jp/policy/un/pamph96/un