Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security threats.

Zeitschriftenartikel zum Thema „Security threats“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security threats" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Isokaitė-Valužė, Indrė. „International Peace and Security in Maritime Domain“. Teisė 122 (30.03.2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Der volle Inhalt der Quelle
Annotation:
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc. A maritime space safe from such kind of threats generally means maritime security. Thus, a great part of the threats to maritime security are or may constitute threats to international peace and security, subject to their recognition as such threats by the United Nations Security Council in its resolutions. Usually such threats also pose risk to maritime safety (safety at sea, safety of navigation, ships, crew and passengers); however, any threat to maritime safety does not necessarily endanger maritime security or amount to the threat to international peace and security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

PASTOR, Viliam. „CURRENT THREATS TO WORLD SECURITY“. STRATEGIES XXI - Command and Staff College 17, Nr. 1 (11.08.2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Der volle Inhalt der Quelle
Annotation:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz und Khawaja Masood Ahmed. „Wireless Security Threats“. Sir Syed University Research Journal of Engineering & Technology 3, Nr. 1 (20.12.2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.

Der volle Inhalt der Quelle
Annotation:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable to attacks. Mobile devices are the new frontier forviruses, spam and other potential security threats. All theseviruses, spam, Trojans and worms are out there in our vicinity togain access to our personal data. This research aims to analyze thethreats of viruses in the wireless communication systems andsecurity including their role in the service outbreak, laying downthe possible scenarios and also identifying possible remedies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Saptono, Edy, Ribka Keiza und Joni Wijayanto. „Security management of national park security in the border of Indonesia - Malaysia“. Technium Social Sciences Journal 23 (09.09.2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.

Der volle Inhalt der Quelle
Annotation:
Boundary is an important part of the state's sovereignty and becomes a fortress of all kinds of threats. The threat about security of natural resources is one of non-military threat which affects Indonesia’s security. Betung Kerihun National Park adjoins to Malaysia in northern of Indonesia, so it can be vulnerable to threats. The purposes of this research are to analyze the threat of security toward management of Betung Kerihun National Park (TNBK), the efforts made to overcome the security threat, and the management of TNBK on the border of Indonesia and Malaysia. The research uses qualitative method using in-depth interviews and later analyzing the primary and secondary data. The results show that the security threats of TNBK are agarwood stealing, gold mining, illegal logging, wildlife distribution, lack of security staff, no security forces (Satgas Pamtas) on the northern boundary of TNBK, and border patrol inspection line construction. The efforts to overcome security threats are preventive, pre-emptive, and repressive. The management of TNBK on the border of Indonesia and Malaysia in order to protect border security are including management functions of planning, organizing, leading (directing), and evaluating. The recommendations to overcome the security threat of national parks on the border between Indonesia and Malaysia are the active role of security forces and the establishment of buffer zone management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Syomych, Mykola. „Management of organizational and legal security in the formation of competitiveness of agricultural business entities“. Actual problems of innovative economy, Nr. 3 (30.05.2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Der volle Inhalt der Quelle
Annotation:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Syed, Farzana Zaheer, und Saba Javed. „Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan“. International Journal of Social Sciences and Management 4, Nr. 4 (30.10.2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.

Der volle Inhalt der Quelle
Annotation:
Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security concept and added up the non-traditional threats as necessary part in security planning. Non-Traditional threats, terrorism, ambiguous warfare, cyber threats, water security, human security and energy crises etc now have equal importance with the border security. To protect the state from these actors, Pakistan is now reassessing and reorganized its security strategies. But these policies need more deliberate efforts to deal with such internal and external factors that are slowly and constantly weakening the state.Int. J. Soc. Sc. Manage. Vol. 4, Issue-4: 267-274
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Pendergrass, John C., Karen Heart, C. Ranganathan und V. N. Venkatakrishnan. „A Threat Table Based Assessment of Information Security in Telemedicine“. International Journal of Healthcare Information Systems and Informatics 9, Nr. 4 (Oktober 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Der volle Inhalt der Quelle
Annotation:
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Karpavičiūtė, Ieva. „Securitization and Lithuania’s National Security Change“. Lithuanian Foreign Policy Review 36, Nr. 1 (20.12.2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.

Der volle Inhalt der Quelle
Annotation:
Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hojda, Mihaela Hortensia. „Information security economics: cyber security threats“. Proceedings of the International Conference on Business Excellence 16, Nr. 1 (01.08.2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Der volle Inhalt der Quelle
Annotation:
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

صادق, بارزان. „Internal Security Threats on the Kurdistan Region – Iraq“. Journal for Political and Security Studies 3, Nr. 6 (01.12.2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.

Der volle Inhalt der Quelle
Annotation:
After the Cold War, security policy has been changed dramatically. Currently, security no longer covers only war and army. For instance, at the time I am writing this paper, health security because of Corona virus is much riskier than atomic weapons, terrorists or any other army threats. Political systems are concerned to care about political, health, cyber, economic, food, water, environment, education and other security sectors. Kurdistan region has faced some interior and foreign security challenges. In theoretical framework, the research sheds some light on security situation in concept, changing of security priority and different approaches to point out security threat of various types. This research has come to this result that there are ten major domestic security challenges that threaten Kurdistan region. Later on, in the field framework the research has collected data for each one of security threats depending on deep discussions with tens of specialized experts in Kurdistan region security policy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Smirnov, R. A., und S. N. Novikov. „Research on Information Security Risk Assessment Techniques“. Interexpo GEO-Siberia 6 (18.05.2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Der volle Inhalt der Quelle
Annotation:
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Koper-Staszowska, Wioletta. „Security versus Threat – Interrelations“. ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, Nr. 3 (30.10.2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.

Der volle Inhalt der Quelle
Annotation:
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must be dealt with to provide security to a state, other threats are related to economic, ecological, social or cultural aspects.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Smalii, O. B. „A general description of threats to european security at the threshold of the 21st century“. Legal horizons, Nr. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.

Der volle Inhalt der Quelle
Annotation:
Over time, the issue of security has not lost its relevance, but on the contrary gained momentum because of the large-scale threats that have arisen and evolve. In today's world, there are threats that are beyond the control of a particular country and, for the sake of security, begin to pool their forces and resources. The author reveals the particularities of threats to European collective security in the 21st century. The article identifies threats based on doctrinal approaches. The threat is a set of factors and conditions that could potentially pose a danger to the state in the future. The author examines approaches to the classification of threats to collective security and their characteristics, as well as the author's classification of threats according to their relevance and time of occurrence. According to scientific approaches, the threats to European collective security are divided into: economic, military, information, environmental and other nature; direct and indirect; potential and immediate; external and internal. The author proposed his own classification of threats, according to which they are divided into: new threats, again relevant and classic. The author shows the threats influence on the formation of the European collective security system and how they affect its current changes. It is noted that contemporary external threats were emerging at the turn of the late 1980s – early 1990s, and some of them continue to be shaped and strengthened today. Given the current challenges that pose a threat to collective security, a number of specific actions need to be taken to improve the performance of collective security organizations in order to more effectively address contemporary threats. The author proposes ways to improve the activity of modern collective security systems in order to avoid the emergence and development of large-scale threats to collective security in the 21st century.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Yarovenko, Hanna. „Evaluating the threat to national information security“. Problems and Perspectives in Management 18, Nr. 3 (09.09.2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Der volle Inhalt der Quelle
Annotation:
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 or –0.5. The Harrington-Mencher function is proposed to determine the information security threat index. Nonlinear normalization was carried out to bring the initial data to a comparable measurement. Canonical analysis was performed to determine the indicator weights. The data from 159 countries were taken for 2018 to assess the index. The result was presented on the map showing countries’ distribution by the information security threat index, thus forming five groups. The group with a “very well” resistance to threats includes economically developed countries with a high level of information security. The “well” group was formed by new industrial and developing countries with economic potential sufficient to prevent information threats and combat their consequences. The information security level in developing countries, where the results of overcoming information threats will affect the economic sphere, is defined as “acceptable”. Countries with a low level of development and information security formed groups designated as “bad” and “very bad”, which indicates a high level of threats to their information security. AcknowledgmentThis work is carried out with in the tax payer – funded researches: No. 0118U003574 “Cybersecurity in the banking fraud enforcement: protection of financial service consumers and the financial and economic security growth in Ukraine”.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz und Paolo Giorgini. „Threat Analysis in Goal-Oriented Security Requirements Modelling“. International Journal of Secure Software Engineering 5, Nr. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Der volle Inhalt der Quelle
Annotation:
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specifically, the authors integrate threat modelling with the socio-technical security modelling language (STS-ml), introduce automated analysis techniques that propagate threats in the combined models, and present tool support that enables reuse of threats facilitated by a threat repository. The authors illustrate their approach on a case study from the Air Traffic Management (ATM) domain, from which they extract some practical challenges. The authors conclude that threats provide a useful foundation and justification for the security requirements that the authors derive from goal modelling, but this should not be considered as a replacement to risk assessment. The usage of goals and threats early in the development process allows raising awareness of high-level security issues that occur regardless of the chosen technology and organizational processes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Le, Ngoc Thuy, und Doan B. Hoang. „A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security“. Journal of Telecommunications and the Digital Economy 7, Nr. 1 (30.03.2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Der volle Inhalt der Quelle
Annotation:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that materialises into an attack, forms an essential basis for a quantitative security metric. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on a Markov chain and Common Vulnerability Scoring System. Moreover, the paper introduces the method to estimate the probability of security attacks. The use of the new security threat model and its computation is demonstrated through their application to estimating the probabilities of cloud threats and types of attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Dervišević, Tarik, Sabina Baraković und Jasmina Baraković Husić. „Case Study: Security of System for Remote Management of Windows“. B&H Electrical Engineering 14, Nr. 2 (01.12.2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.

Der volle Inhalt der Quelle
Annotation:
Abstract In the process of designing and forming each system, it is necessary to identify potential vulnerabilities and threats to that system and to include appropriate countermeasures. The process that helps to find the problem in the first phase of design is called threat modeling. Threat modeling is based on the idea that every system has valuable resources that need to be protected. These resources have certain weak points that internal or external threats can use to harm them, while there are as well countermeasures used to mitigate them. Therefore, this paper analyses the security of a Web of Things (WoT)-based system for remote management of windows, which is in the design stage by using a threat modeling approach based on STRIDE and DREAD. The results obtained through Microsoft Threat Modeling Tool (MTMT) justified the use of threat modeling in the design phase given that we have identified in total 118 threats, with Elevation of privilege class of threats being the most prominent ones. The Information disclosure threats are found to be the ones characterized as medium and low risk ones, while the most represented high-risk threats again come from the Elevation of privilege class of threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Jenab, Kouroush, Sam Khoury und Kim LaFevor. „Flow-Graph and Markovian Methods for Cyber Security Analysis“. International Journal of Enterprise Information Systems 12, Nr. 1 (Januar 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.

Der volle Inhalt der Quelle
Annotation:
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Malviya, Deepak Kumar, und Umesh Kumar Lilhore. „Survey on Security Threats in Cloud Computing“. International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (31.12.2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Polikanov, Dmitry. „Russia’s Perception and Hierarchy of Security Threats“. Connections: The Quarterly Journal 04, Nr. 2 (2005): 85–91. http://dx.doi.org/10.11610/connections.04.2.11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Guchua, Alika, und Thornike Zedelashvili. „Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats“. Історико-політичні проблеми сучасного світу, Nr. 40 (15.12.2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.

Der volle Inhalt der Quelle
Annotation:
The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare. Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz und Khawaja Masood Ahmed. „2 Wireless Security Threats“. Sir Syed Research Journal of Engineering & Technology 1, Nr. 1 (20.12.2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.

Der volle Inhalt der Quelle
Annotation:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable to attacks. Mobile devices are the new frontier forviruses, spam and other potential security threats. All theseviruses, spam, Trojans and worms are out there in our vicinity togain access to our personal data. This research aims to analyze thethreats of viruses in the wireless communication systems andsecurity including their role in the service outbreak, laying downthe possible scenarios and also identifying possible remedies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Kopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka und Katarzyna Bakalarczyk-Burakowska. „Security threats in cyberspace“. Scientific Journal of the Military University of Land Forces 205, Nr. 3 (23.09.2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.

Der volle Inhalt der Quelle
Annotation:
The article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security. Cyberspace is subject to increasingly sophisticated and targeted threats, while our growing reliance on cyberspace exposes our privacy to risks, giving rise to new and significant security gaps. Due to its specific characteristics, it generates serious threats to individuals as well as to national and international security. Depending on the research perspective we adopt, these threats are variable, multidimensional, and multifaceted in nature. Therefore, they require systematic analysis and response.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Bahgat, Gawdat. „Oil security: Potential threats“. Contemporary Security Policy 19, Nr. 2 (August 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Velinov, Nikola, und Stephan Janouch. „Combating Evolving Security Threats“. New Electronics 53, Nr. 10 (26.05.2020): 22–23. http://dx.doi.org/10.12968/s0047-9624(22)61260-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Gould, David. „Organizational Resilience Approaches to Cyber Security“. International Journal of Smart Education and Urban Society 9, Nr. 4 (Oktober 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.

Der volle Inhalt der Quelle
Annotation:
This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Kaduszkiewicz, Marcin. „The National Map of Security Threats as a tool to monitor security and public order“. Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 31, Nr. 31 (28.09.2018): 81–92. http://dx.doi.org/10.5604/01.3001.0012.8596.

Der volle Inhalt der Quelle
Annotation:
Threats to public order compromise the personal security of the individual, forcing him to take action to improve it, and thus to guarantee it to the closest people. The right to ensure the security of the individual, society is one of the duties of a state whose omission can be considered a violation of human rights. By implementing this obligation, a threat monitoring system was created in Poland – the National Safety Threat Map. It is a tool used by the Police which in 2016 was initially piloted, then already throughout the country introduced this mechanism to monitor and counteract local threats, affecting the safety of residents. This tool uses the Internet as a source of information about threats from citizens. The instruction was issued for both users – citizens, as well as for policemen of users and local administrators, and instructions for proper and reliable implementation. They impose on the Police officers’ specific tasks in the system for the implementation of applications. The work is an attempt to answer the question: What tool is KMZB in the system of monitoring by the state of public security and order? National Map of Security Threats (KMZB) – functions of the National Map of Security Threats in shaping local community safety, constitutes an element of the process of managing the public safety, as well as inspiring the local community in this respect. The Police as the formation serving the society and opened for its needs implemented the additional channel of the information exchange about the most troublesome threats defined on the local level.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Tkachuk, Natalia. „Analytical Component in Institutional Providing of Ukraine National Security Risks and Threats Assessment“. Information Security of the Person, Society and State, Nr. 28-30 (15.12.2020): 38–44. http://dx.doi.org/10.51369/2707-7276-2020-(1-3)-5.

Der volle Inhalt der Quelle
Annotation:
Today, in many developed countries, the analytical component in the institutional support of risk assessment and threats to national security is implemented by situational centers (SCs) at the strategic level through scientific-analytical and predictive support of the national security threat planning process. On the other hand, the common feature of such domestic situational centers is that they were created and continue to function mainly for operational management in the «manual» mode. Whereas the solution of the tasks of strategic analysis and forecasting in the field of national security requires the development of appropriate analytical content in the above-mentioned structures regarding threat assessment and identification of vulnerabilities. The outlined main problems of development of the analytical component in the institutional support Ukraine national security risks and threats assessment allow to identify a number of perspective areas of its development, in particular: inclusion in the process of continuous strategic monitoring and analysis of existing threats; forecasting the level of threats to national security and the risks they cause in the activities of the security and defense sector of Ukraine, their dynamics and the identification of new threats; planning to counter threats to national security and the risks caused by them in the activities of the security and defense sector of Ukraine.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Suroto, Suroto. „WLAN Security: Threats And Countermeasures“. JOIV : International Journal on Informatics Visualization 2, Nr. 4 (27.06.2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.

Der volle Inhalt der Quelle
Annotation:
A wireless local area Network (WLAN) is being widely recognized as a viable cost effective general purpose solution in providing high speed real time access to information. With a WLAN, users can gain access to shared information without being bound to fixed plug-in-point. WLAN transmit and receive data over the air and thus collectively combine data connectivity with ease of mobility. WLAN provides wireless access to multi location enterprises, small and medium enterprises. It can replace wired LAN or simply be used as extension of wired infrastructure. Besides all these advantages WLAN are also facing major problems of security.So security is the aspect where most of the researchers are working. Following are the major objective of our study : i) To study the various Vulnerabilities and attacks on WLAN and their solutions. ii) To study the some of the exiting security methods used for securing WLAN and explore the possibility of improvements in the same. Our conclusion that WLAN security is not easy, and it is constantly changing. They expose the network to a new group of hackers. All businesses need to determine their security requirements based on the application using the WLAN. Goal so that a WLAN is as protected as Wired LAN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Theron, Julien. „Networks of Threats: Interconnection, Interaction, Intermediation“. Journal of Strategic Security 14, Nr. 3 (Oktober 2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.

Der volle Inhalt der Quelle
Annotation:
The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition, and convergence. Thirdly, intermediation occurs between antagonistic threats trying to achieve common intermediary objectives. These networks are driven by agents maximizing their impact and reveals the autonomization and socialization of threats. Tackling these networks requires a global approach and the mobilization of collective security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Sun, Lei, Qin Sheng Du und Lu Tan. „Cloud Security Threats Distribution Technology Research“. Applied Mechanics and Materials 727-728 (Januar 2015): 934–36. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.934.

Der volle Inhalt der Quelle
Annotation:
Inprotection architecture of data center, Cloud security threat distributiontechnology through the analysis of various threats of Internet and risks,obtains the threatened distribution data that is associated with the zombienetwork with the technology of distributed computing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Kovpak, Olena. „TOOLS OF COUNTERACTION OF BUDGET SECTOR DEVELOPMENT THREATS“. Economic Analysis, Nr. 27(3) (2017): 31–36. http://dx.doi.org/10.35774/econa2017.03.031.

Der volle Inhalt der Quelle
Annotation:
Introduction. Significant social and economic changes, which are taking place in Ukraine, are caused by external and internal factors. Under certain conditions, they can have both positive and negative effects, and present a real threat. The provision of budgetary and national security of the state can become the effective counteraction to them. Purpose. The aim of the research is to clarify the essence of threats to budget security of the state; to allocate the internal and external threats; to study the existing ways of prevention and elimination the threats to state budget security. Method (methodology). To achieve this goal we have used the method of analysis and synthesis, method of induction and deduction, method of analogy and method of system analysis. Results. Interpretation of the category "threats to the budget security of the state" has been formulated. The notions of "threat", "challenges", "danger" and "risks" have been investigated. Internal and external threats have been defined. The structure of the functions of protection from threats has been characterized. The means of counteraction to financial security threats, generated by the imperfect budget policy of Ukraine have been estimated.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Ilvonen, Ilona, und Pasi Virtanen. „Preparing for Cyber Threats with Information Security Policies“. International Journal of Cyber Warfare and Terrorism 3, Nr. 4 (Oktober 2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.

Der volle Inhalt der Quelle
Annotation:
Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

J., Waweru, und Dr Anita Kiamba. „Wildlife Security and International Relations“. International Journal of Research and Innovation in Social Science 06, Nr. 10 (2022): 720–24. http://dx.doi.org/10.47772/ijriss.2022.61035.

Der volle Inhalt der Quelle
Annotation:
Kenya is endowed with an enormous biodiversity of ecosystems and wildlife species. This rich wildlife together with other attractions has for decades made the country an important tourist destination and hub for the lucrative tourist industry. Nonetheless, wildlife species continue to face threats such as commercial poaching for trophies and human wildlife conflicts that hinder their survival. It is important to mitigate these threats to ensure wildlife species do not go extinct and Kenya continues to pull tourists into the country. The absence of wildlife security poses a threat to international relations. This is because wildlife crimes increase global crime rates that often lead to instability in the global arena. Furthermore, wildlife crime has, throughout history, been a source of funding for rebel groups, militias and extremist groups like the Alshabaab in Somalia. These groups undermine good governance and development efforts of states. This study aims at analyzing the key threats to wildlife security in Kenya and international relations, examining the severity of wildlife threats both locally in Kenya and globally and establishing probable solutions that can be tailor-made to address threats to wildlife security in Kenya and international relations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Greaves, Wilfrid. „Climate change and security in Canada“. International Journal: Canada's Journal of Global Policy Analysis 76, Nr. 2 (Juni 2021): 183–203. http://dx.doi.org/10.1177/00207020211019325.

Der volle Inhalt der Quelle
Annotation:
This article examines the implications of human-caused climate change for security in Canada. The first section outlines the current state of climate change, the second discusses climate change impacts on human security in Canada, and the third outlines four other areas of Canada’s national interests threatened by climate change: economic threats; Arctic threats; humanitarian crises at home and abroad; and the threat of domestic conflict. In the conclusion, I argue that climate change has clearly not been successfully “securitized” in Canada, despite the material threats it poses to human and national security, and outline directions for future research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Rizal, Muhamad, und Yanyan Yani. „Cybersecurity Policy and Its Implementation in Indonesia“. JAS (Journal of ASEAN Studies) 4, Nr. 1 (09.08.2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.

Der volle Inhalt der Quelle
Annotation:
The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Melnyk, Dmytro. „Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction“. Information Security of the Person, Society and State, Nr. 31-33 (20.12.2021): 16–27. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-2.

Der volle Inhalt der Quelle
Annotation:
The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in other vitally important spheres. Therefore, their content and forms of manifestation should be borne on mind to effectively counteract their emergence and localization. Under current conditions, the information security of Ukraine directly depends on the high-quality management of the system of countering threats to the national security in the information sphere and effective protection of national interests under the guidance of authorized entities. One of the state’s primary tasks for today is the creation and development of a stably functioning mechanism to ensure the national security of Ukraine in the field of information for the counteraction to existing threats and prevention of potential ones. The efficiency of such a counteraction depends on the authorized bodies’ capabilities to timely and accurately detect the threats to the national security in the field of information, recognize and point out their sources, influence them in order to prevent offensive and harmful consequences. The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in other vitally important spheres. Therefore, their content and forms of manifestation should be borne on mind to effectively counteract their emergence and localization. Under current conditions, the information security of Ukraine directly depends on the high-quality management of the system of countering threats to the national security in the information sphere and effective protection of national interests under the guidance of authorized entities. One of the state’s primary tasks for today is the creation and development of a stably functioning mechanism to ensure the national security of Ukraine in the field of information for the counteraction to existing threats and prevention of potential ones. The efficiency of such a counteraction depends on the authorized bodies’ capabilities to timely and accurately detect the threats to the national security in the field of information, recognize and point out their sources, influence them in order to prevent offensive and harmful consequences.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Zeng, Min, Chuanzhou Dian und Yaoyao Wei. „Risk Assessment of Insider Threats Based on IHFACS-BN“. Sustainability 15, Nr. 1 (28.12.2022): 491. http://dx.doi.org/10.3390/su15010491.

Der volle Inhalt der Quelle
Annotation:
Insider threats, as one of the pressing challenges that threaten an organization’s information assets, usually result in considerable losses to the business. It is necessary to explore the key human factors that enterprise information security management should focus on preventing to reduce the probability of insider threats effectively. This paper first puts forward the improved Human Factors Analysis and Classification System (IHFACS) based on actual enterprise management. Then, the enterprise internal threat risk assessment model is constructed using the Bayesian network, expert evaluation, and fuzzy set theory. Forty-three classic insider threat cases from China, the United States, and Israel during 2009–2021 are selected as samples. Then, reasoning and sensitivity analysis recognizes the top 10 most critical human factors of the accident and the most likely causal chain of unsafe acts. The result shows that the most unsafe behavior was not assessing employees’ familiarity with the company’s internal security policies. In addition, improving the organizational impact of information security can effectively reduce internal threats and promote the sustainable development of enterprises.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

El-Bakkouri, N., und T. Mazri. „SECURITY THREATS IN SMART HEALTHCARE“. ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (23.11.2020): 209–14. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-209-2020.

Der volle Inhalt der Quelle
Annotation:
Abstract. The Internet of Things had become more usually those recent years, it helps the human to be connected to every devices, to The Internet of Things had become more usually those recent years, it helps the human to be connected to every devices, to communicate and to share information for each other, the IoT gives many benefits to HealthCare systems and applications, it help to diagnostic and to monitor patients more closely and easier, but as other domain based on technologies, the smart Health use IT programs and Wireless network to exchange and analyse data which may be stooling by attackers if it doesn't secured and controlled permanently, as a fact of this weakness, it's possible to injure or kill some patient without being detected, this article discussing the Smart Health system, its benefits and examples of its using, also, it gives a view about security issues that can touch to this domain and best practice to follow for securing, detecting and avoiding security risks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Joseph, Juliet Eileen. „SADC and ECOWAS’S peace and security architecture preparedness and the COVID-19 pandemic“. EUREKA: Social and Humanities, Nr. 1 (28.01.2022): 16–30. http://dx.doi.org/10.21303/2504-5571.2022.002248.

Der volle Inhalt der Quelle
Annotation:
The coronavirus disease 2019 (Covid-19) pandemic remains a global security threat, as the result of the emerging and exacerbated security challenges that have impacted on the national security policies of various regional economic communities (RECs). This study analyses SADC and ECOWAS’ responses to the Covid-19 pandemic under their respective existing peace and security structures and explores if both RECs, SADC and ECOWAS have been efficient. This article discusses the Southern African and West African security setting, how its security architecture emerged and whether it has been successful in overcoming the security ramification in the region under the Covid-19 pandemic. Coincidentally, both SADC and ECOWAS have been confronted with existing and emerging human security threats, such as increased poverty, inequality, and the spread of diseases, such as Covid-19. The Covid-19 pandemic, a non-traditional security threat, has exposed how RECs, such as SADC and ECOWAS, respond to non-traditional and emerging security threats, suggesting for the transcendence of their security architecture that caters equally for non-military and emerging human security threats, alike military threats. This article explores the regional security experiences, challenges, and responses of both the SADC and ECOWAS under the Covid-19 pandemic.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Babenko, Aleksey, und Svetlana Kozunova. „The Model of Information Security Threat Profile of Corporate Information System“. NBI Technologies, Nr. 1 (August 2018): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.1.

Der volle Inhalt der Quelle
Annotation:
The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Zoidov, K. Kh, und E. N. Zimenkova. „On Threats to the Economic Security of the Republic of Crimea“. Economics and Management, Nr. 9 (07.11.2019): 23–33. http://dx.doi.org/10.35854/1998-1627-2019-9-23-33.

Der volle Inhalt der Quelle
Annotation:
The presented study analyzes threats to regional economic security and searches for ways to improve economic security.Aim. The study aims to identify and analyze potential threats to regional economic security (through the example of the Republic of Crimea).Tasks. The authors conduct a theoretical analysis of the concept of a threat economic security, identify regional features that affect the level of economic security, and list the major threats to the economic security of the Republic of Crimea.Methods. The scientific perspectives of threats to economic security are examined. This study uses logical analysis methods to identify factors that determine regional features and their relationship with the identified threats to economic security. The socio-economic situation in the Republic of Crimea is assessed according to the analysis of statistics.Results. Russian regions are highly different due to their geographic location, natural resource potential, economic specialization, and other factors. This is why threats to regional economic security are identified with allowance for each region’s specific features. The study lists and classifies the major threats to regional economic security, particularly in relation to the Republic of Crimea.Conclusions. In the context of economic crisis, unstable geopolitical situation, and foreign sanctions, economic security becomes one of the top national priorities. Due to Russia’s federal nature, its regions play an important role in the formation of the country’s economic security as a whole. Therefore, it is necessary to identify threats to regional security early and find efficient ways to counter them.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Antonova, Olena. „MAIN THREATS TO THE FORMATION OF THE SECURITY SYSTEM OF BANKS CREDIT ACTIVITIES“. Actual Problems of Economics 1, Nr. 223 (22.01.2020): 55–72. http://dx.doi.org/10.32752/1993-6788-2020-1-223-55-72.

Der volle Inhalt der Quelle
Annotation:
The article considers the main threats to the formation of the security system of credit activity of banks. It is proved that the security of banking institutions is multifunctional and complex. This is an important component of national security, which is characterized by balance and resilience to external and internal threats, its ability to achieve its goals and generate sufficient financial resources to ensure sustainable development. It is proposed to consider the security of banking activities as the security of the bank, banking staff, security of banking operations, as well as the security of the bank's shareholders, competitors of the bank and partners of the banking institution. After analyzing the approaches of scientists to understanding the concepts of "threat" and "danger", we give our own understanding of the term "threat to credit activity", which means explicit and implicit actions of competitors, borrowers and bankers aimed at lending operations institutions and need active and passive actions to reduce their negative manifestation. Threats to the security of banks' lending can be divided into two major groups - internal (microeconomic) and external (macroeconomic). External (macroeconomic) threats include factors that are the result of the impact of the external environment on the bank's lending activities. Internal (microeconomic) threats include factors that are either directly generated by the bank or are part of its internal environment. The deepening of the crisis in the economy of Ukraine requires an objective and unbiased assessment of the security of credit activity of banks in order to timely diagnose and prevent threats, as well as develop an adequate and effective strategy for managing credit security of banks. The development of an effective mechanism for improving the level of credit security of banks should be based on the assessment of threats to this security. The completeness, timeliness and effectiveness of management measures to eliminate, prevent and prevent existing and potential threats to lending activities largely depend on an adequate assessment of the current level of security of the bank's lending activities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Zhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang und Shujun Li. „Multi-Source Knowledge Reasoning for Data-Driven IoT Security“. Sensors 21, Nr. 22 (15.11.2021): 7579. http://dx.doi.org/10.3390/s21227579.

Der volle Inhalt der Quelle
Annotation:
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

WENDT, Jan A. „CRITICAL ASSESSMENT OF THE OPERATION OF THE STATE SECURITY SYSTEMS IN POLAND“. Revista Română de Geografie Politică 24, Nr. 2 (30.12.2022): 74–81. http://dx.doi.org/10.30892/rrgp.242105-360.

Der volle Inhalt der Quelle
Annotation:
The undertaken research on the assessment of the operation of state security systems is an attempt to critically assess them from the point of view of a citizen. The aim of the work is to analyze the systemic approach to security in relation to its actual state. The work uses methods typical of social sciences, which include security sciences. To carry out the research, monographic methods, qualitative content analysis and comparative analysis were used. The work indicates that a number of security threats occurring in the country were analyzed. Among those causing the greatest problems, and at the same time neglected, are social threats related to demographic problems. Economic threats related to the current financial situation and threats resulting from poor protection of cyberspace. It was pointed out that, despite the existence of appropriate systems to counteract the threat, there is a lack of it. The repeatability of events constituting a threat and the lack of implementation of real actions that prevent threats were emphasized.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Febriana, Henny, Dewi Sartika Br Ginting, Fuzy Yustika Manik und Mahyuddin. „The Applied Aproach Impact Information Security For Government and Company (A Review)“. Data Science: Journal of Computing and Applied Informatics 6, Nr. 1 (21.03.2022): 45–54. http://dx.doi.org/10.32734/jocai.v6.i1-7935.

Der volle Inhalt der Quelle
Annotation:
The Government and industry are currently using information and communication technology a lot. The Government and companies in Indonesia have regulations on operational standards and management procedures for information and communication systems security at Government regarding implementing information system security. Information security is essential because there are many threats to information security. Information security in this era of Information and Communication Technology (ICT) is fundamental. Information Exchange Environment (IEE) vulnerabilities have increased as threats become more widespread and complex; therefore, information security has become a fundamental problem for businesses, organizations, and governments. So, in this paper, we will explain the review of the impact of Information Security For Government and companies in terms of threats and types of information security. Some security system methods are analyzed, among others—application Security, cloud security, Cryptography, security infrastructure, Incident response, and vulnerability management. The results of this review analysis, it known threat has several solutions, each depending on the type of threat for both the Government and the Company. Furthermore, Information Security is considered very important, especially for data stored in Government and companies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Forca, Božidar, Dragoljub Sekulović und Igor Vukonjanski. „Actual Challenges, Risks and Security Safety“. Security science journal 1, Nr. 1 (31.07.2020): 65–83. http://dx.doi.org/10.37458/ssj.1.1.6.

Der volle Inhalt der Quelle
Annotation:
Security is one of the most common terms in the modern world. This statement is supported by the fact that the term security is used in a wide range of areas. The subject of this paper is national security and the challenges, risks and threats to that security in contemporary international relations. The purpose of the work is twofold. First, to show the diversity of theoretical understanding of the term challenge, risk and threat by various authors. On the other hand, the overriding goal is to analyze the relationship to the challenges, risks and threats in different countries. When it comes to national security, challenges, risks and threats, most often, are identified in a document called the national security strategy. This document, as one of the highest in the hierarchy of political acts of every state, when it comes to security, is passed by almost all modern states of the world. The analysis of numerous national security strategies has revealed that it is possible to identify: 1) the challenges, risks and threats that appear in all strategies, 2) the challenges, risks and threats of security that appear in most strategies, and 3) the challenges, risks and threats of security which are country specific.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Zharkov, Grigory, und Vadim Shevtsov. „Analysis of Information Threats to Industrial Security“. NBI Technologies, Nr. 2 (Dezember 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.1.

Der volle Inhalt der Quelle
Annotation:
Information security of an enterprise (IS of an enterprise) is the state of security of data, objects of informatization of an enterprise and its interests. IS of an enterprise is achieved only when such properties of the basic properties of IS as confidentiality, integrity, availability of information and the technical component of an enterprise involved in technological processes are met. Ensuring IS of an enterprise is effective only with a systematic and comprehensive approach to protection. The information security system should take into account all current information threats and vulnerabilities. Information security threats are analyzed to determine the full set of requirements for the developed security system. A threat is considered relevant if it can be implemented in the information system of the enterprise and poses a threat to information with limited access. It is shown that the list of threats to information security of an industrial enterprise is very wide and is limited not only to those considered in this article. It is very important to maintain a high level of enterprise information security, especially at critical information infrastructure facilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

HENTZ, JAMES J. „The Southern African security order: regional economic integration and security among developing states“. Review of International Studies 35, S1 (Februar 2009): 189–213. http://dx.doi.org/10.1017/s0260210509008481.

Der volle Inhalt der Quelle
Annotation:
AbstractTheories in international relations, predicated on particular assumptions, for explaining the relationship between regional economic integration and regional security miss the challenges to security in the developing world. Unlike the developed world, regional interdependence in much of the developing world engenders negative externalities. The relationship between regional economic integration and regional security depends on the nature of the security threats that define the region – traditional state vs state threats on one hand versus new security threats on the other hand. The nature of the security threat, or security dilemma, will determine how different forms of regional economic integration, laissez faire, functional, and developmental, define or re-define a particular regional security order. Building a ‘security community’ in the developing world, therefore, calls for new architectural principles. In the case of southern Africa, both, laissez faire (free trade area) and functional cooperation (spatial development initiatives) will foster insecurity rather than security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Bojanić, Dragan. „The theoretical and methodological analysis of challenges, risks and threats in modern theory of national security“. Vojno delo 74, Nr. 2 (2022): 1–17. http://dx.doi.org/10.5937/vojdelo2202001b.

Der volle Inhalt der Quelle
Annotation:
Basically, every type of government organization defines the defence system with functions that provide deterrence from threats, as well as countering various types and forms of threats to main social values. The subject of this paper is the national security strategy, i.e. security challenges, risks and threats that are essential for the fulfilment of the highest state security interests. The author has analysed the main categories of national security theory: "danger", "challenge", "risk" and "threat". On the basis of the definition and comparative analysis of these categories, presented in different sources, he reveals their content and essence and comes to the conclusion that, despite the semantic similarity of the categories "challenge", "risk and "threat", each of them defines a different degree of threat, that is, damage. Accordingly, it has been noticed that the National Security Strategy of the Republic of Serbia does not make a distinction between security challenges, risks and threats, but speaks of them as a single syntagm and category. Since this document is the basis for the integrated activities of the defence forces, in the function of protecting vital national interests, the considered issue indicates the importance of as precise definition of SCRT as possible because inaccurate definition could prevent an adequate response when some of security challenges, risks and threats manifest themselves on security object references. On the basis of the definition and comparative analysis of the definitions of these categories, mentioned in different sources, it can be concluded that, despite the semantic similarity of the categories "challenge", "risk and "threat", each of them defines a different degree of threat, that is, harmful consequences. The subject of this paper has been to make a distinction between SCRT in order to improve the methodology for identifying and assessing military and non-military challenges, risks and threats when developing the National Security Strategy and other strategic and doctrinal documents. Accordingly, in reality, dynamics from several security sectors (political, military, economic, social, ecological and informational) is intertwined in most security problems. The analytical framework of the sectoral approach of the Copenhagen School has been proposed for the analysis of manifest forms of threats to national security. The implementation of the analytical framework is possible within the multicriteria mathematical model. Since risk is a measurable value, the implementation of this concept increases the objectivity of the identification and assessment of SCRT for state security. This approach is important not only in terms of defining national security policy and defence policy, but also has the greatest impact on the development plans of the defence system as a whole, particularly the development of the capabilities of the Serbian Armed Forces.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie