Search Results

1 - 10 of 67 items :

  • "cyber-security" x
Clear All
Cyber Security and Tourism Competitiveness

) (Eds.). Safety and Security in Tourism: Relationships, Management, and Marketing, New York and London: Routledge [6] ISDR (2004). Living with risk. A global review of disaster reduction initiatives, Geneva: United Nations [7] Kasperskylab (2012), Malware attacks, in blog.kaspersky.lab [8] Magliulo, A. (2013). A Model for the Sustainable Competitiveness of Tourism Destinations. European Journal of Tourism, Hospitality and Recreation, 2, pp. 7-26 [9] Magliulo, A. & Wright A.C. (2014). Cyber Security in Tourism: The Role of Awareness. In M. Sitek

Open access
National Cyber Security as the Cornerstone of National Security

REFERENCES European Network and Information Security Agency (ENISA). (2012). National Cyber Security Strategies Practical Guide on Development and Execution, available at: https://www.enisa.europa.eu/publications/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport , accessed on: 29 May 2018. European Network and Information Security Agency (ENISA). (2016). NCSS Good Practice Guide Designing and Implementing National Cyber Security Strategies, available at: https

Open access
Comparative Analysis of Curricula for Bachelor’s Degree in Cyber Security in the USA and Ukraine

REFERENCES 1. Chabrow, E. (2015). Cyber security as a Campaign Issue. Retrieved from http://www.govinfosecurity . 2. DHS. (2012). Task Force on Cyber Skills. Cyber Skills Task Force Report. D.o.H. Security. Washington, DC, 1–41. 3. Diorditsa, I. (2017). Kvalifikatsiyni vymogy do kompetentsiy fakhivtsiv z kiberbezpeky. Informatsiyne pravo , 2, 215–219. 4. Dubov, D. (2010). Kiberbezpekova polityka u konteksti transformatsii polityky bezpekt USA administratsyi B. Obamy. Politychnyi Management, 1, 155–163. 5. Franscella, J. (2013

Open access
Cyber Security

; European Union. [4] Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Technologies [5] Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw018 [6] Hua, J., & Bapna, S. (2013). The economic

Open access
Challenges and Aspects of Cyber Security of the Republic of Croatia

Abstract

The development of the information and communication technology (ICT), regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04) and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.

Open access
Cyber Security Policy and Strategy in the European Union and Nato

References European Commission. (2010). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: A Digital Agenda for Europe, available at: http://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:52010DC0245R(01)&from=EN, accessed on: 20 February 2018. European Commission. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, available at: https://eeas.europa.eu/archives/docs/policies/eu-cyber-security

Open access
Data and Cyber Security in Autonomous Vehicle Networks

Abstract

An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.

Open access
IoT and EU Law – E-Human Security

Abstract

The new realities brought on us by the growing usage of IoT devices should be paralleled by new sets of paradigms and regulations, in order to not only accomplish the raise in the living standards of people but also to increase their level of human security. The IoT devices, as well as, in whole, the virtually completely internet connected society we live in today, need strong and clear rules and regulations, need laws that can help maintain and improve the cyber-security level. While being able to electronically track one’s children, by a multitude of IoT and other electronic devices, it is a great and useful feature we have to take into account that the same information, now shared over the internet, might also get into the wrong hands and lead to unpleasant or even dangerous situations.

Open access
Prevention of Ransomware Attacks by Increasing Security Awareness

Abstract

There is a strong relationship between groups of users who don’t use anti-virus and those who don’t backup their data, meaning that a similar proportion of users don't use either of these two means of protection. In case of users who lack knowledge in informatics there is an increase in the number of virus attacks; these users are more likely to not use anti-virus and neglect to back up their data. For digital systems, users who are – based on our classification – in a lower rank, represent increased risk based on the number of the occurred virus attacks. For every user group there is a need for continuous and repeated safety awareness training to reach and retain a high safety level/

Open access
The Role and Importance of the OSCE and the V4 in Cybersecurity

Abstract

From the mid-2000s on, new types of security challenges have emerged at a global level. Their prevention, management and recovery, given their characteristics, is a serious challenge for the countries. Cybersecurity challenges require special attention and close interaction both at national and international level. In this paper the author presents the highlights of OSCE and V4 cooperation on cyber defence.

Open access