首页 > 最新文献

Cybersecurity & Cybercrime最新文献

英文 中文
E-MAIL AS AN ATTACK TOOL 电子邮件是一种攻击工具
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8017
Piotr Dela
The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.
本文主要关注使用电子邮件导致的安全威胁的最重要方面。网络空间的本质是指以信息的生产、传输、存储和加工为实质的环境。与电子邮件有关的威胁的最重要例子与社会工程有关,这是一种欺诈方法,目的是未经授权获取犯罪所需的信息。会议还集中注意如何有效地对付这类威胁。
{"title":"E-MAIL AS AN ATTACK TOOL","authors":"Piotr Dela","doi":"10.5604/01.3001.0053.8017","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8017","url":null,"abstract":"The article focuses on the most important aspects of security threats resulting from the use ofelectronic mail. The essence of cyberspace has been identified as the environment whosesubstance is the production, transmission, storage and processing of information. The mostimportant examples of e-mail-related threats were presented in relation to social engineering as amethod of fraud aimed at obtaining unauthorised access to information necessary to commit acrime. Attention was also focused on how to counteract these types of threats effectively.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STANDARDIZATION IN COMBATING CYBERCRIME AREA 规范打击网络犯罪领域
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8024
P. Rybicki
Cybercrime is an area where improving the effectiveness and interaction of law enforcementagencies is becoming increasingly important today. Standards, understood as technical documentscontaining rules, guidelines or definitions, can be used for this purpose. The article characterisesthe different standards and the standardisation organisations responsible for their development. Itthen presents the common standards operating in the field of cybercrime, in particular, those thatcan be implemented by any organisation that decides to take steps for a so-called 'incidentresponse'. Against this backdrop, a standard linked to the conduct of criminal investigations ischaracterised in more detail, which provides guidance for the handling of digital evidence and canbe used by police organisations to increase the effectiveness of their operations and improveinteroperability. Finally, the results of a study on priority standardisation domains in the area ofcybercrime were presented. These domains were developed based on standardisation proposalsmade by law enforcement representatives from European countries and then prioritised in terms ofimportance and urgency. The resulting recommendations should serve as a basis forstandardisation work in the near future.
网络犯罪是一个领域,提高执法机构的效率和互动在今天变得越来越重要。标准被理解为包含规则、指南或定义的技术文件,可用于此目的。本文介绍了不同的标准和负责其发展的标准化组织。然后介绍了网络犯罪领域的通用标准,特别是那些可以由任何决定采取所谓“事件响应”措施的组织实施的标准。在此背景下,一项与刑事调查行为相关的标准得到了更详细的描述,该标准为处理数字证据提供了指导,并可被警察组织用于提高其行动效率和改善互操作性。最后,介绍了网络犯罪领域优先标准化领域的研究结果。这些领域是根据欧洲国家执法代表提出的标准化建议开发的,然后根据重要性和紧迫性进行优先排序。由此产生的建议应作为近期标准化工作的基础。
{"title":"STANDARDIZATION IN COMBATING CYBERCRIME AREA","authors":"P. Rybicki","doi":"10.5604/01.3001.0053.8024","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8024","url":null,"abstract":"Cybercrime is an area where improving the effectiveness and interaction of law enforcementagencies is becoming increasingly important today. Standards, understood as technical documentscontaining rules, guidelines or definitions, can be used for this purpose. The article characterisesthe different standards and the standardisation organisations responsible for their development. Itthen presents the common standards operating in the field of cybercrime, in particular, those thatcan be implemented by any organisation that decides to take steps for a so-called 'incidentresponse'. Against this backdrop, a standard linked to the conduct of criminal investigations ischaracterised in more detail, which provides guidance for the handling of digital evidence and canbe used by police organisations to increase the effectiveness of their operations and improveinteroperability. Finally, the results of a study on priority standardisation domains in the area ofcybercrime were presented. These domains were developed based on standardisation proposalsmade by law enforcement representatives from European countries and then prioritised in terms ofimportance and urgency. The resulting recommendations should serve as a basis forstandardisation work in the near future.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CYBER OPERATIONS IN HYBRID CONFLICTS - LESSONS FROM THE 混合冲突中的网络作战——来自美国的教训
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8019
Jakub Syta
This review article presents selected use cases where information technology was used duringRussia's war with Ukraine in 2022. The analysis of these events allows to draw conclusions aboutthe effectiveness of the various activities taking place in cyberspace, which may also be relevantin future conflicts. The conclusions relate to the provision of uninterrupted communications,cyber attacks destroying physical infrastructure elements, the use of mobile phones, theeffectiveness of OSINT activities, and the effectiveness of disinformation and propagandaactivities.
这篇评论文章介绍了在2022年俄罗斯与乌克兰的战争中使用信息技术的一些用例。对这些事件的分析可以得出关于在网络空间中发生的各种活动的有效性的结论,这也可能与未来的冲突有关。结论涉及提供不间断通信,网络攻击破坏物理基础设施要素,移动电话的使用,OSINT活动的有效性,以及虚假信息和宣传活动的有效性。
{"title":"CYBER OPERATIONS IN HYBRID CONFLICTS - LESSONS FROM THE","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8019","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8019","url":null,"abstract":"This review article presents selected use cases where information technology was used duringRussia's war with Ukraine in 2022. The analysis of these events allows to draw conclusions aboutthe effectiveness of the various activities taking place in cyberspace, which may also be relevantin future conflicts. The conclusions relate to the provision of uninterrupted communications,cyber attacks destroying physical infrastructure elements, the use of mobile phones, theeffectiveness of OSINT activities, and the effectiveness of disinformation and propagandaactivities.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE IMPACT OF USING SOCIAL MEDIA IN ISLAMIC STATEPROPAGANDA ON SECURITY AND PUBLIC ORDER. PRESENTATION OFRESEARCH OUTCOME 在伊斯兰国家宣传中使用社交媒体对安全和公共秩序的影响。研究成果展示
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8022
Sylwia Gliwa
The aim of this article is to present the outcome of my research conducted during my PhD studiesand presented in my PhD dissertation “The impact of using social media in Islamic Statepropaganda on security and public order”. The paper presents the outcome of research that coversgraphic, audio and video materials to show the impact of ISIS propaganda on security and publicorder. The conducted analysis covered the content published through social media platforms anddirected to the people of Western countries and Russia.
这篇文章的目的是展示我在博士学习期间进行的研究成果,并在我的博士论文“在伊斯兰国宣传中使用社交媒体对安全和公共秩序的影响”中提出。本文介绍了对封面、音频和视频材料的研究结果,以显示ISIS宣传对安全和公共秩序的影响。所进行的分析涵盖了通过社交媒体平台发布的内容,并针对西方国家和俄罗斯的人民。
{"title":"THE IMPACT OF USING SOCIAL MEDIA IN ISLAMIC STATEPROPAGANDA ON SECURITY AND PUBLIC ORDER. PRESENTATION OFRESEARCH OUTCOME","authors":"Sylwia Gliwa","doi":"10.5604/01.3001.0053.8022","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8022","url":null,"abstract":"The aim of this article is to present the outcome of my research conducted during my PhD studiesand presented in my PhD dissertation “The impact of using social media in Islamic Statepropaganda on security and public order”. The paper presents the outcome of research that coversgraphic, audio and video materials to show the impact of ISIS propaganda on security and publicorder. The conducted analysis covered the content published through social media platforms anddirected to the people of Western countries and Russia.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124183517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BOHATEROWIE CZY PRZESTĘPCY” - ANALIZA GRUPY ANONYMOUS
Pub Date : 2023-03-02 DOI: 10.5604/01.3001.0053.8031
Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska
Celem artykułu jest omówienie działalności grupy Anonymous oraz próba określenia jejcharakteru oraz specyfiki poprzez analizę zarówno prowadzonych przez grupę akcji w przeszłości(“Project Chanology”, “Operacja Payback”, “Operacja Tunezja”, “Operacja Egipt”), jak i akcjiaktualnych (“Operacja Rosja”), związanych z trwającym zbrojnym konfliktem ukraińsko –rosyjskim.Istotnym elementem jest określenie stanowiska szeroko pojmowanej opinii publicznej orazuwzględnienie zapisów prawnych, obowiązujących na terenie Stanów Zjednoczonych, UniiEuropejskiej, jak i samej Rosji, które posłużyły w obiektywnej ocenie działalności grupy. Wramach próby uzyskania odpowiedzi na pytanie: „Czy grupa Anonymous powinna byćpostrzegana jako przestępcy, czy jako bohaterowie?”, podjęta została analiza komentarzy,postów, działań użytkowników w mediach społecznościowych oraz poszczególnych kolektywówzwiązanych z grupą („squad303”, „GhostSec”). Całość rozważań dotycząca sposobupostrzegania grupy Anonymous ma charakter teoretyczny i nie rozstrzyga ostatecznie związanegoz zagadnieniem dyskursu.
本文旨在讨论匿名者组织的活动,并试图通过分析该组织过去开展的行动("Project Chanology"、"Operation Payback"、"Operation Tunisia"、"Operation Egypt")和当前与乌克兰-俄罗斯武装冲突有关的行动("Operation Russia"),确定其特征和具体内容。其中一个重要因素是确定广大公众的立场,并考虑到美国、欧盟和俄罗斯本国的现行法律规定,这些都有助于对该组织的活动进行客观评估。为了回答 "匿名者应被视为罪犯还是英雄?"这一问题,我们对社交媒体上的评论、帖子、用户行为以及与该组织有关的个人集体("squads303"、"GhostSec")进行了分析。关于如何看待匿名者的整个反思是理论性的,并没有明确解决围绕这一问题的讨论。
{"title":"BOHATEROWIE CZY PRZESTĘPCY” - ANALIZA GRUPY ANONYMOUS","authors":"Hanna Trześniewska, Julia Wróbel, Aleksandra Wędrowska","doi":"10.5604/01.3001.0053.8031","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8031","url":null,"abstract":"Celem artykułu jest omówienie działalności grupy Anonymous oraz próba określenia jejcharakteru oraz specyfiki poprzez analizę zarówno prowadzonych przez grupę akcji w przeszłości(“Project Chanology”, “Operacja Payback”, “Operacja Tunezja”, “Operacja Egipt”), jak i akcjiaktualnych (“Operacja Rosja”), związanych z trwającym zbrojnym konfliktem ukraińsko –rosyjskim.Istotnym elementem jest określenie stanowiska szeroko pojmowanej opinii publicznej orazuwzględnienie zapisów prawnych, obowiązujących na terenie Stanów Zjednoczonych, UniiEuropejskiej, jak i samej Rosji, które posłużyły w obiektywnej ocenie działalności grupy. Wramach próby uzyskania odpowiedzi na pytanie: „Czy grupa Anonymous powinna byćpostrzegana jako przestępcy, czy jako bohaterowie?”, podjęta została analiza komentarzy,postów, działań użytkowników w mediach społecznościowych oraz poszczególnych kolektywówzwiązanych z grupą („squad303”, „GhostSec”). Całość rozważań dotycząca sposobupostrzegania grupy Anonymous ma charakter teoretyczny i nie rozstrzyga ostatecznie związanegoz zagadnieniem dyskursu.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE 加强空间物体网络安全的活动
Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8013
Damian Skrzynecki
Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object and the control station, and in the space itself. In order to neutralizethreats and ensure business continuity, inter alia: encrypted communication, createsappropriate legal requirements and standards, and uses new technologies to better secureobjects in space.
如今,航天工业是最有前途的发展环境,它所使用的技术几乎涵盖了现代经济的各个方面。因此,确保安全对于避免全球经济危机至关重要,例如由于缺乏导航服务而导致的危机。其中很大一部分是易受网络攻击的数字环境。空间物体的安全必须在地面控制站、物体与控制站之间的通信和空间本身三个管理段的层面上确保免受干扰、欺骗和窃听等一系列威胁。为了消除威胁并确保业务连续性,除其他外:加密通信,制定适当的法律要求和标准,并使用新技术更好地保护空间中的物体。
{"title":"ACTIVITIES TO ENHANCE THE CYBER SECURITY OF OBJECTSIN SPACE","authors":"Damian Skrzynecki","doi":"10.5604/01.3001.0053.8013","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8013","url":null,"abstract":"Nowadays, the space industry is the most promising development environment and theamount of technology used in it covers practically all aspects of the modern economy.Ensuring safety is therefore crucial to avoid a global economic crisis, for example asa result of the lack of access to navigation services. Much of this is a digitalenvironment that is vulnerable to cyber-attacks. The security of space objects must beensured against a number of threats, such as jamming, spoofing and eavesdropping, atthe level of three management segments - ground control station, communicationbetween the object and the control station, and in the space itself. In order to neutralizethreats and ensure business continuity, inter alia: encrypted communication, createsappropriate legal requirements and standards, and uses new technologies to better secureobjects in space.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE ROLE OF CISO IN MODERN ORGANIZATIONS ciso在现代组织中的作用
Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8008
Jakub Syta
This paper characterizes the different areas of knowledge and skills that are useful forthe Chief Information Security Officer (CISO) role. It juxtaposes these with the variousspecializations that are emerging in the cybersecurity field. The work should alloworganizations to more consciously select candidates for the role of CISO who will meetthe expectations
本文描述了对首席信息安全官(CISO)角色有用的不同领域的知识和技能。它将这些与网络安全领域出现的各种专业并置。这项工作应该允许组织更有意识地选择符合期望的CISO候选人
{"title":"THE ROLE OF CISO IN MODERN ORGANIZATIONS","authors":"Jakub Syta","doi":"10.5604/01.3001.0053.8008","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8008","url":null,"abstract":"This paper characterizes the different areas of knowledge and skills that are useful forthe Chief Information Security Officer (CISO) role. It juxtaposes these with the variousspecializations that are emerging in the cybersecurity field. The work should alloworganizations to more consciously select candidates for the role of CISO who will meetthe expectations","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INVESTMENTS IN THE AREA OF CYBERSECURITY IN RUSSIANFEDERATION BETWEEN 2018 AND 2022 2018年至2022年俄罗斯联邦网络安全领域的投资
Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8003
Andrzej Tałuć
The study presents the level of financial investments made between 2018 and 2022 byRussian Federation authorities in the sector related to cybersecurity of the state.The text covers the following areas: expenses incurred for cybersecurity, projects"Digital economy" and "Independent Internet", funds to support Russian programmers,data security in rail transport, radio and TV, biometric security in passports,participation of commercial entities in the government program "Digital economy",expenses for independent test centers, software and hardware, as well as filteringinternet traffic among children and detecting any malicious activities related to it.
该研究展示了2018年至2022年俄罗斯联邦当局在国家网络安全相关领域的金融投资水平。该文件涵盖以下领域:网络安全费用,“数字经济”和“独立互联网”项目,支持俄罗斯程序员的资金,铁路运输,广播和电视的数据安全,护照的生物识别安全,商业实体参与政府计划“数字经济”,独立测试中心,软件和硬件的费用,以及过滤儿童之间的互联网流量并检测与之相关的任何恶意活动。
{"title":"INVESTMENTS IN THE AREA OF CYBERSECURITY IN RUSSIANFEDERATION BETWEEN 2018 AND 2022","authors":"Andrzej Tałuć","doi":"10.5604/01.3001.0053.8003","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8003","url":null,"abstract":"The study presents the level of financial investments made between 2018 and 2022 byRussian Federation authorities in the sector related to cybersecurity of the state.The text covers the following areas: expenses incurred for cybersecurity, projects\"Digital economy\" and \"Independent Internet\", funds to support Russian programmers,data security in rail transport, radio and TV, biometric security in passports,participation of commercial entities in the government program \"Digital economy\",expenses for independent test centers, software and hardware, as well as filteringinternet traffic among children and detecting any malicious activities related to it.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STATISTICAL ANALYSIS OF INTERNAL DYNAMICS OF ARC4 STREAMCIPHER arc4流密码内部动态的统计分析
Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8010
Teodor Buchner
The aim of this paper is to show, how the approach of nonlinear dynamics and statisticalphysics help to analyze pseudorandom number generators (PRNG) used incryptography. In fact, each PRNG is a highly nonlinear dynamical system, with itsinternal states, and may be analyzed as such.It is shown using PRNG of ARC4 stream cipher as example. A nonlinear phenomenon:1/fα dynamics was found in the new measure of complexity of the cipher: female count,a combinatorial quantity of direct cryptological bearing. We show that this measure canbe helpful in such tasks as measuring stationarity of internal dynamics of the PRNG andmeasuring of quality of initial condition (cryptographic key), which is statisticallyindependent from its entropy.
本文的目的是展示非线性动力学和统计物理学的方法如何帮助分析密码学中使用的伪随机数生成器(PRNG)。事实上,每个PRNG都是一个高度非线性的动力系统,具有其内部状态,并且可以这样分析。以ARC4流密码的PRNG为例进行了说明。在新的密码复杂度度量中,发现了一种非线性现象:1/fα动力学:女性计数,即直接密码承载的组合量。结果表明,该方法可用于PRNG内部动态平稳性的测量和初始条件(密钥)质量的测量,且初始条件与熵无关。
{"title":"STATISTICAL ANALYSIS OF INTERNAL DYNAMICS OF ARC4 STREAMCIPHER","authors":"Teodor Buchner","doi":"10.5604/01.3001.0053.8010","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8010","url":null,"abstract":"The aim of this paper is to show, how the approach of nonlinear dynamics and statisticalphysics help to analyze pseudorandom number generators (PRNG) used incryptography. In fact, each PRNG is a highly nonlinear dynamical system, with itsinternal states, and may be analyzed as such.It is shown using PRNG of ARC4 stream cipher as example. A nonlinear phenomenon:1/fα dynamics was found in the new measure of complexity of the cipher: female count,a combinatorial quantity of direct cryptological bearing. We show that this measure canbe helpful in such tasks as measuring stationarity of internal dynamics of the PRNG andmeasuring of quality of initial condition (cryptographic key), which is statisticallyindependent from its entropy.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123523040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY OF INDUSTRIAL CONTROL SYSTEMS 工业控制系统的安全性
Pub Date : 2021-03-31 DOI: 10.5604/01.3001.0053.8011
Karol Gazda
The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.
该研究提出了工业控制系统基础设施的一些要素,概述了确保其安全的概念,同时列出了网络威胁并提出了缓解这些威胁的建议。
{"title":"SECURITY OF INDUSTRIAL CONTROL SYSTEMS","authors":"Karol Gazda","doi":"10.5604/01.3001.0053.8011","DOIUrl":"https://doi.org/10.5604/01.3001.0053.8011","url":null,"abstract":"The study presents a number of elements of the Industrial Control System infrastructurealong with an overview of the concept of ensuring their security while listing cyberthreats with recommendations to mitigate them.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity & Cybercrime
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1