首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
Modern Information Technologies and General Public Protection in the Republic of Bulgaria 保加利亚共和国的现代信息技术和一般公共保护
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1004
Svetoslav Andonov, K. Kostadinova, Emil Simeonov
ulgaria is in the process of adapting its system for crisis and emergency management to the requirements of democratic governance, market economy and membership in NATO and the European Union. With the start of the comprehensive defense reform in 1999, the Civil Protection Agency, until that time part of the Ministry of Defense, received the status of a State Agency as a first-level budget holder directly subordinated to the Council of Ministers. Dealing with a variety of natural and man-made disasters, the Agency cooperates with numerous organizations, including the Ministry of Defense, the Ministry of the Interior, local authorities, etc. The Agency has a range of capabilities allowing it to serve as the central national authority in dealing with civil emergencies. With a history of timely and efficient contribution to mitigating the consequences of natural disasters in neighboring countries, it further plays a very active role in promoting emergency management cooperation in South East Europe. 1 After describing the roles of the Agency, this paper presents major developments in implementing advanced information and communications technologies both in national and international setting. The recently signed Agreement on the establishment of the Civil-Military Emergency Planning Council for Southeastern Europe is given in the appendix.
保加利亚正在调整其危机和紧急情况管理制度,以适应民主治理、市场经济以及北约和欧洲联盟成员国的要求。随着1999年全面国防改革的开始,民防厅作为国防部的一部分,作为部长会议直属的一级预算编制机构,获得了国家机关的地位。在处理各种自然灾害和人为灾害时,工程处与许多组织合作,包括国防部、内政部、地方当局等。该机构具有一系列能力,使其能够作为处理民间紧急情况的中央国家当局。它具有及时和有效地为减轻邻国自然灾害后果作出贡献的历史,并在促进东南欧的应急管理合作方面进一步发挥非常积极的作用。1在叙述了该机构的作用之后,本文介绍了在国家和国际环境中实施先进信息和通信技术方面的重大发展。最近签署的关于设立东南欧军民紧急计划委员会的协定载于附录。
{"title":"Modern Information Technologies and General Public Protection in the Republic of Bulgaria","authors":"Svetoslav Andonov, K. Kostadinova, Emil Simeonov","doi":"10.11610/ISIJ.1004","DOIUrl":"https://doi.org/10.11610/ISIJ.1004","url":null,"abstract":"ulgaria is in the process of adapting its system for crisis and emergency management to the requirements of democratic governance, market economy and membership in NATO and the European Union. With the start of the comprehensive defense reform in 1999, the Civil Protection Agency, until that time part of the Ministry of Defense, received the status of a State Agency as a first-level budget holder directly subordinated to the Council of Ministers. Dealing with a variety of natural and man-made disasters, the Agency cooperates with numerous organizations, including the Ministry of Defense, the Ministry of the Interior, local authorities, etc. The Agency has a range of capabilities allowing it to serve as the central national authority in dealing with civil emergencies. With a history of timely and efficient contribution to mitigating the consequences of natural disasters in neighboring countries, it further plays a very active role in promoting emergency management cooperation in South East Europe. 1 After describing the roles of the Agency, this paper presents major developments in implementing advanced information and communications technologies both in national and international setting. The recently signed Agreement on the establishment of the Civil-Military Emergency Planning Council for Southeastern Europe is given in the appendix.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness MonSys:用于监控数字服务可用性、威胁情报和网络弹性态势感知的可扩展平台
Pub Date : 1900-01-01 DOI: 10.11610/isij.4611
George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, G. Zahariev
Today’s digital society implies interconnectivity between the online operations of different sectors of everyday life and economy alike. As a consequence, malicious activities targeted towards a single online service could hurt entire industries and multiple private and public organizations. This interdependence between online services and economic units is an imperative for targeted efforts ensuring the integrity and availability of individual systems and complex systems-of-systems alike. This article presents MonSys, a flexible, robust, and scalable monitoring platform, implemented as a cloud-based service and an onpremise solution, specifically designed to address the need for ensuring service availability at an individual level. MonSys provides several standardized services availability checks, such as web-based services from multiple geographical locations, and a flexible platform and tools for defining customized complex services. Particular attention is paid to the processes of metrics collection, processing, storage, and querying. MonSys can perform custom availability checks for different types of infrastructures, such as various black-box, grey-box, and white-box availability checks/metrics. The article presents also results from piloting the platform on performance and scalability and options for integration in early-warning and intelligent signaling, based on behavioral pattern analysis and predictive simulations. A R T I C L E I N F O : RECEIVED: 7 JULY 2020 REVISED: 31 AUG 2020 ONLINE: 7 SEP 2020 K E Y W O R D S : scalability, cyber threat, vulnerability analysis, cyber risk, resilience, early warning, situational awareness Creative Commons BY-NC 4.0 G. Sharkov et al., ISIJ 46, no. 2 (2020): 155-167
今天的数字社会意味着日常生活和经济的不同部门的在线操作之间的相互联系。因此,针对单个在线服务的恶意活动可能会损害整个行业以及多个私人和公共组织。在线服务和经济单位之间的这种相互依赖关系对于确保单个系统和复杂系统的系统的完整性和可用性的目标努力是必要的。本文介绍了MonSys,这是一个灵活、健壮且可扩展的监控平台,作为基于云的服务和内部部署解决方案实现,专门用于满足确保个人级别的服务可用性的需求。MonSys提供了几种标准化的服务可用性检查,例如来自多个地理位置的基于web的服务,以及用于定义定制复杂服务的灵活平台和工具。特别关注度量标准的收集、处理、存储和查询过程。MonSys可以为不同类型的基础设施执行自定义的可用性检查,例如各种黑盒、灰盒和白盒可用性检查/度量。本文还介绍了基于行为模式分析和预测模拟的平台性能和可扩展性以及早期预警和智能信号集成选项的试验结果。张建军,张建军,张建军,等。网络安全:可扩展性、网络威胁、漏洞分析、弹性、预警、态势感知。知识共享技术,中国信息科学学报,46,no. 7。[2] (2020): 155-167
{"title":"MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness","authors":"George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, G. Zahariev","doi":"10.11610/isij.4611","DOIUrl":"https://doi.org/10.11610/isij.4611","url":null,"abstract":"Today’s digital society implies interconnectivity between the online operations of different sectors of everyday life and economy alike. As a consequence, malicious activities targeted towards a single online service could hurt entire industries and multiple private and public organizations. This interdependence between online services and economic units is an imperative for targeted efforts ensuring the integrity and availability of individual systems and complex systems-of-systems alike. This article presents MonSys, a flexible, robust, and scalable monitoring platform, implemented as a cloud-based service and an onpremise solution, specifically designed to address the need for ensuring service availability at an individual level. MonSys provides several standardized services availability checks, such as web-based services from multiple geographical locations, and a flexible platform and tools for defining customized complex services. Particular attention is paid to the processes of metrics collection, processing, storage, and querying. MonSys can perform custom availability checks for different types of infrastructures, such as various black-box, grey-box, and white-box availability checks/metrics. The article presents also results from piloting the platform on performance and scalability and options for integration in early-warning and intelligent signaling, based on behavioral pattern analysis and predictive simulations. A R T I C L E I N F O : RECEIVED: 7 JULY 2020 REVISED: 31 AUG 2020 ONLINE: 7 SEP 2020 K E Y W O R D S : scalability, cyber threat, vulnerability analysis, cyber risk, resilience, early warning, situational awareness Creative Commons BY-NC 4.0 G. Sharkov et al., ISIJ 46, no. 2 (2020): 155-167","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129642431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Warfare and Security 信息战与安全
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0408
I. Monitor
In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.
近年来,信息战已经引起了政府官员、信息安全专家和好奇的旁观者的注意。这个词被用来涵盖广泛的活动,但尤其是这样一种场景:信息恐怖分子仅仅用键盘和鼠标就侵入了电脑,导致飞机坠毁,发生前所未有的停电,或者食品供应中毒。恐怖分子可能会篡改支持银行和金融的计算机,也许会导致股市崩盘或经济崩溃。这些灾难都没有发生,但令人担忧的是,鉴于青少年可以轻松地在电脑上肆意妄为而不受惩罚——即使是美国国防部运营的电脑。
{"title":"Information Warfare and Security","authors":"I. Monitor","doi":"10.11610/ISIJ.0408","DOIUrl":"https://doi.org/10.11610/ISIJ.0408","url":null,"abstract":"In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks 可信网络倡议:荷兰对DDoS攻击的响应
Pub Date : 1900-01-01 DOI: 10.11610/isij.3202
M. Rademaker, Marc Gauw
Cybercrime is on the rise and distributed denial of services attacks are among the most used by hacktivists, criminals, and even states. This article focuses on a Dutch solution to that problem, namely the Trusted Networks Initiative. The initiative aims at a global trust concept that provides website operators with a last resort option in case a large or long-lasting DDoS attack cannot be mitigated by other anti-DDoS means. The paper describes the foundational principles of the initiative, and more specifically the intended solution via the trusted routing concept.
网络犯罪呈上升趋势,分布式拒绝服务攻击是黑客活动分子、犯罪分子甚至国家最常用的攻击方式之一。本文主要讨论解决该问题的荷兰式解决方案,即可信网络倡议。该倡议旨在建立一种全球信任概念,为网站运营商提供最后的选择,以防大规模或长期的DDoS攻击无法通过其他反DDoS手段减轻。本文描述了主动性的基本原则,更具体地说,通过可信路由概念的预期解决方案。
{"title":"Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks","authors":"M. Rademaker, Marc Gauw","doi":"10.11610/isij.3202","DOIUrl":"https://doi.org/10.11610/isij.3202","url":null,"abstract":"Cybercrime is on the rise and distributed denial of services attacks are among the most used by hacktivists, criminals, and even states. This article focuses on a Dutch solution to that problem, namely the Trusted Networks Initiative. The initiative aims at a global trust concept that provides website operators with a last resort option in case a large or long-lasting DDoS attack cannot be mitigated by other anti-DDoS means. The paper describes the foundational principles of the initiative, and more specifically the intended solution via the trusted routing concept.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains 评估欧盟作为全球行动者和关键基础设施和供应链保护者的职能的交叉影响
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2903
T. Tagarev, Venelin Georgiev, J. Ahokas
The paper presents main results of the analysis of cross impact between two of the ‘big themes’ in the FOCUS project: “EU as a global actor based on the wider Petersberg Tasks” and “Critical infrastructure & supply chain protection.” The cross impact was evaluated by experts from both EU and non-EU countries. For each theme they were asked to estimate significance and interrelation of trends, thus allowing the research team to identify centres of gravity within each theme. Then they estimated the pairwise linkage of trends from the two themes. The study resulted in identification of key linkages among trends, to be further explored in the analysis of respective contexts, mission roles, and security research scenarios. This practical test of the presented model—having relatively limited number of domains and trends—contributes to the transparency and illustrative power of FOCUS methodology and can be expanded in future studies.
本文介绍了FOCUS项目中两个“大主题”之间交叉影响分析的主要结果:“欧盟作为基于更广泛的彼得斯堡任务的全球行动者”和“关键基础设施和供应链保护”。来自欧盟和非欧盟国家的专家对交叉影响进行了评估。对于每个主题,他们被要求估计趋势的重要性和相互关系,从而使研究小组能够确定每个主题的重心。然后,他们估计了这两个主题趋势的两两联系。这项研究查明了各趋势之间的关键联系,并将在分析各自情况、特派团作用和安全研究情景时进一步加以探讨。所提出的模型的实际测试-具有相对有限的领域和趋势-有助于FOCUS方法的透明度和说明性,并且可以在未来的研究中扩展。
{"title":"Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains","authors":"T. Tagarev, Venelin Georgiev, J. Ahokas","doi":"10.11610/ISIJ.2903","DOIUrl":"https://doi.org/10.11610/ISIJ.2903","url":null,"abstract":"The paper presents main results of the analysis of cross impact between two of the ‘big themes’ in the FOCUS project: “EU as a global actor based on the wider Petersberg Tasks” and “Critical infrastructure & supply chain protection.” The cross impact was evaluated by experts from both EU and non-EU countries. For each theme they were asked to estimate significance and interrelation of trends, thus allowing the research team to identify centres of gravity within each theme. Then they estimated the pairwise linkage of trends from the two themes. The study resulted in identification of key linkages among trends, to be further explored in the analysis of respective contexts, mission roles, and security research scenarios. This practical test of the presented model—having relatively limited number of domains and trends—contributes to the transparency and illustrative power of FOCUS methodology and can be expanded in future studies.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 基于网络态势感知概念的农业企业管理信息系统保护
Pub Date : 1900-01-01 DOI: 10.11610/isij.4612
Valentin V. Nekhai, M. Dorosh, Valentin A. Nekhai
There are similarities in information management between military and agricultural systems, e.g. distribution, impact of the environment, mobile agents, and the human factor are functioning in 2and 3-dimensional space. This allows spin-offs in the implementation of the concept of Cyber Situational Awareness (CSA), which is studied intensively in the defence field, but so far has not been applied with the aim to protect agricultural enterprise management systems. The purpose of this study is to substantiate the directions for the implementation of the CSA concept for the protection of corporate networks of agricultural enterprises, with the hypothesis that this will allow effective protection. The methodological basis is formed by the current provisions of the CSA concept, system analysis and synthesis. Results. The stability of communication channels and security is largely determined by the reliability of data transmission in the network, which is ensured by the design of the appropriate network structure. This in turn will provide opportunities to implement the first level of the CSA concept in IT to protect agricultural management systems. A R T I C L E I N F O : RECEIVED: 31 MAY 2020 REVISED: 04 SEP 2020 ONLINE: 18 SEP 2020 K E Y W O R D S : Cyber Situational Awareness, network protection, information system, control system Creative Commons BY-NC 4.0 Using the CSA Concept for Protection of Agricultural Enterprise Management IS
军事系统和农业系统之间的信息管理存在相似之处,例如分布、环境影响、移动代理和人为因素在二维和三维空间中发挥作用。这允许在网络态势感知(CSA)概念的实施中衍生,该概念在国防领域得到了深入研究,但到目前为止还没有应用于保护农业企业管理系统。本研究的目的是实证CSA概念在农业企业企业网络保护中的实施方向,并假设这将允许有效的保护。方法基础是由现行规定的CSA概念、系统分析和综合形成的。结果。通信通道的稳定性和安全性在很大程度上取决于网络中数据传输的可靠性,而数据传输的可靠性是通过设计合适的网络结构来保证的。这反过来将提供机会在IT中实施CSA概念的第一级,以保护农业管理系统。张建军,李建军,李建军,等。接收日期:2020年5月31日修订日期:2020年9月4日在线日期:2020年9月18日张建军:网络态势感知、网络保护、信息系统、控制系统基于CSA概念的知识共享BY-NC 4.0保护农业企业管理信息系统
{"title":"Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems","authors":"Valentin V. Nekhai, M. Dorosh, Valentin A. Nekhai","doi":"10.11610/isij.4612","DOIUrl":"https://doi.org/10.11610/isij.4612","url":null,"abstract":"There are similarities in information management between military and agricultural systems, e.g. distribution, impact of the environment, mobile agents, and the human factor are functioning in 2and 3-dimensional space. This allows spin-offs in the implementation of the concept of Cyber Situational Awareness (CSA), which is studied intensively in the defence field, but so far has not been applied with the aim to protect agricultural enterprise management systems. The purpose of this study is to substantiate the directions for the implementation of the CSA concept for the protection of corporate networks of agricultural enterprises, with the hypothesis that this will allow effective protection. The methodological basis is formed by the current provisions of the CSA concept, system analysis and synthesis. Results. The stability of communication channels and security is largely determined by the reliability of data transmission in the network, which is ensured by the design of the appropriate network structure. This in turn will provide opportunities to implement the first level of the CSA concept in IT to protect agricultural management systems. A R T I C L E I N F O : RECEIVED: 31 MAY 2020 REVISED: 04 SEP 2020 ONLINE: 18 SEP 2020 K E Y W O R D S : Cyber Situational Awareness, network protection, information system, control system Creative Commons BY-NC 4.0 Using the CSA Concept for Protection of Agricultural Enterprise Management IS","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Agent Systems to Support Coalition Forces 支持联军的多智能体系统
Pub Date : 1900-01-01 DOI: 10.11610/isij.0809
Z. Maamar, P. Labbé
{"title":"Multi-Agent Systems to Support Coalition Forces","authors":"Z. Maamar, P. Labbé","doi":"10.11610/isij.0809","DOIUrl":"https://doi.org/10.11610/isij.0809","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security Architecture: An Integrated Approach to Security in the Organization 信息安全架构:组织安全的综合方法
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0409
I. Monitor
In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.
近年来,信息战已经引起了政府官员、信息安全专家和好奇的旁观者的注意。这个词被用来涵盖广泛的活动,但尤其是这样一种场景:信息恐怖分子仅仅用键盘和鼠标就侵入了电脑,导致飞机坠毁,发生前所未有的停电,或者食品供应中毒。恐怖分子可能会篡改支持银行和金融的计算机,也许会导致股市崩盘或经济崩溃。这些灾难都没有发生,但令人担忧的是,鉴于青少年可以轻松地在电脑上肆意妄为而不受惩罚——即使是美国国防部运营的电脑。
{"title":"Information Security Architecture: An Integrated Approach to Security in the Organization","authors":"I. Monitor","doi":"10.11610/ISIJ.0409","DOIUrl":"https://doi.org/10.11610/ISIJ.0409","url":null,"abstract":"In recent years, information warfare has captured the attention of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing stock markets to crash or economies to collapse. None of these disasters has occurred, but the concern is that they, and others like them, could happen, given the ease with which teenagers have been able to romp through computers with impunity--even those operated by the U.S. Department of Defense.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies 参与国防学院和安全研究所和先进信息技术联盟
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0508
Petar Mollov
The participation of Rakovski Defense College in the activities of the Consortium of Defense Academies and Security Studies Institutes creates an opportunity for effective implementation of advanced information technologies in the educational and research activities of the College and promotes the reform in the military education system. It also contributes to the active participation of the Republic of Bulgaria in the "Partnership for Peace" (PfP) program and assists Bulgarian preparation for joining NATO. Knowledge of the purpose, aims, tasks and structure of the Consortium allows Rakovski Defense College, as well as other governmental and non-governmental, military and civil organizations and individuals, working in the sphere of security and defense, to take active and productive part in the process.
拉科夫斯基国防学院参加国防学院和安全研究所联盟的活动,为在学院的教育和研究活动中有效实施先进信息技术创造了机会,并促进了军事教育制度的改革。它还促进保加利亚共和国积极参加“和平伙伴关系”方案,并协助保加利亚准备加入北约组织。了解联合体的宗旨、目标、任务和结构,使拉科夫斯基国防学院以及从事安全和国防领域工作的其他政府和非政府、军事和民间组织和个人能够积极和富有成效地参与这一进程。
{"title":"Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies","authors":"Petar Mollov","doi":"10.11610/ISIJ.0508","DOIUrl":"https://doi.org/10.11610/ISIJ.0508","url":null,"abstract":"The participation of Rakovski Defense College in the activities of the Consortium of Defense Academies and Security Studies Institutes creates an opportunity for effective implementation of advanced information technologies in the educational and research activities of the College and promotes the reform in the military education system. It also contributes to the active participation of the Republic of Bulgaria in the \"Partnership for Peace\" (PfP) program and assists Bulgarian preparation for joining NATO. Knowledge of the purpose, aims, tasks and structure of the Consortium allows Rakovski Defense College, as well as other governmental and non-governmental, military and civil organizations and individuals, working in the sphere of security and defense, to take active and productive part in the process.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality in an Enhanced Command and Control Application 增强现实在增强指挥和控制中的应用
Pub Date : 1900-01-01 DOI: 10.11610/isij.5023
Alexander Kolev, Lilia Pavlova
{"title":"Augmented Reality in an Enhanced Command and Control Application","authors":"Alexander Kolev, Lilia Pavlova","doi":"10.11610/isij.5023","DOIUrl":"https://doi.org/10.11610/isij.5023","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1