Journal articles on the topic 'Cybernetic attacks'

To see the other types of publications on this topic, follow the link: Cybernetic attacks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybernetic attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile, and Nurettin Erginoz. "Massive Cyber-Attacks Patterns Implemented with BDI Agents." Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper treats the new phenomenon of cyber-war as a new form of human violence between states. The concept of cyber-attack is a particular form of cybernetic war and it is one expensive in terms of cost. We tried to achieve a uniform approach of technological and sociological type using BDI agents and thus making the step to addressing computational sociology of cyberspace. We present two patterns of massive type attacks applicable in cyber space using BDI agents. The approach using BDI agents turned to be flexible and capable to model complex forms of cyber bullying that can occur between two countries in future.
2

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu, and Ramona Lile. "Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures." Applied Mechanics and Materials 841 (June 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This work aims to assess how the infrastructure of production & transport of the electric energy can be annihilated in a nation-state through a cyber attack, as a particular form of manifestation of cybernetic warfare. In this study we consider that the purpose of the cyber attack is only to remove servers from service, logically or physically. There are several standards that integrate the business side of a company with the level of supervision of industrial infrastructure and with the level of control engineering. These levels are integrated and are using different protocols. To simulate cyber-attacks between the countries with flexible potential escalation there are used BDI (Belief-Desire-Intention) agents which allow to separate treatment of different types of attacks. Inspired by the study of nuclear attacks implemented using the game theory, the flexibility of the BDI paradigm increases research potential of decision trees using this type of agent in other areas of human existence, like modeling human behavior at policy states makers or cyberspace executive users.
3

Kubanov, E. V. "Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration." Public administration aspects 6, no. 8 (September 10, 2018): 49–55. http://dx.doi.org/10.15421/151846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article analyzed the scientific approaches to the concept of «cybersecurity». The author defined the concept of «cybersecurity of the public administration system», which is understood as the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. The article identified internal and external threats. The author highlighted the main elements of the cybersecurity system of public administration, in particular: information, information and communication systems; threats; mechanisms of providing cybersecurity of the public administration system; subjects of the cybersecurity of the public administration system.Integration of Ukraine into the European space and the reform of the spheres of economy, industry and defense has called for a radically new approach to information and cybernetic security. Cyberspace as an arena of conflicts between states, organizations, and officials is one of the most pressing problems of the present.The article analyzes the scientific approaches to the concept of «cyber security» and states that cybersecurity of the system of public administration is the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. Separate internal (corruption actions; hardware bookmarks in chips and firmware of computer and network equipment; weak organization of the cyberspace management system) and external threats (targeted attacks, cyberterrorism, cyberwar, hatcism, attacks on banking systems, attacks on e-government).
4

Dudek, Wojciech, and Wojciech Szynkiewicz. "Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.
5

Akhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova, and Sh Sagyndykova. "Decision support system for assessing the consequences of cyber attacks." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, no. 1 (March 15, 2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The architecture of the Bayesian_Net decision support system (DSS) is described, which was developed to analyze data on signs of anomalies and cyberattacks based on the use of Bayesian Networks (BN) for this task. The proposed DSS is distinguished by the use of object-oriented programming and has a modular architecture. The Bayesian_Net DSS is designed to solve data mining problems, in particular, to analyze weakly structured problems related to cybernetic security (CS) of informatization objects (IO), and to assess the consequences of cyber attacks in conditions of weakly structured data on signs and detected anomalies.
6

Osak, Alexey, Daniil Panasetsky, and Elena Buzina. "Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization." E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecurity of automatic control systems, such as relay protection devices (RP), devices of regime control (RC) and emergency control (EC), automated control systems. At the same time, the issues of cybersecurity include not only the problem of hacker attacks, but also the whole complex of problems relating to adequate functioning of cybernetic systems in the power industry. The authors consider two of the most acute aspects of cybersecurity in the energy systems of the future in the era of total digitalization: large-scale prepared cyber attacks on the electrical power systems (EPS) as a whole and large-scale cyber attacks on distribution networks with small-scale generation facilities and active consumers.
7

Laktionov, Illia, Andrii Kmit, Ivan Opirskyy, and Oleh Harasymchuk. "RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.
8

Shukla, Prashant Kumar. "An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things." International Journal of Wireless and Ad Hoc Communication 7, no. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is a cutting-edge piece of cybernetic infrastructure that will eventually link all manner of previously disconnected physical objects to the web. The IoT is rapidly expanding into many facets of human life. IoT's attack surface has grown as a result of the technology's hyper-connectivity and inherent heterogeneity. In addition, IoT devices are used in both managed and unmanaged settings, leaving them open to innovative attacks. Fog computing is used in the proposed intrusion detection system for IoT applications to implement intrusion detection in a decentralised manner. Attack detection at fog nodes and summarization on a cloud server make up the proposed system's two parts. The local fog nodes in the IoT environment examine the traffic, and then they send a report to the cloud server that summarises the current global security state of the IoT application. According to the results of the experiments, the fog nodes are able to identify the attack 27% more quickly while also reducing the number of false alarms. The work that has been recommended provides a beginning point for the creation of a fog-based intrusion detection system that can be used for applications related to the IoT. The proposed system has a false alarm rate of only 0.32% and an accuracy of 98.15 percent. The proposed method can only identify attacks that conform to specific patterns.
9

Yuyukin, I. V. "Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness." Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, no. 3 (July 30, 2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A hypothesis about the possibility of using a spline standard of mapped informativeness of correlation-extreme navigation as a potential for cybernetic awareness is put forward. The expediency of understanding cybernetic awareness as an ontological engineering of the geometric implementation of a spline fragment of mapping to ensure the principle of alternative positioning is revealed. The forecast of the achievability of the effect of the vessel location predictability in the local environment of the satellite signals incapacity in the practical realization of the potential of situational awareness is made. The possibility of conceptual resistance of the developed algorithms of malicious virtual interference due to the unique composition of spline functions in assessing the vulnerability of the bridge onboard computers to a cybernetic threat is substantiated. Attention is focused on the fundamental impossibility of distorting the spline standard of informativeness to disrupt the classical process of linking the measured exposure of the navigation field to the reference one to ensure autonomous positioning of moving objects in any hacker attacks on the target mathematical asset. The main reason for the stability of approximation constructions, which lies in the piecewise architecture of the spline, when local violations of mathematical composition do not affect the overall task of forming a realistic navigation isosurface as a graphical structure of semantic modeling, is revealed. The proposals of effective information processing as attributes of cybernetic awareness are tested on the example of computer visualization of measuring fields of bathymetry and maps of magnetic anomalies in the form of fragments of threedimensional spreading of the planetary magnetic field. The developed package of application programs is adapted to synthesize a spline standard of mapped informativeness in the cybernetic awareness paradigm as an intellectual support for decision-making by a navigator in order to reduce his psychological cognitive load. It is proposed to use the potential of situational awareness as a mathematical support for an automated navigation system with artificial intelligence within the framework of the concept of unmanned navigation in strategic accordance with the A-Navigation project. The fundamental importance of a positive assessment of cybernetic awareness in promoting the practical use of autonomous marine surface vessels in modern navigation practice is determined.
10

Dhirani, Lubna Luxmi, and Thomas Newe. "Securing industry 5.0 using 6σ CYBERNETIC framework." Mehran University Research Journal of Engineering and Technology 43, no. 2 (April 7, 2024): 220. http://dx.doi.org/10.22581/muet1982.3202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The data-driven digital economy highly relies on immersive and emerging technologies, mass customisation, autonomous systems, and seamless connectivity. Enabling such an Industrial IoT/Industry 5.0 environment requires streamlined and end-to-end transparent methods for insights, visibility, and control. However, it is important to note that its success depends on data security metrics. The recent cyber-attacks in healthcare and industrial infrastructures have led service providers to high-risk scenarios. From supply chain to service delivery, remote functionality variables, enabling a fully connected factory is a major cybersecurity concern as emerging technologies employ different security requirements. To mitigate these risks, strategic, operational, technical, and cybersecurity alignment is a must, where the gaps between the production and process environments must be bridged to achieve the prime goal of a sustainable, secure, and technologically innovative factory. This research provides a systematic approach to bridging Industry 5.0’s QoS metrics and security gaps by implementing a Six Sigma (6σ) approach in a manufacturing environment. The approach further maps IT/OT, cloud, and cybersecurity standards, thereby enabling insights, visibility, and control. A healthcare 5.0 use-case is demonstrated to show how a 6σ implementation can improve the QoS metrics, unifying standards to achieve a secure, sustainable, resilient, and high-performance environment.
11

Toctaquiza, Juan, Diego Carrión, and Manuel Jaramillo. "An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks." Energies 16, no. 6 (March 21, 2023): 2879. http://dx.doi.org/10.3390/en16062879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Currently, operating electrical power systems (EPS) is a complex task that relies on the experience of the operators or the strength of algorithms developed for autonomous operation. The continuous operation of EPS is vulnerable to intentional cybernetic and physical attacks. With the most significant extension and distribution in the EPS, the transmission lines are most exposed to potential attacks. Before this, the entire behavior of the EPS changes, and, on occasions, a blackout can even be generated. The present investigation focused on developing a methodology for reconfiguring the power system against intentional attacks, considering the topology change through optimal switching of transmission lines (OTS) based on optimal DC flows and quantifying the contingency index, which allows for the identification of the weaknesses of the EPS. The methodology was applied to the IEEE 30−bus system, and contingencies were randomly generated, as is typical with intentional attacks. The study successfully identified the reconfiguration strategy of EPS based on OTS-DC, mitigating potential problems such as line loadability and voltage angle deviation in the nodes.
12

de Brito, Israel Barbosa, and Rafael T. de Sousa. "Development of an Open-Source Testbed Based on the Modbus Protocol for Cybersecurity Analysis of Nuclear Power Plants." Applied Sciences 12, no. 15 (August 8, 2022): 7942. http://dx.doi.org/10.3390/app12157942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these plants through computer simulations and hardware in the loop configurations. However, general results in this area are limited by the cost and diversity of existing commercial equipment and protocols, as well as by the inherent complexity of the nuclear plants. In this context, this work introduces a testbed for the study of cyber-attacks against a realistic simulation of a nuclear power plant. Our approach consists in surveying issues regarding realistic simulations of nuclear power plants and to design and experimentally validate a software testbed for the controlled analysis of cyberattacks against the simulated nuclear plant. The proposal integrates a simulated Modbus/TCP network environment containing basic industrial control elements implemented with open-source software components. We validate the proposed testbed architecture by performing and analyzing a representative cyberattack in the developed environment, thus showing the principles for the analysis of other possible cybernetic attacks.
13

Leszczuk, Sylwia. "Cyber conflict in the light of article 5 of the North Atlantic treaty." Історико-політичні проблеми сучасного світу, no. 39 (June 16, 2019): 12–20. http://dx.doi.org/10.31861/mhpi2019.39.12-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid development of technology and hence also the cybernetic sphere, including the associated difficulties in defining it, as well as the occurrences within it and the lack of upholding legal regulations and too little awareness in public and private life as to the dangers it may generate, make it serve as a basis for the development of advanced and difficult to neutralize threats that are able to affect the real world. The most important in the context of the text are cyber attacks and cyberwar. Due to the impact that the virtual world can have on reality, organizations such as NATO must finally adapt to changes taking place in the real world. The aim of the text is to take a look at an possibility of invoking the famous article 5 of the North Atlantic Treaty by a member state of NATO. Keywords: cyberspace, cyberwar, cyber attack, cyberconflict, NATO, article 5 of the North Atlantic Treaty.
14

Kybich, Yana. "Peculiarities of the cybersecurity of Ukraine formation in the conditions of hybrid war." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 94–111. http://dx.doi.org/10.31861/mediaforum.2018.6.94-111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the article, the problem of information security of Ukraine at the present stage of development in the context of the information society evolution was analysed. The theoretical approaches to the definition of the essence of the concept of “cybersecurity”, “cyberspace” by Ukrainian and foreign scientists were discovered. It is determined that these concepts are widely used in modern science, but there is still no their clearly defined meaning, which, accordingly, complicates scientific comprehension and practical overcoming of problems and threats in the information space of Ukraine and harms the national interests of the state. The legal framework of Ukraine, which regulates the sphere of information security, in particular, legal acts adopted since 2014, were described. It has been proved, that cybernetic attacks on state information resources have become an integral part of the hybrid war, unleashed by Russia. It is indicated that with the onset of Russian military aggression, the transformation of national information legislation, including the one on cybersecurity, took place. The priority directions of the state policy in the field of ensuring the cybernetic security of Ukraine in the conditions of hybrid war were researched.
15

Markov, A., and N. Romashkina. "The Problem of Identifying the Source (Atribution) of Cyberattacks – An International Security Factor." World Economy and International Relations 66, no. 12 (2022): 58–68. http://dx.doi.org/10.20542/0131-2227-2022-66-12-58-68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The work is devoted to the problem of attribution of cyberattacks as one of the top important issues on the global agenda of world politics. The subject of this research is targeted offensive computer attacks that perform state tasks. The authors have systematically analyzed the conceptual apparatus, classification features and general indicators, a set of problems related to identification of reliable sources of cyberattacks, as well as the features of targeted attacks and cybernetic groups supported by state actors. This allowed to conclude that the problem of attribution is emerging as a new scientific direction in the field of international information security. Based on the analysis of relevant studies of academic institutions and private companies, an attribution classification was proposed. It was utilized to review conceptual informal models of targeted computer attacks. The authors have analyzed issues of the applied methodological apparatus, which may affect the reliability of conclusions on imposing responsibility on the perpetrator of cyber-attack, while noting that there is a contradiction between the perception of the attribution results by various political blocs and unions. At the same moment, the USA and its allies are reported to pursue a policy of dominance in the field of attribution of targeted cyber-attacks. The paper proves the impact of modern breakthrough information technologies of the Fourth Industrial Revolution on the security of cyberspace as well as the impact of the attribution problem on the level of international security and strategic stability. This issue includes a complex set of political, regulatory, organizational and technical tasks with a high degree of uncertainty, where political aspects are playing a central role. The conclusions are confirmed by the statistics of public reports of IT companies and publications of leading research institutes. The main scientific result of the work is formulation of the problem of divergence in the attribution of computer attacks between political blocs and alliances, which negatively affects international security. The authors propose topical measures to solve the problem of attribution of cyberattacks.
16

Sztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny, and Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation." Sensors 23, no. 5 (March 3, 2023): 2778. http://dx.doi.org/10.3390/s23052778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable (PV), setpoint (SP), and control signal (CV). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach’s applicability, effectiveness, and limitations and identify further research directions.
17

Shuklin, German, and Oleg Barabash. "Model of cybernetic attacks intensity calculation in the electronic trading system on the stock market." Advanced Information Systems 2, no. 3 (November 28, 2018): 111–14. http://dx.doi.org/10.20998/2522-9052.2018.3.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sunhurova, S. R. "TYPES OF CYBERNETIC ATTACKS OF THE RUSSIAN FEDERATION AND THEIR SOCIO-POLITICAL CONSEQUENCES FOR UKRAINE." Scientific Journal "Regional Studies", no. 28 (2022): 88–91. http://dx.doi.org/10.32782/2663-6170/2022.28.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Macana, Carlos, Ahmed Abdou, Hemanshu Pota, Josep Guerrero, and Juan Vasquez. "Cyber Physical Energy Systems Modules for Power Sharing Controllers in Inverter Based Microgrids." Inventions 3, no. 3 (September 11, 2018): 66. http://dx.doi.org/10.3390/inventions3030066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Microgrids (MGs) are an effective way to deal with the smart grid challenges, including service continuity in the event of a grid interruption, and renewable energy integration. The MGs are compounded by multiple distributed generators (DGs), and the main control goals are load demand sharing and voltage and frequency stability. Important research has been reported to cope with the implementation challenges of the MGs including the power sharing control problem, where the use of cybernetic components such as virtual components, and communication systems is a common characteristic. The use of these cybernetic components to control complex physical systems generates new modeling challenges in order to achieve an adequate balance between complexity and accuracy in the MG model. The standardization problem of the cyber-physical MG models is addressed in this work, using a cyber-physical energy systems (CPES) modeling methodology to build integrated modules, and define the communication architectures that each power sharing control strategy requires in an AC-MG. Based on these modules, the control designer can identify the signals and components that eventually require a time delay analysis, communication requirements evaluation, and cyber-attacks’ prevention strategies. Similarly, the modules of each strategy allow for analyzing the potential advantages and drawbacks of each power sharing control technique from a cyber physical perspective.
20

Osak, Alexey, Daniil Panasetsky, and Elena Buzina. "Analysis of the emergency control and relay protection structures approached from the point of view of EPS reliability and survivability by taking into account cybersecurity threats." E3S Web of Conferences 139 (2019): 01029. http://dx.doi.org/10.1051/e3sconf/201913901029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecurity of automatic control systems, such as relay protection devices (RP), devices of regime control (RC) and emergency control (EC), automated control systems. At the same time, the issues of cybersecurity include not only the problem of hacker attacks, but also the whole complex of problems relating to adequate functioning of cybernetic systems in the power industry. The authors propose a methodical approach to the analysis of the structure of automatic means of regime and emergency control in terms of their impact on the reliability and survivability of power systems (EPS), taking into account the known threats to cybersecurity.
21

Sallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, and Majdi Ben Saad. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework." International Journal of Information Security and Privacy 5, no. 4 (October 2011): 47–58. http://dx.doi.org/10.4018/jisp.2011100104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and more flexible to conceal the crime evidences. Although people are in an unsafe digital environment, they often feel safe. Being aware of this fact and this fiction, the authors draw in this paper a security framework aiming to build real-time security solutions in the very narrow context of high speed networks. This framework is called (f|p) since it is inspired by the elefant self-defense behavior which yields p (22 security tasks for 7 security targets).
22

Mujević, Mersad. "SYNTHESIS OF THREATS AND RISKS OF CYBER SECURITY OF MONTENEGRO - THE VULNERABILITY ASPECT OF INFORMATION COMMUNICATION INFRASTRUCTURE." SCIENCE International Journal 1, no. 1 (December 13, 2022): 1–12. http://dx.doi.org/10.35120/sciencej010101m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
That there are no untouchables and that cyber threats are entering Montenegro through the big doors, is indicated by the hacker attack on the Government of Montenegro. Fortunately, the hackers did not get hold of confidential data, but their act itself caused a serious act of endangering state security, especially because they breached the system that is networked with all state bodies. It was not the first time in 2022 that hackers broke into Government IC systems and state and private companies and organizations. Experts from the IT sector have been warning about the vulnerability of the system for a long time, but not loudly enough to be taken seriously. Let’s also mention the attack on Montenegro on the eve of joining NATO, where Montenegro was under increased cyber attacks, and the Ministry of Defense says that it is similar today.Cyber is no longer the world of gamers and geeks, it is increasingly becoming a prefix for terrorism, crime, and other types of threats (Kazerić 2017). Internet trade and the use of electronic services such as e-government are also on the rise. To the global trend, almost everything that was only tangible and materialized in the real world is moving to the virtual community. This brings with it many advantages, but also disadvantages, and one of them is certainly the vulnerability of critical information and communication infrastructure and the danger of cyber attacks. In such circumstances, the issue of security partially shifts the focus to cyber, that is, cyber security. Precisely for this reason, it is necessary to take a critical look at the existing information and communication infrastructure and analyze the existing threats and risks brought by the modern, cybernetic age. The synthesis of threats and risks is necessary so that we can adequately face them and predict the difficulties that may come our way, which could have significant consequences for national security.
23

Stankutė, Martyna. "Legal services today and in the future: how is changing the job of a lawyer?" Vilnius University Open Series, no. 4 (November 16, 2020): 248–73. http://dx.doi.org/10.15388/os.tmp.2020.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article is analyzing law and information technologies scientists works, were law technologies and their realization in lawyer work implies also its benefits and disadvantages through the following future. To rely on the linguistic and analysis method in this article explains the way legal technologies work in different fields, modifying individual legal services actions. Analyzing innovative technology tools and showing their practical integration and applicability trough examples. An analysis of the relationship between law technology and a lawyer today has shown what the technology gaps are and what features a lawyer will need in the future. Technologies being an innovative creations of a human and working in virtual field can‘t function without humans, so it could emerge cybernetic attacks risks. To that point helping tools would be automatic, yet it will remain an aid tool. Laws and decision making would be left for human being, however, lawyers should maintain abilities that would let them successfully integrate with modern technology changes.
24

Moskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.
25

Kalinin, Maxim, Roman Demidov, and Peter Zegzhda. "Hybrid Neural Network Model for Protection of Dynamic Cyber Infrastructure." Nonlinear Phenomena in Complex Systems 22, no. 4 (December 10, 2019): 375–82. http://dx.doi.org/10.33581/1561-4085-2019-22-4-375-382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper considers a combination of modern artificial neural networks (ANN) that solves the security relative task of intrusion prevention and vulnerabilities detection in cybernetic infrastructure with dynamic network topology. Self-organizing networks, WSN, m2m networks, IIoT, mesh networks are faced with the cyberthreats of specific character: dynamic routing failures, node isolation, DDoS attacks, traffic lack, etc. Most of them are caused by cybersecurity weaknesses: the software vulnerabilities and architectural features of dynamically reconfigured network. The existing methods of binary code analysis and intrusion detection can work with a small number of data sets, are designed for either code inspection or network checking, and are targeted for static networks with regular topology. The proposed neural model demonstrates an universal approach that deals with the cybersecurity weakness as a systems genuine property and attempts to approximate it using a hybrid deep ANN. The new ANN detects both the network security defects and binary code vulnerabilities at once with high accuracy (more than 0.97). It also shows good performance capacity processing big data of the undercontrolled network.
26

Minaev, V. A., I. D. Korolev, and V. V. Mukhortov. "INTEGRATED ASSESSMENT OF STABILITY FUNCTIONING COMPLEX TECHNICAL SYSTEMS IN THE TECHNO AND INFO SPHERE." Issues of radio electronics, no. 5 (May 20, 2018): 89–94. http://dx.doi.org/10.21778/2218-5453-2018-5-89-94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article deals with the issues of integrated assessment of complex technical systems stability functioning in techno sphere and info sphere. It is shown that the concept of cyber stability, including its components such as cyber reliability, noise immunity and cyber survivability are insufficiently investigated and defined. The formal definition is given and the scale with various gradation of cyber survivability is entered. On the example of robotic systems in form of drones two variants of mathematical models of cyber survivability estimation are considered. The first variant is related to the description of drones functioning in the conditions of computer attacks without impact protection systems. The second variant reflects the functioning of drones under the conditions of impacts in the presence of adaptive combined cybernetic protection system. In both variants, two strategies are considered - with minimal and maximum intensity of effects on the drone. It is concluded that proposed in the paper approach enables to evaluate the integrated stability of complex technical systems in the techno sphere and info sphere at the same time.
27

Subach, Ihor, and Vitalii Fesokha. "Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules." Collection "Information technology and security" 5, no. 2 (December 31, 2017): 145–52. http://dx.doi.org/10.20535/2411-1031.2017.5.2.136984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Novikova, А. "SOCIO-POLITICAL PROCESS AND INFORMATION SECURITY OF TRANSBAIKALIA AS PROTECTION OF NATIONAL INTERESTS." TRANSBAIKAL STATE UNIVERSITY JOURNAL 28, no. 5 (2022): 70–76. http://dx.doi.org/10.21209/2227-9245-2022-28-5-70-76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper analyzes the information security of Transbaikalia and shows the relationship of the socio-political process, information technology and security. Threats to information security are virus attacks, hacker hacks as elements of cybernetic crime. It is obvious that social risks are expanding and negatively affect the protection of vital interests of Russia and its subjects. Among the areas of national security, special attention is paid to information security from the point of view of protecting the information space of the Russian Federation. Each state considers it an urgent and priority task to ensure the information security of its country and citizens. As a consequence, there is a problem of information protection. In the conditions of increased dangerous information impacts in the world, the protection of personal, public and state information is of paramount importance for any state. It is advisable to combine all efforts to overcome information risks that have not only a social, but also a political component. The characteristic of the political process, the concept of which is borrowed from cybernetics, is given, its structure is substantiated: subjects and participants of the process; the object of the process; methods, means, resources that connect the subject and the object. Individuals, political systems, the state, and parties are the subjects of the process characterizing politics that require attention. The subjects of the political process also include the information component. In the modern period, Russia has set a course for the realization of national interests in the information sphere. National interests presuppose a system for ensuring the security of information systems. The main thing in the information sphere is the protection of authorities from information manipulation, which, of course, is connected with the socio-political process. It is advisable to use the Internet, the development of electronic document management, the presence of a system administrator, which will contribute to the creation of a unified information space.
29

Honório, Thiago Jacobino. "O uso de ciberataques em eleições e as Relações Internacionais | The use of cyberattacks in elections and International Relations." Mural Internacional 9, no. 1 (June 30, 2018): 85–98. http://dx.doi.org/10.12957/rmi.2018.32570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Durante a campanha presidencial dos Estados Unidos no ano de 2016 o governo do país acusou agentes de inteligência russa de usarem ataques cibernéticos contra a empresa que produzia softwares que são usados no sistema eleitoral do país. Apesar de interferências em democracias não serem novas, o caso representa uma tendência na qual o meio cibernético torna-se um valioso recurso, pois, com o avanço da tecnologia da informatização os sistemas eleitorais vem se tornando digitalizados acarretando grande vulnerabilidade especialmente para os países em desenvolvimento. O trabalho tem por objetivo expor a questão do uso dos ataques cibernéticos em eleições. Sustenta que haverá uma tendência a este tipo de intervenção como estratégia política de atores internacionais. Como estudo de caso o trabalho irá se basear na eleição dos E.U.A em 2016 e eventos semelhantes no mesmo período.ABSTRACTDuring the United States presidential campaign in 2016, the country's government has accused Russian intelligence agents of using cyber attacks against a company that produces software used in the country's electoral system. Although interference in democracies is not new, the case represents a trend in which the cybernetic medium becomes a valuable resource because the advancement of computer technology electoral systems are becoming digitalised which are causing great vulnerability especially for developing countries. This paper aims to expose the issue of the use of cyber attacks in elections. It sustains that there will be a tendency to this type of intervention as a political strategy of international actors. As a case study the work will be based on the US election in 2016 and similar events in the same period.Palavras-chave: Relações Internacionais; ciberataques; eleiçõesKeywords: International Relations, cyberattacks; elections Recebido em 30 de Janeiro de 2018.
30

Ramos, Angélica, Elizabeth Torres Ramos, Abigail Alonso Reyes, and Laura Segundo Gil. "Continuidad de negocio, análisis de la exposición al riesgo de ataques cibernéticos en empresas micro y pequeñas de la región Atlautla, Ozumba y Amecameca." Revista Relayn - Micro y Pequeñas empresas en Latinoamérica 5, no. 2 (November 9, 2021): 148–66. http://dx.doi.org/10.46990/relayn.2021.5.2.338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
El estudio cuantitativo de diseño descriptivo-correlacional se realizó a partir de datos recolectados en la investigación anual 2020 de la Red de Estudios Latinoamericanos en Administración y Negocios (Relayn) de una muestra de 401 directivos de micro y pequeñas empresas de los municipios de Atlautla, Ozumba y Amecameca Estado México, con el objetivo de ponderar su exposición al riesgo de ataques cibernéticos medido a través de la relación entre la incorporación tecnológica y la implementación de software de seguridad informática con la intención de inferir su impacto en la continuidad de negocio. Se encontró una relación directa entre las variables de estudio, con r = 0.725. AbstractThis quantitative research of descriptive-correlational design was performed with data recollected during the annual investigation of Latin American Studies Network in Business and Administration (Relayn) in 2020 from a sample consisting of 401 micro and small business directors from the municipality of Atlautla, Ozumba and Amecameca, Mexico State with the objective of weighing vulnerability of cybernetic attacks measured by the relationship between incorporation of technology and implementation of computer security software with the intention of inferring the impact it has on a businesses continuity. A direct relationship was found among study variables, with r = 0.725.
31

Buriachok, Volodymyr L., Svitlana M. Shevchenko, and Pavlo M. Skladannyi. "VIRTUAL LABORATORY FOR MODELING OF PROCESSES IN INFORMATIONAL AND CYBER SECURITIES AS A FORM OF FORMING PRACTICAL SKILLS OF STUDENTS." Cybersecurity: Education, Science, Technique, no. 2 (2018): 98–104. http://dx.doi.org/10.28925/2663-4023.2018.2.98104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The number of hacker attacks and material damage that lately has hit the world is increasing every year. All this indicates that the need for specialists capable of detecting and assessing signs of third-party cyber-impacts, modeling the possible situations of such influence and forecasting their possible consequences, organizing and supporting a set of measures to ensure information and cybersecurity and counteract the unauthorized penetration of the opposing sides to their own IT systems and networks, provide cryptosecurity of their own information resource, etc. - will grow. This article focuses on the fact that the issue of cyber-security of data was particularly acute in Ukraine. Indeed, the quality of the information we receive depends on our future, including the future of our state. At the same time, the article stresses that no pedagogical theory will be implemented in educational activities, unless an appropriate algorithm is developed for its implementation - the algorithm of forming the professional competences of future specialists in the field of information and cyber security. On the basis of scientific pedagogical literature, the article defines the concept of "virtual laboratory" and its significance in the educational process of the institution of higher education. The relevance of the implementation of the laboratory for modeling processes in information and cybersecurity is substantiated. The virtual "cyberpolygon training" laboratory of the Borys Grinchenko University of Kyiv and the possibility of its use by students in the process of learning technologies in information and cybernetic security are presented.
32

Romashkina, N. P. "The International Legal Regime of Control over Cyber Weapons in the Future World Order: Threats and Prospects." Diplomaticheskaja sluzhba (Diplomatic Service), no. 2 (March 31, 2023): 150–61. http://dx.doi.org/10.33920/vne-01-2302-07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article is devoted to the analysis of the growing number of problems in the global environment of information and communication technologies (ICT), which characterize the current crisis military-political situation. Until recently, experts from different countries spoke about many of them purely theoretically, and possible scenarios of using ICT for malicious infl uence on military critical infrastructure were sometimes even denied. Now this problem is not only recognized by the scientific and expert community, but we are already talking about the voiced facts of the practical use of cyber weapons, other information and cyber means in the conditions of the crisis. Thus, the malicious use of ICT can provoke the outbreak of an interstate military confl ict. First of all, because of the disproportionate use of methods of responding to threats and attacks, when the aff ected party can use real weapons in response. In addition, a confl ict may arise by mistake, since there is currently no universal methodology for identifying violators, criteria for classifying cyberattacks as an armed attack have not been worked out, universal principles for investigating incidents have not been formed. The issues of coordination of measures taken in response to information operations recognized as acts of use of force have not yet been resolved. As a result, information wars and the use of new technologies can become the detonator of an interstate military confl ict with the use of even nuclear weapons. Therefore, the question of the need for active actions of the "great powers" to prevent confl icts in the global information space, which in the conditions of military operations can develop into a global confl ict, is as relevant as possible. The article provides a factual analysis of ICT threats during the special military operation of Russia, explores the possibilities of creating an international regime for the prohibition of information (including cybernetic) weapons, the relevance and increasing importance of studying these processes by the scientific community. The article substantiates the formulation of the problem of international information security as part of a broader topic of international security against the background of global challenges.
33

Zegzhda, Dmitry, Daria Lavrova, Evgeny Pavlenko, and Anna Shtyrkina. "Cyber Attack Prevention Based on Evolutionary Cybernetics Approach." Symmetry 12, no. 11 (November 23, 2020): 1931. http://dx.doi.org/10.3390/sym12111931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper looks at the problem of cybersecurity in modern cyber–physical systems and proposes an evolutionary model approach to counteract cyber attacks by self-regulating the structure of the system, as well as several evolutionary indicators to assess the state of the system. The application of evolutionary models makes it possible to describe the regularities of systems behavior and their technical development, which is especially important regarding cyber attacks, which are the cause of a discontinuous evolution of complex systems. A practical example describes a system behavior during attacks and the self-regulation of its structure. The methodological approach consists of using evolutionary models to describe how modern cyber–physical systems can counteract cyber attacks and evolve, building on the experience of past security incidents. The main conclusions and recommendations are presented in the Discussion section, and they consist of the fact that using an evolutionary approach will not only increase the security of cyber–physical systems, but also define the principles of building systems that are resistant to cyber attacks.
34

Pączkowski, Tomasz. "Cybernetic warfare – tips from Ukraine." Res Politicae 15 (2023): 73–86. http://dx.doi.org/10.16926/rp.2023.15.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Russia’s aggression against Ukraine also marked the outbreak of a cyberwar that is fought via the Internet practically all over the world. It has covered many aspects of modern life, from trolling to using cyber technology directly on the battlefield. Modern conventional weapons without the use of advanced digital technology become very useless, without information about the battlefield, it is dramatically inaccurate. This is clearly seen in the case of the Russians who, after using up their stocks of intelligent ammunition, bomb and shell Ukraine practically blindly, causing large losses among the civilian population. We are also dealing with numerous forms of cyberattacks against European Union countries. Russian hackers make numerous attempts to attack websites and portals, both governmental and social organizations.
35

Perwej, Dr Yusuf, Syed Qamar Abbas, Jai Pratap Dixit, Dr Nikhat Akhtar, and Anurag Kumar Jaiswal. "A Systematic Literature Review on the Cyber Security." International Journal of Scientific Research and Management 9, no. 12 (December 28, 2021): 669–710. http://dx.doi.org/10.18535/ijsrm/v9i12.ec04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.
36

Konnov, Vladimir. "The discursive practices of the research program of B. F. Lomov in promotion of Soviet engineering psychology." Vestnik of Saint Petersburg University. Psychology 12, no. 1 (2022): 83–95. http://dx.doi.org/10.21638/spbu16.2022.107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article discusses a series of publications by B.F.Lomov from the 1960s aimed at promoting engineering psychology, with the analysis based on discourse analysis and political sociology of science and using articles grouped and examined in terms of print to appeal to different audiences: party elite, midlevel administrators, academia, and psychologists. The emphasis is on practices used to associate engineering psychology with the interests of relevant groups. The rise of the cybernetics movement, which aimed to consolidate scientific disciplines and to expand the political influence of science, is considered as a general context for the application of Lomov’s discursive practices. In this situation, engineering psychology had the advantage of being the branch of psychological research that was closest to the approaches of cybernetics and had the best growth opportunities in the context of the expanding influence of the latter. This trend met with natural resistance from groups that initially found themselves disconnected from cybernetics. These included groups in the humanities involved in political campaigns in science of the 1940s–1950s, including the anticybernetic campaign, as well as part of the bureaucracy that dealt with economic planning, a task that could be most affected by the rise of computer technology. Lomov built his discursive strategy in such a way as to anticipate possible critical attacks. The practices he worked out in publications under examination largely predetermined the practices that he used to promote psychology, acting as director of the Institute of Psychology in the next two decades, and thus had a noticeable impact on the development of Soviet psychology as a whole.
37

Корягина, Светлана Александровна. "Рrotecting confidential information in a university environment." Management of Education, no. 4(44) (September 15, 2021): 209–16. http://dx.doi.org/10.25726/f9834-2371-9486-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Активное развитие глобальной экономической среды и национальных систем происходит в условиях интенсивного внедрения инновационных технологий. Интеграция высокотехнологичных электронных устройств в различные процессы на уровне стран, видов экономической деятельности, отдельных предприятий и в частном жизни населения приводит к генерации значительных объемов информации. Отдельное место в качестве источника генерирования данных занимает сеть Интернет, что служит инструментом создания, накопления и передачи информации. В указанных условиях информация выступает в виде ресурса, который можно оценить в денежной форме исходя из специфики данных и спроса среди отдельных групп пользователей. Отдельные государства пытаются завладеть секретной информации других стран, компании используют промышленный шпионаж для получения секретной информации конкурентов, во многих случаях фиксируются случаи похищения персональной информации граждан с целью получения определенной выгоды и тому подобное. Приведенная ситуация приводит к разработке национальных стратегий защиты в сфере информационной безопасности и активной разработки специализированных продуктов, позволяющих с помощью аппаратного и программного обеспечения минимизировать потерю информационных ресурсов стран, компаний, граждан и тому подобное. Рынок представленных продуктов активно развивается и имеет значительный потенциал для роста, поскольку происходит непрерывная эволюция методов, которые нацелены на незаконное завладение коммерческой и частной информации. В отдельных случаях главной целью незаконно доступа к информации является блокирование доступа к ней владельцев или полное уничтожение данных, что негативно влияет на функционирование компании в целом или отдельных систем. Исходя из международного опыта и ситуации в России, в первую очередь речь идет о хакерской атаке в 2017 г. через специализированное бухгалтерское программное обеспечение M.E.Doc, следует отметить активизацию государственных мероприятий, которые ориентированы на предотвращение незаконного нарушения информационной безопасности. Например, после хакерских атак в 2017 г. был создан Ситуационный центр обеспечения кибернетической безопасности. Специфика функционирования учебных заведений предусматривает генерирование персональной информации учащихся, студентов и педагогических работников, баз данных с учебными материалами, текущей документации и тому подобное. Для обеспечения эффективного функционирования учебных структур необходимо создать действенную систему защиты информации, которая позволит минимизировать риски потери или повреждения соответствующих данных. The active development of the global economic environment and national systems takes place in the conditions of intensive introduction of innovative technologies. The integration of high-tech electronic devices into various processes at the level of countries, types of economic activity, individual enterprises and in the private life of the population leads to the generation of significant amounts of information. A separate place as a source of data generation is occupied by the Internet, which serves as a tool for creating, accumulating and transmitting information. Under these conditions, information acts as a resource that can be evaluated in monetary form based on the specifics of the data and demand among individual user groups. Individual states are trying to seize the secret information of other countries, companies use industrial espionage to obtain the secret information of competitors, in many cases, cases of theft of personal information of citizens for the purpose of obtaining a certain benefit are recorded, and so on. This situation leads to the development of national protection strategies in the field of information security and the active development of specialized products that allow using hardware and software to minimize the loss of information resources of countries, companies, citizens, and the like. The market of the presented products is actively developing and has a significant potential for growth, since there is a continuous evolution of methods that are aimed at illegal acquisition of commercial and private information. In some cases, the main purpose of illegal access to information is to block the owners ' access to it or completely destroy the data, which negatively affects the functioning of the company as a whole or individual systems. Based on international experience and the situation in Russia, first of all, we are talking about a hacker attack in 2017 through specialized accounting software M.E.Doc it should be noted the intensification of state measures that are aimed at preventing illegal violations of information security. For example, after the hacker attacks in 2017 A Situational center for Cybernetic security was created. The specifics of the functioning of educational institutions provide for the generation of personal information of students, students and teaching staff, databases with educational materials, current documentation, and the like. To ensure the effective functioning of educational structures, it is necessary to create an effective information protection system that will minimize the risks of loss or damage to the relevant data.
38

Hashimoto, Wataru. "Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 414–23. http://dx.doi.org/10.31269/triplec.v9i2.294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article is concerned with redefining the notion of information from a perspective of systems theory. In recent years, the notion of information, which was closely related to the framework of old cybernetics, has been refined in parallel with the emergence of new cybernetics, especially second-order cybernetics and autopoiesis. The systemic view of new cybernetics provides us with the notion of “informationally closed system.” This notion is congruent with the epistemological implications of radical constructivism. In order to help understand this argument, we aim at highlighting the development of autopoietic systems theory in Japan. Autopoiesis has often been considered as a thoroughly closed system in Japan, where the relationships between autopoiesis and radical constructivism have frequently been overlooked. This is mainly because the importance which autopoietic systems theory originally attaches to the notion of observer and observation has been inadequately discussed, and autopoietic systems theory is regarded as distinct from second-order cybernetics and radical constructivism. However, they must be dealt with together, and Humberto Maturana should be given credit for his ontology of observing. Since the publication of his paper “Biology of Cognition,” Maturana has been attempting to explain the notion of observation as a biological phenomenon in his own way. Likewise, by taking into consideration the notion of observation, we can build a unified theory of information. Fundamental Informatics, which is being developed by Toru Nishigaki, outlines a unified approach to information by putting human observers at the center of his theory. Social and mechanical information is generated only when human observers conduct observations on the basis of biological information, and this mechanism of generation of information is discussed through the notion of “hierarchical autonomous system.” For an autopoietic organi- zation to be realized, of course, no hierarchy of systems is required, but observers are likely to construct some hierarchy between two systems. The construction of certain hierarchies of systems by observers is of great use for the explanation of fictitious phenomena of information transmission.
39

Hashimoto, Wataru. "Autopoiesis, Observation and Informatics: Lessons from the Development of Autopoietic Systems Theory in Japan." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 414–23. http://dx.doi.org/10.31269/vol9iss2pp414-423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article is concerned with redefining the notion of information from a perspective of systems theory. In recent years, the notion of information, which was closely related to the framework of old cybernetics, has been refined in parallel with the emergence of new cybernetics, especially second-order cybernetics and autopoiesis. The systemic view of new cybernetics provides us with the notion of “informationally closed system.” This notion is congruent with the epistemological implications of radical constructivism. In order to help understand this argument, we aim at highlighting the development of autopoietic systems theory in Japan. Autopoiesis has often been considered as a thoroughly closed system in Japan, where the relationships between autopoiesis and radical constructivism have frequently been overlooked. This is mainly because the importance which autopoietic systems theory originally attaches to the notion of observer and observation has been inadequately discussed, and autopoietic systems theory is regarded as distinct from second-order cybernetics and radical constructivism. However, they must be dealt with together, and Humberto Maturana should be given credit for his ontology of observing. Since the publication of his paper “Biology of Cognition,” Maturana has been attempting to explain the notion of observation as a biological phenomenon in his own way. Likewise, by taking into consideration the notion of observation, we can build a unified theory of information. Fundamental Informatics, which is being developed by Toru Nishigaki, outlines a unified approach to information by putting human observers at the center of his theory. Social and mechanical information is generated only when human observers conduct observations on the basis of biological information, and this mechanism of generation of information is discussed through the notion of “hierarchical autonomous system.” For an autopoietic organi- zation to be realized, of course, no hierarchy of systems is required, but observers are likely to construct some hierarchy between two systems. The construction of certain hierarchies of systems by observers is of great use for the explanation of fictitious phenomena of information transmission.
40

ASIMOPOLOS, Laurentiu A., Adrian-Aristide ASIMOPOLOS, and Natalia-Silvia ASIMOPOLOS. "THE ROLE OF INTERDEPENDENCIES BETWEEN CRITICAL INFRASTRUCTURES IN RURAL DEVELOPMENT." Annals of Spiru Haret University. Economic Series 18, no. 2 (June 29, 2018): 63–81. http://dx.doi.org/10.26458/1823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the general context, the phenomenon of globalization causes an increase in risks to critical infrastructures. In order to order this set, the criteria of dependence and interdependence were imposed. Thus, was proposed a model with seven levels, the first being sector analysis and the second one the study of interdependencies.The first level is organized in critical sectors and dependencies between them. This division, which engendered the public-private partnership, is show on the EU and NATO documents. The second level of the interdependence study aims to determine the vital elements and essential components of a system. In this paper we show some considerations on the dimensionality of interdependencies between critical infrastructures, interdependence between critical infrastructures from the energy sector and Information and Communication Technology (ICT). After a breakdown of SCADA systems, we presented at the end of the paper few examples of cybernetic attack against energy infrastructures
41

Bardin, Andrea. "Simondon Contra New Materialism: Political Anthropology Reloaded." Theory, Culture & Society 38, no. 5 (May 27, 2021): 25–44. http://dx.doi.org/10.1177/02632764211012047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper responds to an invitation to historians of political thought to enter the debate on new materialism. It combines Simondon’s philosophy of individuation with some aspects of post-humanist and new materialist thought, without abandoning a more classically ‘historical’ characterization of materialism. Two keywords drawn from Barad and Simondon respectively – ‘ontoepistemology’ and ‘axiontology’ – represent the red thread of a narrative that connects the early modern invention of civil science (emblematically represented here by the ‘conceptual couple’ Descartes-Hobbes) to Wiener’s cybernetic theory of society. The political stakes common to these forms of mechanical materialism were attacked ontologically, epistemologically and politically by Simondon. His approach, I will argue, opens the path for a genuine materialist critique of the political anthropology implicit in modern political thought, and shifts political thinking from politics conceived as a problem to be solved to politics as an arena of strategic experimentation.
42

Mattiello, Elisa. "The Development of ESP Lexicon Through New Combining Forms." International Journal of English Linguistics 13, no. 7 (December 20, 2023): 5. http://dx.doi.org/10.5539/ijel.v13n7p5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper investigates the role of new combining forms in the formation of neologisms which are currently expanding the lexicon of English for Special Purposes (ESP). In the past, only neoclassical combining forms, such as initial bio- or final -logy (in biology), were productively used in ESP. Nowadays, specialized combining forms also include abbreviated forms of existing words (e.g., cyber- from cybernetic in cyber-attack), as well as secreted (i.e. reinterpreted) forms (e.g., -bot from robot denoting ‘a type of automated program or software’ in knowbot). The paper explores a set of combining forms attested since the second half of last century in the online version of the Oxford English Dictionary (OED) with the aim to demonstrate how specialized sectors, such as science or information technology, are being enriched by series of combining-form combinations. The paper conducts quantitative analyses in the Corpus of Contemporary American English (COCA) and the News on the Web Corpus (NOW) to substantiate the frequency and stability of specialized combining forms and their profitability in the formation of both novel and nonce words.
43

Shevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline "Special methods in security systems: discrete mathematics" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.
44

Griffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer, and Lucas Potter. "Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Biocybersecurity is an evolving discipline that aims to identify the gaps and risks associated with the convergence of Biology (the science of life and living organisms) and cybersecurity (the science, study, and theory of cyberspace and cybernetics) to protect the bioeconomy. The biological industries’ increased reliance on digitization, automation, and computing power has resulted in benefits for the scientific community, it has simultaneously multiplied the risk factors associated with industrial espionage and the protection of data both commercial and proprietary. The sensitive and potentially destructive power of this data and its access inherently poses a risk to the national and ontological security of a nation. Ontological security refers to the extent to which an individual or group feels secure in their understanding of the world and their place in it. It is a psychological concept that pertains to the way in which people construct their sense of self and their place in the world, and how this sense of self and place is shaped by their interactions with others and the broader social, cultural, and political context in which they live. Nation-states provide stability and wider social cohesion, but these capacities can be disrupted when the nation state is sufficiently threatened (Bolton, 2021). Leading to an interest in maintaining a national identity; which can have profound effects on the behavior of a nation. Targeted social engineering is aimed at exploiting the changing and damaged mental health of workers in life science enterprises who have not been trained in a sufficient manner to deal with these attacks. Failure to identify the existing vulnerabilities associated with social engineering would expose the bioeconomy to unnecessary risk. Numerous scholars have pointed towards growing risks of nation-state stability being increasingly threatened vs inadequate actions taken to match threats for defense; when reflecting on energy, food, construction materials and more from the multi-trillion US bioeconomy we see that the ground to cover is huge (George 2019, Jordan, 2020, Murch, 2018; Mueller 2021). This paper seeks to discuss some of the existing vulnerabilities associated with social engineering attacks and the effects those attacks would have on the population's ontological security and spark conversations about ways in which ontological security of nation states are modified.
45

Kubík, Josef, and Aleš Ruda. "Cyber security management model." International Journal of Public Administration, Management and Economic Development 8, no. 2 (December 31, 2023). http://dx.doi.org/10.60026/ijpamed.v8i2.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper, it is confronted a question of cyber security management in organizations. The whole cyber world of today is permanently exposed to various cybernetic threats and attacks, that are more or less sophisticated, structured and have various motivations. No individual nor organization or cybernetic system is perfectly protected. Regarding this, it is essential for organizations to develop an effective and functional cyber security management system to eliminate threats and minimize extent and impact of attacks. The paper proposes a possible way how to manage cyber security in organization. Authors believe that proposed model is applicable for a wide range of organization across economy.
46

Kotenko, Igor, and Alexander Ulanov. "AGENT-BASED SIMULATION OF DDOS ATTACKS AND DEFENSE MECHANISMS." International Journal of Computing, August 1, 2014, 113–23. http://dx.doi.org/10.47839/ijc.4.2.343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper considers an approach to modeling and simulation of cyber-wars in Internet between the teams of software agents. According to this approach, the cybernetic opposition of malefactors and security systems is represented by the interaction of two different teams of software agents – malefactors’ team and defense team. The approach is considered by an example of modeling and simulation of “Distributed Denial of Service” (DDoS) attacks and protection against them. The paper also describes the software environment for multi-agent simulation of defense mechanisms against DDoS attacks developed by the authors and different experiments. The main components of the software environment are outlined. One of the numerous experiments on protection against DDoS attacks is described in detail. The environment developed is based OMNeT++ INET Framework.
47

Ungur-Brehoi, Carmen. "Romanian media and public's safety during information warfare." International Journal of Legal and Social Order 3, no. 1 (December 1, 2023). http://dx.doi.org/10.55516/ijlso.v3i1.134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Nowadays, wars are no longer fought exclusively on the front, but often, even more effectively, behind the front line, in a hybrid way, in the information environment. The Romanian mass media, like the international media, is recently more and more frequently assaulted by examples of disinformation, propaganda, cybernetic attacks. Is there information security for the Romanian reader during the international war? How sure is the reader that the data he has read is correct, credible, or truthful information? We will try to see the answer reflected in the case study regarding the media in current Romania, comparing a national newspaper, Adevarul, and a local one, Jurnal bihorean, on the use and definition of the chimera-phrase “hybrid war”.
48

YASELSKA, NATALIA. "ACCESS TO JUSTICE DURING MARTIAL LAW." Law. Human. Environment 13, no. 2 (April 7, 2022). http://dx.doi.org/10.31548/law2022.02.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The relevance of the study stems from the necessity to assess the efficiency of access to justice as a compulsory and integral element of human rights in the context of a full-scale military invasion of Ukraine. The purpose of the study is to analyse the main measures undertaken by the Government of Ukraine and the judiciary to restore access to justice during martial law, identify the problematic issues of its implementation, and find efficient mechanisms to overcome them. The research methodology covered general scientific and specific methods of scientific knowledge: comparative legal method, cybernetic method and method of analysis and synthesis. Based on the study of the work of the courts of Ukraine, a conditional division of courts was performed based on the mode of their work and the respective location, namely: territories where active hostilities are underway; territories under occupation (blockade); de-occupied territories, and territories remote from hostilities. It is stated that active hostilities, occupation and constant rocket attacks have established several new problems in access to justice, namely the physical impossibility of judges in the occupied territories and areas of active hostilities to administer justice; the catastrophic shortage of court officials; problems related to the transfer of jurisdiction from one court to another (overloading of judges, physical impossibility to transfer case files, actual destruction of cases, longer delays in court cases). It is concluded that under martial law, using electronic justice is an efficient solution that can ensure the right to access justice. It was noted that the current model of electronic justice in Ukraine still requires improvement through the adoption of a clear regulatory framework governing the full use of electronic justice (including the introduction of appropriate amendments to the procedural codes and the development of detailed instructions for judges and parties to the proceedings); improvement of the software to expand its functionality while providing technical equipment to all judges. The practical significance of the conducted research is of scientific value both for practitioners and scholars studying the theoretical and legal issues of access to justice and can be used to ensure the observance and implementation of the right to access to justice in the face of future challenges of extraordinary or global scale, such as war or pandemic.
49

Parikka, Jussi. "Viral Noise and the (Dis)Order of the Digital Culture." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
“We may no longer be able to trust technology. A computer program could, without warning, become an uncontrollable force, triggered by a date, an event or a timer.” (Clough and Mungo 223) Introduction In 1991 the Information Security Handbook noted how “society is becoming increasingly dependent on the accurate and timely distribution of information” (Shain 4). This dependence, however, exposed the society to new kinds of dangers, accidents that have to do with information disorders – viruses, worms, bugs, malicious hackers etc. In this essay, I focus on digital viruses as disorderly elements within the digital culture. It is due to certain key principles in computing and computer security that viruses and worms have acquired their contemporary status as malicious software, that is, malware – elements of chaos, accident and disorder. According to my claim, the fear of viruses does not stem just from the contemporary culture of digital technology. It is part of a longer genealogy of modern computing, which has emphasized issues of control, reliability and order. Viruses and worms threaten the conceptual ontology of digital culture in a similar fashion as epidemic diseases have been figures for social disorder throughout Western history. Unlike AIDS or other deadly biological viruses, computer viruses have not been known to cause casualties to humans, yet they have been treated the last years as the “killer viruses of digital culture”, connotating the seriousness of the threat. A “viral perspective” to digital culture reveals how underlying articulations of order are used to construct an all-too-harmonious picture of computers in modern society. Reliability Anti-virus manuals, guidebooks and other such publications have especially contributed to our understanding of viruses as threats to the orderly digital society. The editorial of the first issue of Virus Bulletin (July 1989) sees viruses as a cunning form of vandalism and an indication of ”sabotage mentality”. Viruses destroy information and produce uncontrollability: Rather like Hitler’s V1 ‘flying bomb’, no-one knows when or where a computer virus will strike. They attack indiscriminately. Virus writers, whether or not they have targeted specific companies or individuals, must know that their programs, once unleashed, soon become uncontrollable. (Virus Bulletin 2) Computer viruses mean unreliable and unexpected danger: they are a chaotic element within a system based on security and order. According to a widely embraced view computer security means 1) confidentiality (the privacy of sensitive information), 2) integrity (authorized information and program exchange) and 3) availability (systems work promptly and allow access to authorized users). (E.g. Shain 5). Viruses and other forms of malicious code are, consequently, a direct threat to these values, part of the modern episteme in general. This is what I will here define as “a computational way of thinking”. The concept refers not only to the epistemological and ontological presuppositions in actual computer science discussions, but also to the larger cultural historical contexts surrounding the design, implementation and use of computers. Of course, one has to note that computers have never been those reliable and rational dream-machines they have been taken to be, as they are exposed to various potentials for breaking down of which viruses and worms form only a minor part. Yet, interestingly, reading professional and popular depictions of digital viruses reveals that these sources do consider computers as otherwise integrated, coherent and pristine machines of rationality, which are only temporarily disturbed by the evil occurrences of external malicious software. Control The virus researcher Vesselin Bontchev acknowledges how issues of trust and control are at the heart of computing and the virus threat: “a computer virus steals the control of the computer from the user. The virus activity ruins the trust that the user has in his/her machine, because it causes the user to lose his or her belief that she or he can control this machine” (31). This definition resonates with broader cultural trends of modernization. Zygmunt Bauman has expressed the essence of modern science as an ”ambition to conquer Nature and subordinate it to human needs” (39). Bauman understands this as ”control management”: the moulding of things to suit human needs. The essence of modern technology proceeds along the same lines, defined through values of progress, controllability, subordination of chaos and reification of the world. From the 19th-century on, technology became closely associated with advances in science. The values of order and control were embedded in the machines and technological systems, and with time, these values became the characteristics of modern technological culture. In this vein modernity can be defined as a new attitude towards controlling information. Capitalism and digital culture as historical phenomena share the valuation of abstraction, standardization and mechanization, which were already part of the technological culture of the 19th-century. Similarly, Turing’s universal machine was above all a machine of ordering and translation, with which heterogenous phenomena could be equated. This idea, concretised in typewriters, conveyer belts, assembly lines, calculators and computers served the basis for both digital machines and capitalism. The concrete connection was the capitalist need to control the increasingly complex amount of production, circulation and signs. Rationalism – as exemplified in Babbage’s differential calculators, Taylor’s ideas of work-management and cybernetics – was the image of thought incorporated in these machines (Gere 19–40). Rationalism In general, first order cybernetics fulfilled the project of modern abstract rationalism. In other words, notions of control and order play a significant role in the archaeology of information technological security, and these themes are especially visible in the thinking of Norbert Wiener, the pioneer of cybernetics. Wiener’s cybernetics touches, most of all, upon the question of understanding the world as communication circuits and controlling them via successful feedback loops that maintain the stasis of a system. This theory relates closely the problem of entropy, a classical notion in statistical mechanics from the 19th-century: “Just as the amount of information in a system is a measure of its degree of organization, so the entropy of a system is a measure of its degree of disorganization; and the one is simply the negative of the other” (Wiener 11). Wiener and the modern era share a respect for control and security. As products of modernity, cybernetics, systems theory and information theory are all in a way theories of order and cleanliness. This is the main theme of Stephen Pfohl’s essay “The Cybernetic Delirium of Norbert Wiener”, in which he describes the cultural historical background of modern cybernetic culture. To Pfohl, cybernetics does not mean a purely academic discipline but “a term connoting the most far-reaching of ultramodern forms of social control.” Pfohl delineates the genealogy of cybernetics from the early projects on anti-aircraft artillery to the functioning of the contemporary capitalist media culture. For Pfohl, Wiener’s theories connect directly to the power structures of modern society, sacrificing other ways of being, restricting other possible worlds from emerging. Paraphrasing Pfohl, cybernetics regulates and modifies the dynamic flows of the world into fixed, stabilized and controlled boundaries. Noise The engineering problem of logical calculation and communication of signals without noise expands towards the more general cultural fields of power and articulation. I would especially like to pick up the notion of noise, which, as understood by Bauman, means undefinability, incoherence, incongruity, incompatibility, illogicality, irrationality, ambiguity, confusion, undecidability, ambivalence, all tropes of “the other of order” (7). For cybernetics and early computer pioneers, noise meant a managing problem, objects in the way of transmitting signals. Noise as the most important problem for the rise of modern discourse networks was not solved once and for all in any historical phase, but remained part of the communication acts ever since, and the only resolution to the problem of non-communication was to incorporate it within the system (Kittler 242). Computer viruses can be understood as contemporary instances of this notion of noise. They are software that short-circuit the “normal” operations of a computer and connect themselves to the basic functioning of the machine. Viruses mean short-term wiring of noise to the components of a computer. By definition, viruses have been conceived as a threat to any computer system for a) virus activity is always uncontrollable, because the actions of the virus program are autonomous and b) viruses behave indeterminately and unpredictably (Lamacka 195). In a much more positive vein, this coupling of computing order and viral disorder has been noted by recent net art projects. According to the net artist Jaromil the digital domain produces a form of chaos – which is inconvenient because it is unusual and fertile – on which people can surf. In that chaos, viruses are spontaneous compositions which are like lyrical poems in causing imperfections in machines ”made to work” and in representing the rebellion of our digital serfs. Jaromil takes noise as the starting point and articulates how viruses function also as forms of resistance to the contemporary informational capitalist ideology of the digital. Charlie Gere’s analysis of the connections between modern technology and capitalism is apt in this regard as well: the abstract, standardizing and mechanizing machines of modernization serve the basis for both the cult of the digital and contemporary capitalism in a way that makes these two almost siblings. Thus, also accidents of this techno-capitalist culture are not solely technical, but social in that they are articulated on a plane of society and cultural interaction. Viruses can thus be understood as those “unwanted bads” that are a by-product of post-industrial culture of production of goods (Van Loon), as well as they can be viewed alongside other mass mediated apocalyptic monsters threatening the order of contemporary Western culture, as Luca Lampo from the net art group _[epidemiC]_ suggests: We feel that “The Virus” is the “stranger”, the “other”, in our machine, a sort of digital sans papier—uncontrollable diversity. Once Hollywood, like Empire, finished killing “Indians” and the “Soviet Russians”, the Hollywood propaganda machine had to build other anti-Empire monsters to keep alive the social imaginary of 2001: aliens, meteors, epidemic… so many monsters. In this light, while being technical bits of code that from time to time cause trouble for users, viruses act also as social signs which can be activated in various contexts. For representatives of the official computer culture viruses and worms are signs of disorder, chaos and crime that undermine the presumed reliability of digital culture, which would otherwise function “normally.” Yet, according to some commentators, viral disorder should not mean solely anarchy but a space for variation and experimentation that resist the one-way ideology of computer rationalism. (See Sampson; Cohen; Deleuze.) For some, that ideology has been crystallized in the figure of Microsoft, a popular target for virus attacks. This view accentuates that the genealogy of computers and rationalism analysed above is but one potential history. There is always the possibility to write the counter-memory of the disorderly, accidental, probabilistic and contingent nature of technological culture. Hence, viruses might prove out to be also intellectual tools, with which to create new concepts and viewpoints to digital culture and the cultural history of computing and technology in general. Already Martin Heidegger (§ 16) proposed that modern technology reveals itself at the moment of its breaking. In this sense, viruses reveal the functioning of a certain ideological or micro-political constitution of digital order. The challenge is not to take any notion of a “healthy” cultural network without disturbances as the starting point, but to see elements of break-up as part and parcel of those systems. Even if we are used to thinking of systems as orderly and harmonious, “[i]n the beginning there was noise”, as Serres (13) notes. This emphasizes the conceptual space we should give to the parasites who reveal the networks of power that otherwise are left unnoticed. References Bauman, Zygmunt. Modernity and Ambivalence. Cambridge: Polity Press, 1995 Bontchev, Vesselin. “Are ‘Good’ Computer Viruses Still a Bad Idea?” EICAR Conference Proceedings 1994, 25–47. Clough, Bryan and Mungo, Paul. Approaching Zero: Data Crime and the Computer Underworld. London & Boston: Faber & Faber, 1992. Cohen, Fred. It’s Alive! The New Breed of Living Computer Programs. New York: John Wiley & Sons, 1994. Deleuze, Gilles. “Post-scriptum sur les sociétés de contrôle” In: Pourparlers 1972–1990. Paris: Les éditions de minuit, 1990, 240–7. Gere, Charlie. Digital Culture. London: Reaktion Books, 2002. Heidegger, Martin. Being and Time. Albany: New York University Press, 1996. Jaromil. “:(){ :|:& };:” ‘I love You’ – exhibition catalogue, 2002, http://www.digitalcraft.org/index.php?artikel_id=292> Kittler, Friedrich. Draculas Vermächtnis: Technische Schriften. Leipzig: Reclam Verlag Leipzig, 1993. Lamacka, Pavel. “Harmless and useful viruses can hardly exist.” Virus Bulletin Conference Proceedings 1995, 193–8. Lampo, Luca. “When The Virus Becomes Epidemic.” An Interview with Luca Lampo by Snafu and Vanni Brusadin, 18.4.2002, http://www.epidemic.ws/downJones_press/THE_THING_ Interview_files/index_files/display.forum> Pfohl, Stephen. “The Cybernetic Delirium of Norbert Wiener.” C-Theory 30.1.1997 http://www.ctheory.net/text_file.asp?pick=86>. Sampson, Tony. ”A Virus in Info-Space.” M/C Journal http://www.media-culture.org.au/0406/07_Sampson.html>. Serres, Michel. The Parasite. Baltimore & London: The Johns Hopkins University Press, 1982. Shain, Michael. ”An Overview of Security”. Information Security Handbook. Eds. Michael Caelli, Dennis Longley & Michael Shain. Basingstoke: Macmillan, 1994 (1991). Van Loon, Joost. Risk and Technological Culture: Towards a Sociology of Virulence. London & New York: Routledge, 2002. Virus Bulletin, “Editorial”, July 1989. Wiener, Norbert. Cybernetics, or Control and Communication in the Animal and the Machine. 2nd edition. (1st edition 1948). New York & London: The M.I.T. Press and John Wiley & Sons, 1961. Citation reference for this article MLA Style Parikka, Jussi. "Viral Noise and the (Dis)Order of the Digital Culture." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/05-parikka.php>. APA Style Parikka, J. (Jan. 2005) "Viral Noise and the (Dis)Order of the Digital Culture," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/05-parikka.php>.
50

Ыдырышбаева, М. Б. "МОДЕЛЬ ОПИСАНИЯ МЕТАЗНАНИЙ В СИСТЕМЕ ПОДДЕРЖКИ РЕШЕНИЙ ПО ОБЕСПЕЧЕНИЮ КИБЕРБЕЗОПАСНОСТИ." BULLETIN Series Physical and Mathematical Sciences 81, no. 1(2023) (September 25, 2023). http://dx.doi.org/10.51889/2959-5894.2023.81.1.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Мақалада ақпараттандыру объектілерінде (АО) кибер қауіпсіздікті (КҚ) қамтамасыз ету міндеттерінде қолданылатын шешімдерді қабылдауды қолдау жүйелерінің (ШҚҚЖ) тұжырымдамасы ұсынылған. АО киберқорғау процестерін түсінуді арттыруға мүмкіндік беретін аномалиялар мен шабуылдардың жеке түсіндіруге қиын белгілерін анықтауға байланысты жағдайлар үшін ШҚҚЖ білім базасын (ББ) қалыптастыру және қолдану процесінің тұжырымдамалық және функционалдық аспектісінде ұсыну моделі сипатталған. Әзірленген үлгі модельдер әртүрлі кезеңдерде әлсіз құрылымдық белгілермен сипатталуы мүмкін басып кіруді анықтау кезінде ШҚҚЖ есептеу ядросын құрайды. Маңызды ғылыми-техникалық міндет АО қауіпсіздігіне кибернетикалық қауіптер деңгейінің артуымен, КҚ-ға қойылатын талаптардың бір мезгілде артуымен сыртқы зиянды әсер ету қарқындылығының артуы арасындағы айқын қарама-қайшылыққа сүйене отырып, ақпараттық жүйелердегі (АЖ) белгілер мен анықталған ауытқулар туралы әлсіз құрылымдалған деректер жағдайында интеллектуалды ШҚҚЖ арналған әдістер мен модельдерді одан әрі дамыту және жаңа әдістер мен модельдерді әзірлеу болып табылады. Түйін сөздер: шешім қабылдауды қолдау жүйелері, басып кіруді анықтау, модельдер, ақпараттық ресурстар. В статье представлена концепция систем поддержки принятия решений (СППР), применяемых в задачах обеспечения кибербезопасности (КБ) на объектах информатизации (ОБИ). Описана модель представления в концептуальном и функциональном аспекте процесса формирования и применения базы знаний (БЗ) СППР для ситуаций, связанных с выявлением трудноизъяснимых признаков аномалий и атак, позволяющая повысить понимание процессов киберзащиты на ОИБ. Разработанный шаблон и модели составляют вычислительное ядро СППР в ходе выявления вторжений, которые могут на разных этапах характеризоваться слабоструктурированными признаками. Исходя из существующего явного противоречия между увеличением уровня кибернетических угроз безопасности ОБИ и повышением интенсивности внешних вредоносных воздействий с одновременным повышением требований к КБ, важной научно-технической задачей является дальнейшее развитие существующих и разработка новых методов и моделей для интеллектуальных СППР в условиях слабо структурированных данных о признаках и выявленных аномалиях в информационных системах. Ключевые слова: системы поддержки принятия решений, обнаружение вторжений, модели, информационные ресурсы. The article presents the concept of decision support systems (DSS) used in cybersecurity (CS) tasks at at objects of informatization (OI). The paper describes a model of representation in the conceptual and functional aspect of the process of forming and applying the knowledge base (KB) of the DSS for situations involving the identification of difficult-to- explain signs of anomalies and attacks, which allows to increase the understanding of cyber defense processes at the OI. The developed template and models make up the computational core of the DSS during the detection of intrusions, which may be characterized by weakly structured features at different stages. Based on the existing apparent contradiction between an increase in the level of cybernetic threats to the security of the OI and an increase in the intensity of external malicious influences with a simultaneous increase in requirements for CS, an important scientific and technical task is to further develop existing and develop new methods and models for intelligent DSS in conditions of poorly structured data on signs and identified anomalies in information systems. Keywords: decision support systems, intrusion detection, models, information resources.

To the bibliography