首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 知识和态度对采取网络安全行为意愿的影响
Pub Date : 2020-01-01 DOI: 10.11610/isij.4618
Lisa C. de Kok, D. Oosting, M. Spruit
In general, people are poorly protected against cyberthreats, with the main reason being user behaviour. For the study described in this paper, a questionnaire was developed in order to understand how people’s knowledge of and attitude towards both cyberthreats and cyber security controls affect intention to adopt cybersecure behaviour. The study divides attitude into a cognitive and an affective component. Although only the cognitive component of attitude is usually studied, the results from a questionnaire of 300 respondents show that both the affective and cognitive components of attitude have a clearly positive, albeit varying, influence on behavioural intention, with the affective component having an even greater effect on attitude than the cognitive aspect. No correlation was found between knowledge and behavioural intention. The results indicate that attitude is an important factor to include when developing behavioural interventions, but also that different kinds of attitude should be addressed differently in interventions. A R T I C L E I N F O : RECEIVED: 10 MAY 2020 REVISED: 31 JUL 2020 ONLINE: 03 SEP 2020 K E Y W O R D S : information security, cybersecurity awareness, cybersecurity behaviour, cybersecurity questionnaire, cybersecurity knowledge, cybersecurity attitude Creative Commons BY-NC 4.0
一般来说,人们对网络威胁的保护很差,主要原因是用户行为。对于本文中描述的研究,开发了一份问卷,以了解人们对网络威胁和网络安全控制的知识和态度如何影响采用网络安全行为的意愿。该研究将态度分为认知和情感两部分。虽然通常只研究态度的认知成分,但对300名受访者的问卷调查结果表明,态度的情感和认知成分对行为意图都有明显的积极影响,尽管有所不同,其中情感成分对态度的影响甚至比认知方面更大。知识和行为意图之间没有相关性。结果表明,态度是制定行为干预措施时要考虑的一个重要因素,但在干预措施中,不同类型的态度应得到不同的处理。A R T I C C L EI N F O:收稿日期:2020年5月10日修稿日期:2020年7月31日在线日期:2020年9月3日K E E W O R D S:信息安全、网络安全意识、网络安全行为、网络安全问卷、网络安全知识、网络安全态度创作共用BY-NC 4.0
{"title":"The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour","authors":"Lisa C. de Kok, D. Oosting, M. Spruit","doi":"10.11610/isij.4618","DOIUrl":"https://doi.org/10.11610/isij.4618","url":null,"abstract":"In general, people are poorly protected against cyberthreats, with the main reason being user behaviour. For the study described in this paper, a questionnaire was developed in order to understand how people’s knowledge of and attitude towards both cyberthreats and cyber security controls affect intention to adopt cybersecure behaviour. The study divides attitude into a cognitive and an affective component. Although only the cognitive component of attitude is usually studied, the results from a questionnaire of 300 respondents show that both the affective and cognitive components of attitude have a clearly positive, albeit varying, influence on behavioural intention, with the affective component having an even greater effect on attitude than the cognitive aspect. No correlation was found between knowledge and behavioural intention. The results indicate that attitude is an important factor to include when developing behavioural interventions, but also that different kinds of attitude should be addressed differently in interventions. A R T I C L E I N F O : RECEIVED: 10 MAY 2020 REVISED: 31 JUL 2020 ONLINE: 03 SEP 2020 K E Y W O R D S : information security, cybersecurity awareness, cybersecurity behaviour, cybersecurity questionnaire, cybersecurity knowledge, cybersecurity attitude Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method for the Development of Cyber Security Strategies 网络安全战略的发展方法
Pub Date : 2016-04-03 DOI: 10.11610/ISIJ.3403
A. Klaic
The cyberspace today has become the unavoidable part of today’s society, its virtual dimension. The nations and international community put many efforts to assure certain terms and responsibilities in this virtual dimension of the society. Many national cyber security strategies, including EU and NATO strategies, in a very short time have become high priority activities. The questions about the responsible institutions to address in the strategy, guiding principles to follow, and the way of implementing the strategy, still remains very differently approached within different nations. The goal of this paper is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and that is easier to harmonise with different international requirements. In order to verify the proposed method, the paper shows the brief overview of the results achieved in the case of the development process of Croatian National Cyber Security Strategy.
今天的网络空间已经成为当今社会不可避免的一部分,它的虚拟维度。各国和国际社会作出了许多努力,以确保在社会的这一虚拟方面的某些条件和责任。许多国家的网络安全战略,包括欧盟和北约的战略,在很短的时间内成为高度优先的活动。在战略中要处理的负责任的机构、要遵循的指导原则以及实施战略的方式等问题,在不同的国家仍然有很大的不同。本文的目标是提出一种方法,为网络安全战略的发展提供更一致的方法。关键的研究问题是,拟议的方法是否会产生一个更一致的国家网络安全战略,涵盖所有必要的国家要求和期望,并更容易与不同的国际要求协调一致。为了验证所提出的方法,本文简要概述了克罗地亚国家网络安全战略发展过程中取得的成果。
{"title":"A Method for the Development of Cyber Security Strategies","authors":"A. Klaic","doi":"10.11610/ISIJ.3403","DOIUrl":"https://doi.org/10.11610/ISIJ.3403","url":null,"abstract":"The cyberspace today has become the unavoidable part of today’s society, its virtual dimension. The nations and international community put many efforts to assure certain terms and responsibilities in this virtual dimension of the society. Many national cyber security strategies, including EU and NATO strategies, in a very short time have become high priority activities. The questions about the responsible institutions to address in the strategy, guiding principles to follow, and the way of implementing the strategy, still remains very differently approached within different nations. The goal of this paper is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and that is easier to harmonise with different international requirements. In order to verify the proposed method, the paper shows the brief overview of the results achieved in the case of the development process of Croatian National Cyber Security Strategy.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128402846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C4ISR Architectural Frameworks in Coalition Environments 联盟环境下的C4ISR体系结构框架
Pub Date : 2000-10-01 DOI: 10.11610/ISIJ.0504
Charles R. Myer
Abstract : The break-up of the Soviet Union unleashed a flood of nationalism throughout Southeastern Europe (SEE). Freed from the yoke of suppression, the nations of the region sought economic stability and security in a dramatically changing global environment. These nations are anxious to display Western leanings and to ensure national security through multinational regional coalitions. These coalitions, in turn, are being supported by a variety of national, NATO, and U.S. sponsored initiatives with the common goal of regional stability. Within the regions of the Pacific Rim, similar coalitions may emerge with similar goals to which the principles set forth in this paper will equally apply. The common thread through these SEE initiatives is the use of Information Technology (IT) to improve Command, Control, and Communications (C3) in a combined military/peace support domain. This paper proposes an IT-driven Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) Architectural Framework approach to the integration of combat and peace support forces in regional coalition initiatives. Although the framework is applicable across the total C4ISR domain, only Command, Control, and Communications are relevant to the subject addressed in this paper and will be the term used throughout. Computers are assumed as a logical part of C3. This paper also proposes that this type of architectural approach is applicable to regional coalitions on a global basis.
摘要:苏联解体后,东南欧掀起了一股民族主义浪潮。该地区各国摆脱了压迫的枷锁,在急剧变化的全球环境中寻求经济稳定与安全。这些国家急于显示西方倾向,并通过多国地区联盟确保国家安全。这些联盟反过来也得到了各国、北约和美国发起的各种倡议的支持,这些倡议的共同目标是维护地区稳定。在环太平洋区域内,可能出现具有类似目标的类似联盟,本文件所阐述的原则将同样适用于这些联盟。这些SEE计划的共同主线是利用信息技术(IT)来改善军事/和平支持联合领域的指挥、控制和通信(C3)。本文提出了一种it驱动的指挥、控制、通信、计算机、情报、监视和侦察(C4ISR)架构框架方法,用于在区域联盟计划中整合作战与和平支持部队。尽管该框架适用于整个C4ISR领域,但只有“命令”、“控制”和“通信”与本文讨论的主题相关,并且将成为贯穿始终的术语。计算机被假定为C3的一个逻辑部分。本文还提出,这种类型的架构方法适用于全球基础上的区域联盟。
{"title":"C4ISR Architectural Frameworks in Coalition Environments","authors":"Charles R. Myer","doi":"10.11610/ISIJ.0504","DOIUrl":"https://doi.org/10.11610/ISIJ.0504","url":null,"abstract":"Abstract : The break-up of the Soviet Union unleashed a flood of nationalism throughout Southeastern Europe (SEE). Freed from the yoke of suppression, the nations of the region sought economic stability and security in a dramatically changing global environment. These nations are anxious to display Western leanings and to ensure national security through multinational regional coalitions. These coalitions, in turn, are being supported by a variety of national, NATO, and U.S. sponsored initiatives with the common goal of regional stability. Within the regions of the Pacific Rim, similar coalitions may emerge with similar goals to which the principles set forth in this paper will equally apply. The common thread through these SEE initiatives is the use of Information Technology (IT) to improve Command, Control, and Communications (C3) in a combined military/peace support domain. This paper proposes an IT-driven Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) Architectural Framework approach to the integration of combat and peace support forces in regional coalition initiatives. Although the framework is applicable across the total C4ISR domain, only Command, Control, and Communications are relevant to the subject addressed in this paper and will be the term used throughout. Computers are assumed as a logical part of C3. This paper also proposes that this type of architectural approach is applicable to regional coalitions on a global basis.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models 基于新船舶模型的多模型交互操纵船舶跟踪算法
Pub Date : 2000-03-01 DOI: 10.11610/ISIJ.0211
E. Semerdjiev, L. Mihaylova, T. Semerdjiev, V. Bogdanova
Tracking of manoeuvring targets is a problem of a great practical and theoretical interest. The real-world tracking applications meet a number of difficulties caused by the presence of different kinds of uncertainty due to the unknown or not precisely known system model and random processes’ statistics or because of their abrupt changes. 2-5, 9 These problems are especially complicated in the marine navigation practice, 7, 14, 15, 19 where the commonly used simple models of rectilinear or curvilinear target motions do not match the highly non-linear dynamics of the manoeuvring ship. A solution of these problems is to derive more adequate descriptions of the real ship dynamics and to design adaptive estimation algorithms.
机动目标的跟踪是一个具有重要实际意义和理论意义的问题。由于未知或不精确已知的系统模型和随机过程的统计量或它们的突变,存在各种不确定性,因此在现实世界的跟踪应用中遇到了许多困难。这些问题在海上航行实践中尤其复杂,7,14,15,19,其中通常使用的直线或曲线目标运动的简单模型与操纵船舶的高度非线性动力学不匹配。解决这些问题的方法之一是推导出更充分的真实船舶动力学描述,并设计自适应估计算法。
{"title":"Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models","authors":"E. Semerdjiev, L. Mihaylova, T. Semerdjiev, V. Bogdanova","doi":"10.11610/ISIJ.0211","DOIUrl":"https://doi.org/10.11610/ISIJ.0211","url":null,"abstract":"Tracking of manoeuvring targets is a problem of a great practical and theoretical interest. The real-world tracking applications meet a number of difficulties caused by the presence of different kinds of uncertainty due to the unknown or not precisely known system model and random processes’ statistics or because of their abrupt changes. 2-5, 9 These problems are especially complicated in the marine navigation practice, 7, 14, 15, 19 where the commonly used simple models of rectilinear or curvilinear target motions do not match the highly non-linear dynamics of the manoeuvring ship. A solution of these problems is to derive more adequate descriptions of the real ship dynamics and to design adaptive estimation algorithms.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Bulgaria and NATO: 7 Lost Years 保加利亚和北约:失去的7年
Pub Date : 1998-05-01 DOI: 10.11610/ISIJ.0119
J. Simon
Abstract : Bulgaria's actions and policies on military reform between 1990 and March 1997 left the country's institutions and military largely unprepared for integration with the Alliance. Bulgarian government and military officials have emerged from the state's self-imposed isolation lacking an understanding of how far behind they are, as well as what they need to do, to seek integration. Bulgaria's armed forces are only now starting to reform and downsize. The resultant social and economic pain has yet to be felt, and the state is likely to suffer significant political consequences. Some social and political figures may elect to portray the United States and NATO as the cause of Bulgaria's social, economic, and political pain. Bulgaria's citizens, politicians and military need NATO to better define its standards for interoperability.
摘要:保加利亚在1990年至1997年3月期间关于军事改革的行动和政策使该国的机构和军队在很大程度上没有准备好加入联盟。保加利亚政府和军方官员已经摆脱了国家自我强加的孤立,他们不知道自己落后了多远,也不知道自己需要做些什么来寻求融合。保加利亚的武装部队现在才刚刚开始改革和缩减规模。由此产生的社会和经济痛苦尚未被感受到,而该州可能会遭受重大的政治后果。一些社会和政治人物可能会选择把美国和北约描绘成保加利亚社会、经济和政治痛苦的原因。保加利亚的公民、政治家和军方需要北约更好地定义其互操作性标准。
{"title":"Bulgaria and NATO: 7 Lost Years","authors":"J. Simon","doi":"10.11610/ISIJ.0119","DOIUrl":"https://doi.org/10.11610/ISIJ.0119","url":null,"abstract":"Abstract : Bulgaria's actions and policies on military reform between 1990 and March 1997 left the country's institutions and military largely unprepared for integration with the Alliance. Bulgarian government and military officials have emerged from the state's self-imposed isolation lacking an understanding of how far behind they are, as well as what they need to do, to seek integration. Bulgaria's armed forces are only now starting to reform and downsize. The resultant social and economic pain has yet to be felt, and the state is likely to suffer significant political consequences. Some social and political figures may elect to portray the United States and NATO as the cause of Bulgaria's social, economic, and political pain. Bulgaria's citizens, politicians and military need NATO to better define its standards for interoperability.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Small Step toward Interoperability 迈向互操作性的一小步
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1210
R. J. Roland
Content Focus Never forget, the lowest bidder made your weapons Applying simulations to enhance jointness and to promote national and multi-national cooperation and interoperability. The theory is that this will help lead toward developing a Modeling and Simulation (MS and its' relationship with the National Military Command Center (NMCC) initiative. Caution is extended for the user to exercise due diligence and caveat emptor when selecting systems and system integrators.
别忘了,你的武器是由最低价的竞标者制造的。应用模拟来加强联合,促进国家和多国的合作和互操作性。理论是,这将有助于发展建模和仿真(MS)及其与国家军事指挥中心(NMCC)倡议的关系。在选择系统和系统集成商时,用户应谨慎行事,并谨慎行事。
{"title":"A Small Step toward Interoperability","authors":"R. J. Roland","doi":"10.11610/ISIJ.1210","DOIUrl":"https://doi.org/10.11610/ISIJ.1210","url":null,"abstract":"Content Focus Never forget, the lowest bidder made your weapons Applying simulations to enhance jointness and to promote national and multi-national cooperation and interoperability. The theory is that this will help lead toward developing a Modeling and Simulation (MS and its' relationship with the National Military Command Center (NMCC) initiative. Caution is extended for the user to exercise due diligence and caveat emptor when selecting systems and system integrators.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN EFFICIENT AND PRACTICAL REMOTE USER AUTHENTICATION SCHEME 一个高效实用的远程用户认证方案
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1505
Ya-Fen Chang, Chinchen Chang
In 2000, Peyravian and Zunic proposed a simple and efficient password authentication scheme based on the collision-resistant hash function. Later, Hwang and Yeh indicated that Peyravian and Zunic's scheme is insecure and proposed an improvement by using the server's public key. Nevertheless, in practice, services that do not use public keys are quite often superior to PKIs. At the same time, Lee, Li and Hwang indicated that Peyravian and Zunic's scheme suffers from off-line password guessing attacks and presented an improved version. However, Lee-Li- Hwang's proposed scheme is still vulnerable to the same attacks and denial-of-ser- vice attacks. Therefore, this article presents a secure and efficient improvement.
2000年,Peyravian和Zunic提出了一种基于抗碰撞哈希函数的简单高效的密码认证方案。后来,Hwang和Yeh指出Peyravian和Zunic的方案是不安全的,并提出了使用服务器公钥的改进方案。然而,在实践中,不使用公钥的服务通常优于pki。同时,Lee, Li和Hwang指出Peyravian和Zunic的方案遭受离线密码猜测攻击,并提出了改进版本。然而,Lee-Li- Hwang提出的方案仍然容易受到相同的攻击和拒绝服务攻击。因此本文提出了一种安全高效的改进方案。
{"title":"AN EFFICIENT AND PRACTICAL REMOTE USER AUTHENTICATION SCHEME","authors":"Ya-Fen Chang, Chinchen Chang","doi":"10.11610/ISIJ.1505","DOIUrl":"https://doi.org/10.11610/ISIJ.1505","url":null,"abstract":"In 2000, Peyravian and Zunic proposed a simple and efficient password authentication scheme based on the collision-resistant hash function. Later, Hwang and Yeh indicated that Peyravian and Zunic's scheme is insecure and proposed an improvement by using the server's public key. Nevertheless, in practice, services that do not use public keys are quite often superior to PKIs. At the same time, Lee, Li and Hwang indicated that Peyravian and Zunic's scheme suffers from off-line password guessing attacks and presented an improved version. However, Lee-Li- Hwang's proposed scheme is still vulnerable to the same attacks and denial-of-ser- vice attacks. Therefore, this article presents a secure and efficient improvement.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces 计算机辅助演习——军队常规演习的一种替代方案
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0308
Nikolay Vraikov, A. Naidenov
esigning and building simulation systems is a dynamically developing area, in which, for relatively short time and under definite conditions, good results can be achieved. Our army has gained significant experience in the development and use of various simulation systems. The participation in a great number of seminars, presentations and computer aided exercises gives us the opportunity to analyze the achievements in the area of development and use of simulation systems in the education and training process of the staffs at various levels.
仿真系统的设计与构建是一个动态发展的领域,在一定的条件下,在较短的时间内就能取得较好的效果。我们的军队在开发和使用各种模拟系统方面获得了丰富的经验。参加了大量的研讨会、演讲和计算机辅助练习,使我们有机会分析在各级工作人员的教育和培训过程中开发和使用模拟系统方面的成就。
{"title":"The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces","authors":"Nikolay Vraikov, A. Naidenov","doi":"10.11610/ISIJ.0308","DOIUrl":"https://doi.org/10.11610/ISIJ.0308","url":null,"abstract":"esigning and building simulation systems is a dynamically developing area, in which, for relatively short time and under definite conditions, good results can be achieved. Our army has gained significant experience in the development and use of various simulation systems. The participation in a great number of seminars, presentations and computer aided exercises gives us the opportunity to analyze the achievements in the area of development and use of simulation systems in the education and training process of the staffs at various levels.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chemical and Biological Weapons Terrorism: Forging a Response 化学和生物武器恐怖主义:锻造回应
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1012
I. Monitor
he 11 September 2001 terrorist attacks in the United States changed fundamentally threat perceptions regarding the use of weapons of mass destruction by terrorists. The ability to use such weapons is all the more credible because sophisticated delivery systems are not required to conduct a terrorist attack. As a consequence, governments have reviewed longstanding plans to respond to terrorist incidents and have sought to identify weaknesses and address these where possible.
2001年9月11日发生在美国的恐怖袭击从根本上改变了人们对恐怖分子使用大规模杀伤性武器的威胁看法。使用这种武器的能力更加可信,因为进行恐怖袭击不需要复杂的运载系统。因此,各国政府重新审视了应对恐怖主义事件的长期计划,并试图找出弱点,并在可能的情况下加以解决。
{"title":"Chemical and Biological Weapons Terrorism: Forging a Response","authors":"I. Monitor","doi":"10.11610/ISIJ.1012","DOIUrl":"https://doi.org/10.11610/ISIJ.1012","url":null,"abstract":"he 11 September 2001 terrorist attacks in the United States changed fundamentally threat perceptions regarding the use of weapons of mass destruction by terrorists. The ability to use such weapons is all the more credible because sophisticated delivery systems are not required to conduct a terrorist attack. As a consequence, governments have reviewed longstanding plans to respond to terrorist incidents and have sought to identify weaknesses and address these where possible.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116922370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic Radiation and the Computer Systems Data Security Problem 电磁辐射与计算机系统数据安全问题
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0407
A. Nachev
This problem stems from two basic facts. The first is connected with the physics of the processes taking place in digital electronic equipment. The second is due to the way of representing, processing, and transferring the information. The presence of current pulses in power buses due to the impulse character of the functioning of the digital integrated circuits, the existence of inductive and capacity parasite connections, which cause the emergence of high frequency current, and the impulse character of the currents in connecting cables and interface chains all cause the emergence of parasite electromagnetic emissions, which are transmitted as electromagnetic waves. At the same time, in the cables of the power supply alternating currents are induced in such a way that the power supply circuitry becomes a source of secondary wide band emission.
这个问题源于两个基本事实。第一个与数字电子设备中发生的过程的物理学有关。二是信息的表示、处理和传递方式。由于数字集成电路工作的脉冲特性,电力母线中存在电流脉冲,电感和容量寄生连接的存在导致高频电流的产生,连接电缆和接口链中电流的脉冲特性都导致寄生电磁发射的产生,以电磁波的形式传播。同时,在电源的电缆中,交流电被感应,使电源电路成为二次宽带发射源。
{"title":"Electromagnetic Radiation and the Computer Systems Data Security Problem","authors":"A. Nachev","doi":"10.11610/ISIJ.0407","DOIUrl":"https://doi.org/10.11610/ISIJ.0407","url":null,"abstract":"This problem stems from two basic facts. The first is connected with the physics of the processes taking place in digital electronic equipment. The second is due to the way of representing, processing, and transferring the information. The presence of current pulses in power buses due to the impulse character of the functioning of the digital integrated circuits, the existence of inductive and capacity parasite connections, which cause the emergence of high frequency current, and the impulse character of the currents in connecting cables and interface chains all cause the emergence of parasite electromagnetic emissions, which are transmitted as electromagnetic waves. At the same time, in the cables of the power supply alternating currents are induced in such a way that the power supply circuitry becomes a source of secondary wide band emission.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1