To see the other types of publications on this topic, follow the link: Security and efficiency of information system.

Journal articles on the topic 'Security and efficiency of information system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security and efficiency of information system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kiedrowicz, Maciej, and Jerzy Stanik. "Method for assessing efficiency of the information security management system." MATEC Web of Conferences 210 (2018): 04011. http://dx.doi.org/10.1051/matecconf/201821004011.

Full text
Abstract:
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency of the security system mainly depends on the functional properties of its components and other factors occurring in its environment. The article mainly focuses on security configuration, i.e. technical configuration and security organization configuration. The thesis was adopted that the efficiency of the security system may be considered as a set-theoretic efficiency sum of the security configurations invoked in such system. Additionally, it was assumed that a prerequisite for the desired measures (indicators) of the efficiency assessment of the SS shall be to propose such measures and develop appropriate ways (methods) of their calculation. The efficiency measure for the SS as well as two methods of efficiency assessment of the SS were proposed in the article.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Taekyung. "Tourism Information Reservation System considering the Security and Efficiency." Journal of the Korea Society of Digital Industry and Information Management 11, no. 2 (June 30, 2015): 67–72. http://dx.doi.org/10.17662/ksdim.2015.11.2.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zeng, Yi. "Related Research on the Crime of Illegal Invasion into Computer Information System." Advanced Materials Research 1079-1080 (December 2014): 733–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.733.

Full text
Abstract:
The rapid development of information technology makes the construction of computer information system possible, greatly facilitates people’s lives and improves the efficiency of learning and production. Computer information system is also applied in many sensitive areas. To improve the management efficiency of information and data, the behaviors that related computer information systems are illegally invaded are increasingly rampant and have seriously endanger national security, territorial security, sovereignty security, political security, military security, economic security, cultural security, science and technology security, ecological security and information security. In terms of the crime of illegal invasion into computer information system, this paper studies from several aspects, the cognizance of crime and non-crime, the accomplishment and attempt of the crime, subsequent criminal behaviors and legislative perfection.
APA, Harvard, Vancouver, ISO, and other styles
4

Livshits, Ilia, and Pavel Lontsikh. "FORMATION OF METRICS TO MEASURE INFORMATION SECURITY MANAGEMENT SYSTEM EFFICIENCY." Proceedings of Irkutsk State Technical University 112, no. 5 (May 2016): 65–72. http://dx.doi.org/10.21285/1814-3520-2016-5-65-72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dai, Jing Jing, Hui Min Hu, and Qing Cai. "Effectiveness Evaluation of Security System Based on Entropy Theory." Applied Mechanics and Materials 40-41 (November 2010): 806–11. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.806.

Full text
Abstract:
With the security industry developing rapidly and the number of security systems increasing continuously in recent years, security systems provide a positive effect on society security in China, but many of them became vulnerable or even useless because of the problem of irrational allocation of resources. In order to evaluate security system efficiency to avoid these problems, we present the concept of efficiency entropy based on the Shannon information theory, and build an Efficiency Entropy Evaluation Model which can be used to evaluate the efficiency of the security system quantitatively. It represents security system effectiveness in single node layer and the entire security network layers. So the effectiveness of the whole security system is calculated quantitatively.
APA, Harvard, Vancouver, ISO, and other styles
6

Goldobina, Anastasiya, and Valentin Selifanov. "EFFICIENCY EVALUATION OF PROTECTION TOOLS OF STATE INFORMATION SYSTEMS." Interexpo GEO-Siberia 6, no. 1 (2019): 115–21. http://dx.doi.org/10.33764/2618-981x-2019-6-1-115-121.

Full text
Abstract:
Protection components of state information system represent the uniform mechanism capable to protect confidential information. If one of protection elements does not work effectively, it will become a problem for the entire information security system. Public information systems need to take into account all available ways to prevent information leakage, for this, operators should evaluate the efficiency. This article proposes possible solutions of the problem.
APA, Harvard, Vancouver, ISO, and other styles
7

Lajevskis, Vladimirs, Pjotrs Dorogovs, and Andrejs Romanovs. "It Security System Development for State Institution." Scientific Journal of Riga Technical University. Computer Sciences 39, no. 1 (January 1, 2009): 27–32. http://dx.doi.org/10.2478/v10143-010-0003-0.

Full text
Abstract:
It Security System Development for State Institution Nowadays the work efficiency and proficiency of public and private sector substantially depend on information technologies. In connection with the large volume of information stored in automated systems throughout the public sector, special attention should be paid to information security and security of actives. The main goals and tasks of information security, frameworks of IT security system are defined and analyzed in the paper; the standard of IT security system development is investigated, as well as international standards significance and guidance application within the development of IT security system. On the bases of research, the features of the State institutions are defined, which are necessary to take into consideration during the development of IT security system. The primary tasks of IT security system development are emphasized and the technique of development of IT security systems for State institutions is worked out.
APA, Harvard, Vancouver, ISO, and other styles
8

Suhanov, Valeriy, and Oleg Lankin. "Methodology of logical design of information support for distributed information systems of critical application." Modeling of systems and processes 14, no. 3 (September 22, 2021): 67–73. http://dx.doi.org/10.12737/2219-0767-2021-14-3-67-73.

Full text
Abstract:
One of the most promising new information technologies is analytical databases that allow us to analyze the dynamics of the behavior of the control object in the historical aspect. The introduction of analytical databases increases the efficiency of information systems. In particular, one of the criteria for effectiveness is the security of an information system, on which analytical databases have a fairly significant impact, which at first glance is not obvious. In the material of this article, the problems of organizing and implementing security in analytical databases will be considered, as well as the method of logical design of information support for distributed information systems of critical application under the prism of ensuring the security of this system.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Dong Ming, and Kai Feng Zhu. "Network Security Isolation System Based on Information Filtering." Applied Mechanics and Materials 707 (December 2014): 458–61. http://dx.doi.org/10.4028/www.scientific.net/amm.707.458.

Full text
Abstract:
Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.
APA, Harvard, Vancouver, ISO, and other styles
10

Klenin, Dmitriy, and Elena Maksimova. "The Model of Intrusion into the Information System." NBI Technologies, no. 3 (January 2019): 19–23. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.3.

Full text
Abstract:
Categories ‘attack’, ‘intrusion’ and ‘incident’ of information security are defined. The types of intrusions into the information system are revealed, and their brief analysis is given. The proposed model of intrusion into the information system will allow to increase its efficiency at almost all stages of the information security system life cycle. The use of the proposed model is associated with the solution of specific practical problems in the field of information security, including the definition of vulnerabilities of the information system. The latter, in turn, is necessary to determine the elements of the protection system. For example, at the design stage of the information security system, when choosing software protection you need to take into account the location of the intruder relative to the attacked object. When working with functioning systems of information protection, i.e. at the solution of questions of modernization or optimization, changes in the system of information security are resolved in accordance with statistical data for the intrusion into the information system with available results of information security incidents, with the forecast data. Thus, the proposed model of intrusion into the information system is one of the external conditions when working with the information system of the organization (enterprise) may well determine (set) the level of risk of information security of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
11

Karimov, Majid, and Sevara Khamdamova. "ISSUES IN FUNCTIONING EFFICIENCY OF SECURITY MONITORING SYSTEMS IN INFOCOMMUNICATION SYSTEMS." Technical science and innovation 2021, no. 3 (June 28, 2021): 66–72. http://dx.doi.org/10.51346/tstu-02.21.3-77-0022.

Full text
Abstract:
The security monitoring system (SMS) receives information from the means of protection, detecting attacks, systems for monitoring the functioning of information communication systems (ICS) and performs adaptive security management of ICS, providing a flexible response of the security system to the actions of the intruder. In this case, the result of the functioning of the SMB are recommendations for modifying the ICS security system, in accordance with the specified restrictions, in order to minimize the possible damage from the implementation of threats. A complex of security systems is used in modern ICS. Typically, different systems are not linked and are purchased from different manufacturers. Even when using protection systems from one manufacturer, it is quite difficult to understand the events taking place in the ICS. When assessing the effectiveness of SMB, methods of expert assessments are used, i.e. methods of organizing work with specialist experts and processing expert opinions expressed in quantitative and / or qualitative form in order to prepare information for the formation of internal characteristics of the ICS SMB. Based on the analysis of existing approaches to assessing the effectiveness of SMB in the work for conducting research on the parameters of SMB in the ICS, a method is proposed that allows to evaluate the efficiency of SMB functioning.
APA, Harvard, Vancouver, ISO, and other styles
12

Горлов, Алексей, Aleksey Gorlov, Михаил Рытов, Mikhail Rytov, Дмитрий Лысов, and Dmitriy Lysov. "AUTOMATION OF PROCESS AN ASSESSMENT EFFICIENCY OF COMPLEX SYSTEMS OF INFORMATION SECURITY OF THE INDUSTRIAL ENTERPRISES IN CASE WITH SIMULTANEOUS IMPLEMENTATION OF THREATS." Bulletin of Bryansk state technical university 2016, no. 4 (December 28, 2016): 199–206. http://dx.doi.org/10.12737/23236.

Full text
Abstract:
This paper reports the automation of an effi-ciency assessment process for complex systems of information security by means of an automated system formation the basic functions of which are: carrying out of information security (IS) audit, model formation of IS threats, recommendations for the formation of information security systems, a set of organization-regulatory documentation. For the solution of a problem in the efficiency assessment of confidential information protection there is developed a simulator and a universal criterion taking into account a probability of the realization and combating threats and allowing the estimation of the complex system efficiency for information protection in dynamics of processes occurred. The approach offered to the assessment of an information security level of an information object allows reducing considerably material and time costs for carrying out information security audit and also increasing the design solutions quality at the creation and introduction of complex system of information protection.
APA, Harvard, Vancouver, ISO, and other styles
13

Baisholan, N., K. E. Kubayev, and T. S. Baisholanov. "MODERN TOOLS FOR INFORMATION SECURITY SYSTEMS." PHYSICO-MATHEMATICAL SERIES 335, no. 1 (February 8, 2021): 14–18. http://dx.doi.org/10.32014/2021.2224-5294.2.

Full text
Abstract:
Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.
APA, Harvard, Vancouver, ISO, and other styles
14

Baisholan, N., K. E. Kubayev, and T. S. Baisholanov. "MODERN TOOLS FOR INFORMATION SECURITY SYSTEMS." PHYSICO-MATHEMATICAL SERIES 335, no. 1 (February 8, 2021): 14–18. http://dx.doi.org/10.32014/2021.2518-1726.2.

Full text
Abstract:
Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.
APA, Harvard, Vancouver, ISO, and other styles
15

Tabakaeva, Valeria A., Igor N. Karmanov, and Vladimir R. An. "FEATURES OF INTELLIGENT INFORMATION SECURITY MANAGEMENT SYSTEMS FOR CRITICAL INFORMATION INFRASTRUCTURE OBJECTS." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 99–104. http://dx.doi.org/10.33764/2618-981x-2020-6-2-99-104.

Full text
Abstract:
The article discusses the problem of using intelligent systems in managing information security of critical information infrastructure objects. Currently, the development of information technologies reached the point of transition to widespread use of various intelligent systems. At the same time, their application is also noted in the sphere of ensuring the security of significant objects of critical information infrastructure of the Russian Federation. Cybersecurity parameter management systems have a special place as fundamental elements for ensuring security during operation, as well as responding to external and internal incidents with the required efficiency and speed. In the course of the research, we select ways to solve such problems as choosing a threat model and protection system architecture for an object of critical information infrastructure of the Russian Federation.
APA, Harvard, Vancouver, ISO, and other styles
16

Izergin, Dmitriy A., Mikhail A. Eremeev, Shamil G. Magomedov, and Stanislav I. Smirnov. "Information security evaluation for Android mobile operating system." Russian Technological Journal 7, no. 6 (January 10, 2020): 44–55. http://dx.doi.org/10.32362/2500-316x-2019-7-6-44-55.

Full text
Abstract:
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control. The cornerstone of this concept is mobile devices that solve the issue of operational data exchange and processing. Modern mobile services used including the exchange and processing of personalized, banking and critical data are the result of the steady increase in the number of crimes in the field of information security in relation to and using mobile devices. The widespread use of these devices for access to protected information contained in information systems has given special importance to the issue of information security.The subject of this research is to assess the current state of information security mechanisms for mobile operating systems that form the basis of the structure of episodic distributed mobile networks. The Android OS (operating system) was used as an example. The article discusses the problems of the development of a mobile ecosystem and methods aimed at solving them, the main vectors of malicious impact, ways of countering the means of static and dynamic analysis and modern protection mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
17

Bolsunovskaya, Marina, Svetlana Shirokova, Aleksandra Loginova, and Mikhail Uspenskij. "Developing a procedure for conducting a security audit of a software package for predicting storage system failures." MATEC Web of Conferences 245 (2018): 10007. http://dx.doi.org/10.1051/matecconf/201824510007.

Full text
Abstract:
The aim of the work is to develop a procedure for conducting an information security audit of the software system for predicting data storage failures in order to identify existing threats to information security, evaluate information security tools, and improve the efficiency of existing information security tools and introduce new ones. It is necessary to monitor the current situation to ensure information security in organizations where data storage systems are used. For this purpose, an audit system has been developed, including both organizational measures and software and hardware parts.
APA, Harvard, Vancouver, ISO, and other styles
18

Batskikh, A. V., V. V. Konobeevskikh, and S. V. Efimov. "Methods for assessing the efficiency of access control subsystems at informatization facilities of internal affairs bodies and aspects of their improvement." Herald of Dagestan State Technical University. Technical Sciences 48, no. 2 (July 31, 2021): 29–39. http://dx.doi.org/10.21822/2073-6185-2021-48-2-29-39.

Full text
Abstract:
Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation on information security of automated systems, guidelines and orders of the Federal Service for Technical and Expert Control of Russia, as well as departmental orders, instructions and regulations on information security at informatization facilities of internal affairs bodies. The analysis results in identifying the advantages and disadvantages of the specified methodology, as well as the possibilities of its use when conducting a quantitative assessment of the efficiency of access control subsystems of information security systems at the informatization facilities of internal affairs bodies. Methods. To achieve this goal, the method for system analysis of approaches used to assess the efficiency of information security tools and systems has been applied. Results. The paper presents results of analysing the main approaches used to assess the efficiency of tools and systems for information security of automated systems. The paper determines the relationship between the efficiency indicator of access control subsystems of information security systems and the main disadvantage of their use in protected automated systems of internal affairs bodies. The paper substantiates main directions of improving the existing methodology, proposes methods and indicators for quantifying the efficiency of access control subsystems (including those modified on the basis of using new information and communication technologies) of information security systems in protected automated systems of internal affairs bodies. Conclusion. The results obtained can be used to quantify the security level of existing automated systems and those being developed at informatization facilities of internal affairs bodies.
APA, Harvard, Vancouver, ISO, and other styles
19

Yakymenko, Yuriy, Tetyana Muzhanova, and Svitlana Lehominova. "SYSTEM ANALYSIS OF TECHNICAL SYSTEMS FOR ENSURING INFORMATION SECURITY OF FIREEYE ENTERPRISES." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 36–50. http://dx.doi.org/10.28925/2663-4023.2021.12.3650.

Full text
Abstract:
Issues related to information security of the enterprise are considered. Information security is a set of tools and methods used to protect digital and analog information. The purpose of the information security management system and the role of technical means of information protection from information threats to the enterprise are shown. The methodical approach of the system analysis concerning maintenance of information security of the enterprise is used. To create and effectively operate an information security system, it is always necessary to use already established practices (standards, methodologies) to build such information security systems and implement them in information security management systems. Since modern systems of information security of the enterprise, as a rather complex organizational and technical systems, operate in conditions of uncertainty of the external and internal information environment, the management of such systems should be based only on the results of system analysis. The need to rethink the approaches and methods of systems analysis to the creation and development of modern information technologies is noted. Issues of information security should be considered as components in the creation of modern information security systems - from the moment of design, at all stages of operation and support. Global campaigns - vendors of computer systems pay considerable attention to increase their capacity to protect information through the development and improvement of technical means, in which a significant place is given to timely detection of threats, their analysis and prevention of negative impacts on reducing information security. One of the world's leading IT manufacturers is FireEye, a leader in the supply of its technical solutions. An analysis of technical solutions of FireEye, which is one of the world's leading IT manufacturers in the field of information security. Innovative solutions from the FireEye company at the enterprises of Ukraine for the purpose of increase of efficiency of detection of information modern threats and protection of the information are offered for realization.
APA, Harvard, Vancouver, ISO, and other styles
20

Chubaievskyi, Vitaliy, Valerii Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, and Andrii Blozva. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 96–107. http://dx.doi.org/10.28925/2663-4023.2021.12.96107.

Full text
Abstract:
The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and necessity of obtaining the necessary data have been substantiated, contributing to a reliable assessment of the effectiveness of measures aimed at increasing the company’s IS. In the study process, the modelling methods have been used. A methodology is proposed for calculating indicators from investment activities in the context of increasing IS metrics of OBI. A specific example of such simulation is described. The proposed methodology provides an assessment of the damage prevention from a cyber-attack. The amount of the damage prevention from a cyber-attack is taken as a basic indicator for calculating the economic effect of investing in information security tools (IST). The performed simulation modelling allowed taking into account the relative uncertainty of the real situation with IS of OBI. The conducted study will help practitioners in the field of IS to obtain informed decisions to increase the efficiency of investment projects in the field of IS for OBI, using the approach outlined in the study. Unlike the existing ones, the proposed methodology takes into account both direct and indirect factors of investment projects in the field of IS of OBI
APA, Harvard, Vancouver, ISO, and other styles
21

Goldobina, Anastasiya S., Julia A. Isaeva, and Dmitry M. Nikulin. "EVALUATION OF THE EFFICIENCY OF INTRUSION DETECTION SYSTEMS IN PRODUCTION MANAGEMENT INFORMATION SYSTEM OF A MILITARY-INDUSTRIAL COMPLEX." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 99–103. http://dx.doi.org/10.33764/2618-981x-2020-6-1-99-103.

Full text
Abstract:
Security components of the production management information system of the military-industrial complex are a single mechanism that can protect restricted access information from possible violators. If one of the elements of information security does not work efficiency, it will become a problem for the entire defense system of the military-industrial complex. Production management information systems need to take into account all available ways to prevent information leakage to do this, the owners of military-industrial complexes must conduct an efficiency assessment. The article suggests a possible way to solve the problem when considering one of the most important subsystems: intrusion detection system. Currently, there is no methodology for evaluating the efficiency of intrusion detection systems for production management information systems. This system is located on a real object located in the Irkutsk Region and belongs to the military-industrial complex.
APA, Harvard, Vancouver, ISO, and other styles
22

Salmanova, I. P., O. I. Kuznetsova, S. A. Kruchinina, and A. S. Bulat. "Creating an expert system for assessing the economic efficiency of investments in information security." Voprosy regionalnoj ekonomiki 35, no. 4 (December 30, 2018): 102–9. http://dx.doi.org/10.21499/2078-4023-2018--4-102-109.

Full text
Abstract:
The need for tools substantiate and assess the effectiveness of investment in information security - one of the most important problems of our time. The possible direction of the solution of the identified problem is the construction of an expert system that will improve the efficiency and operativeness of the decisions made. The basis for building such a system is most appropriate to choose the methodology of ROSI - the estimation of the return of investments in information security, which in particular allows you to determine the payback period of the investment project. The developed program model of expert system allows to reasonably estimated effectiveness of the cost for information security.
APA, Harvard, Vancouver, ISO, and other styles
23

Fan, Kai, Hang Yang, and Aidong Xu. "Analysis of Power Network Behavior Security Analysis Technology." MATEC Web of Conferences 246 (2018): 03017. http://dx.doi.org/10.1051/matecconf/201824603017.

Full text
Abstract:
Nowadays, with the rapid development of science and technology, network information technology is widely applied to various enterprise departments. In order to meet the increasing social needs, power companies have also built power network information systems. The establishment of the network information system has been put into use, which has greatly improved the efficiency of the power enterprise. However, the security risks of network information systems have followed. Once the network is damaged by the attack, it will cause the power system to fail to operate normally, which will inevitably cause significant losses. Power system information security issues threaten the security of the power system and the entire power industry. Studying the information security of power systems, how to protect the power information network from threats, how to ensure the safe and stable supply of electricity to the whole society, and striving to develop a safe and effective power network information system is an important issue facing the development of information technology.
APA, Harvard, Vancouver, ISO, and other styles
24

Ma, Li, Li Ying Cao, and Yue Ling Zhao. "Research of Intelligent Building Security Automatic Monitoring Alarm System." Advanced Materials Research 1049-1050 (October 2014): 1185–88. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1185.

Full text
Abstract:
In this study by analyzing the types and characteristics of intelligent building, this paper expounds the intelligent building security automatic monitoring alarm system of layered structure: the presentation layer, control layer, processing layer, transport layer and execution layer, support layer, collected layer, describes the system composition: front-end information acquisition system, information transmission control system, information management system, automatic alarm system. The system can improve the efficiency of the intelligent building security.
APA, Harvard, Vancouver, ISO, and other styles
25

Luo, Lin. "Policy Research of Network Security about Employment Management System in Colleges and Universities." Applied Mechanics and Materials 71-78 (July 2011): 4353–56. http://dx.doi.org/10.4028/www.scientific.net/amm.71-78.4353.

Full text
Abstract:
The college education has developed unceasing and the number of collegian is step up with more extrude contradiction of student employment. The tough job market requires the vocational counsel and management should be more scientific, standard and effective. At present, the applied employment management system for the graduates has the characteristics of high-efficiency, convenient with speediness that played an important role in high-efficiency employment of graduates. However, there has hidden danger of high-efficiency network security. The employment management and amount of relevant personal information might affect seriously for the network security questions. Therefore, research the network security of information management system about college employment is very important.
APA, Harvard, Vancouver, ISO, and other styles
26

Belokurov, Sergey, Alexei Skrypnikov, Oleg Kondratov, Dmitry Levushkin, and Oleg Tveritnev. "Increasing the energy efficiency of electronic document management systems." E3S Web of Conferences 279 (2021): 03029. http://dx.doi.org/10.1051/e3sconf/202127903029.

Full text
Abstract:
This paper proposes a comprehensive set of characteristics of integrated security systems of electronic document management. We give a classification description and data analysis for modeling decision-making processes in integrated security systems by the example of responding to the threats of information leakage through parametric channels. The optimal set of measures to respond to an attacker’s operations of illegal interception of information via parametric channels by using the appropriate modes of operation of the TCP protocol, which reduces the decision-making time, optimizes the performance of the system as a whole and significantly contributes to the optimization of its energy efficiency is given.
APA, Harvard, Vancouver, ISO, and other styles
27

Raei Dehaghi, Morteza. "The Relation of Information Security Management System Efficiency with Organizational Agility Case Study: Isfahan Mobarakeh Steel Company." International Journal of Business and Management 11, no. 8 (July 20, 2016): 116. http://dx.doi.org/10.5539/ijbm.v11n8p116.

Full text
Abstract:
This study was aimed to investigate the relationship between the system of information security management and organization agility in Mobarakeh Steel Company of Isfahan. The descriptive-correlational research method was used and the documentary method also was used to formulate the theoretical framework of the research. The statistical population included those expert, employees of Mobarakeh Steel Company who dealt with information systems in performing their work processes. The number of the aforementioned employees was reported to be 2150 in 2014. In this research, the Standard Organizational Agility Scale by Zhang and Sharifi and the substantive questionnaire of the system of information security management were employed. The obtained data was analyzed using statistical methods named correlation coefficient and one-way variance analysis. The results revealed that there is a positive significant relationship between the efficiency of the system of information security management and organizational agility at p=0.029 (p 0.05) significance level. The variance analysis showed no significant difference in the sample population’s perception of the relationship between the system of information security management and organizational agility in terms of variables including job position, years of service, and place of service. However, a significant difference was observed in terms of academic level.
APA, Harvard, Vancouver, ISO, and other styles
28

Horbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.

Full text
Abstract:
The main essential aspects of the country economic security as a foundation for structural change and sustainable development of the national economy, strengthening its competitiveness, improvement of the economic entities efficiency are formulated in this paper. The processes affecting the economic security at the state, regions and individual enterprises levels are identified. Taking into account the available classifications of the economic security components, the role of information and cybersecurity is highlighted. It is determined that almost in all classifications of information security in one form or another is considered as an opportunity for information support and protection of confidential information of the socio-economic system. It is proved that «cybersecurity» category is gradually shifting from micro to macro level, from the problems of information protection on individual devices in local networks to the creation of a single cybersecurity system as a full component of national security at the state level. The assessment of cyberspace as the environment for potential criminal actions in the field of unauthorized access to the confidential information, software failures, automated systems functional breakdowns is carried out. It is identified how such characteristics of economic security as countermeasures resistance to internal and external threats, economic independence, self-reproduction and self-development, national interests, can be supported and protected in cyberspace Proposals for creating an effective system of cybersecurity state regulation and conditions for online information exchange within «public authorities – private sector – civil society», triangle, optimization of staffing cyber protection, development of the system of economic indicators of cyberspace functioning are introduced. Emphasis is placed on the research prospects concerning the stimulation of innovative activity aimed at the creation of effective organizational and technological model of the national cybersecurity system, the implementation of human resources, optimization of domestic legislation.
APA, Harvard, Vancouver, ISO, and other styles
29

Litvinchuk, Iryna, Nataliia Korshun, and Maksym Vorokhob. "METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 135–43. http://dx.doi.org/10.28925/2663-4023.2020.10.135143.

Full text
Abstract:
The article is devoted to the development of a method for evaluating the effectiveness of the level of protection at the object of information activities when using an integrated security system. Such systems provide for the sharing of resources of subsystems of fire and security alarm, video surveillance, access control systems and others. The application of integration provides a number of benefits, including: quick and accurate reaction to events, facilitating the work of the operator by automating management processes, control and decision-making on security, reducing the probability of erroneous actions of the operator, reducing equipment costs. Among the requirements for integrated security systems are reducing the role of man in the security process by increasing the systems intelligence, reducing the level of false positives due to closer use of subsystems and openness. Implementation of these requirements will increase the efficiency of security systems, reduce the human factor and will make the construction of integrated systems more transparent. The proposed method of assessing the integrated security system summarizes the state of security at the object of information activities, points to the weaknesses of the existing integrated security system, those that need of improvement. It can also be used when selecting the appropriate integrated security system. The assessment of the level of protection takes into account such criteria as complexity, functionality, size, speed, fault tolerance, scalability, interaction with external systems, the possibility of expansion.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Jin Hai. "Research of Network Information Platform Construction of ERP System in Manufacturing." Applied Mechanics and Materials 644-650 (September 2014): 2830–33. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2830.

Full text
Abstract:
Computer network system is a basis for enterprises to implement informatization construction , to a good network environment, System suitability, and security features of the system. Facing growing international and domestic competitive pressure, companies propose the development of a comprehensive information management strategy; in the process of enterprise Informationization construction, very important thing about the construction of network study environment for enterprises. Papers in reconciling efficiency, robustness, and security of the system on the basis of focusing on system "against" and "applicable" were studied.
APA, Harvard, Vancouver, ISO, and other styles
31

Maharjan, Hira Gopal. "Land Records Information Management System." Journal on Geoinformatics, Nepal 14 (March 13, 2017): 26–31. http://dx.doi.org/10.3126/njg.v14i0.16970.

Full text
Abstract:
The land administration services are being provided using traditional methods and processes. The record keeping system is mainly based on manual system so far. There is increasing need for efficient and effective delivery of land administration services. Government organizations use Information and Communication Technology to increase efficiency and effectiveness in the service delivery. E-Government can bring improvement in efficiency, easy availability and accessibility of service and information to the citizens, business organization, professional users as well as government organizations. The main aim of LRIMS is to automate the land transaction related functions of Land Revenue Offices (LROs) based on different land transactions process requirements.The system is adherence to NeGIF and GEA, availability of intranet facility, provision of web-based system, and data security. System modules show the modules needed for LIS. The implementation status of LIS in Nepal is in initial stage. The old system architecture does not support the e-Government model. The system modules show the modules needed for LRIMS. The system modules help in delivering service efficiently. The three tier system architecture follows all three models of e-Government (G2G, G2B and G2C) and reduces corruption, increase access to information and improve data quality. Nepalese Journal on Geoinformatics, Vol. 14, 2015, Page: 26-31
APA, Harvard, Vancouver, ISO, and other styles
32

Malikov, Albert, Vladimir Avramenko, and Igor Saenko. "Model and method for diagnosing computer incidents in information and communication systems based on deep machine learning." Information and Control Systems, no. 6 (December 26, 2019): 32–42. http://dx.doi.org/10.31799/1684-8853-2019-6-32-42.

Full text
Abstract:
Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the diagnostics is prompt identification of security violation characteristics. This problem is complicated due to the amount and variability of the initial data on information security violation. Purpose: Development of a model for diagnosing a computer incident, along with a method which would allow you to quickly determine the characteristics of a security violation. Results: Security breach characteristics important for making a decision about responding to an identified computer incident can be determined via deep artificial neural networks. A structural feature of the proposed deep artificial neural network is combining the coding part of the autoencoder and a multilayer perceptron. In addition, the method implements a parallel mode of processing information events which have occurred in the information and communication system before the incident was detected, by using a separate proposed artificial neural network for each secondary characteristic of the security breach. The method of determining the values of these secondary characteristics allows you to greatly improve the diagnostics efficiency, having acceptable values of precision and recall for the security violation characteristics to determine. The dependence has been studied of the completeness and classification accuracy on the number of neurons in the hidden layer. A sufficient number of neurons in the hidden layer for achieving the required training efficiency is experimentally determined. Practical relevance: The developed model and method can be implemented using standard software and hardware (servers) of an information and communication system. Their combined use with the existing models and methods of monitoring and diagnostics can significantly improve the efficiency of an information security system.
APA, Harvard, Vancouver, ISO, and other styles
33

Doynikova, Elena, Andrey Fedorchenko, Igor Kotenko, and Evgenia Novikova. "Security Assessment Methodology Based on the Semantic Model of Metrics and Data." Voprosy kiberbezopasnosti, no. 1(41) (2021): 29–40. http://dx.doi.org/10.21681/2311-3456-2021-1-29-40.

Full text
Abstract:
The purpose of the article: development of semantic model of metrics and data and technique for security assessment based on of this model to get objective scores of information system security. Research method: theoretical and system analysis of open security data sources and security metrics, semantic analysis and classification of security data, development of the security assessment technique based on the semantic model and methods of logical inference, functional testing of the developed technique. The result obtained: an approach based on the semantic model of metrics and data is proposed. The model is an ontology generated considering relations among the data sources, information system objects and data about them, primary metrics of information system objects and integral metrics and goals of assessment. The technique for metrics calculation and assessment of unspecified information systems security level in real-time using the proposed model is developed. The case study demonstrating applicability of the developed technique and ontology to answer security assessment questions is provided. The area of use of the proposed approach are security assessment components of information security monitoring and management systems aimed at increasing their efficiency.
APA, Harvard, Vancouver, ISO, and other styles
34

Panda, Soumyashree S., Debasish Jena, and Priti Das. "A Blockchain-Based Distributed Authentication System for Healthcare." International Journal of Healthcare Information Systems and Informatics 16, no. 4 (October 2021): 1–14. http://dx.doi.org/10.4018/ijhisi.20211001.oa12.

Full text
Abstract:
The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities are involved, a secure and efficient information sharing protocol is required as extremely sensitive health information is exchanged among the entities. Hence this paper aims to put forward a novel a decentralized authentication system based on Blockchain known as Insurance Claim Blockchain (ICBChain) system. The proposed system ensures privacy of patients, provides secure information exchange and authentication of entities. An implementation of the proposed system is provided using Ethereum Blockchain. The security and performance analysis of the system shows its potential to satisfy Healthcare security requirements and its efficiency respectively
APA, Harvard, Vancouver, ISO, and other styles
35

Volosnikova, N. M. "The Methodical Principles of Controlling the Information System of Corporate Security." Business Inform 5, no. 520 (2021): 141–46. http://dx.doi.org/10.32983/2222-4459-2021-5-141-146.

Full text
Abstract:
The article is aimed at determining the consequences of the influence of the information component as a significant factor directed towards improving the economic efficiency of the corporate security system. The structure of controlling of the corporate security information system is characterized as a system of interacting components for determining the goals of strategic, tactical and operational management of the corporate security system, organization of the planned actions, regulation, control, analysis and monitoring. The general appearance of the key stages of the genesis of controlling of the corporate security information system is specified. It is concluded that thanks to the functioning of the management of the corporate security system, the fulfillment of the goal of the organization of a certain level is achieved. A variety of definitions of the concept of «controlling» is substantiated, which gives reason to take into account the controlling of the information system of corporate security as a philosophy or conception of managing the corporate security system, by which it is necessary to understand a set of opinions on determining the goals of strategic, tactical and operational management of the corporate security system, its organization and related instrumentarium. In addition, when solving an applied task, the situation of influence of the institutional environment on the system of corporate security in enterprises can be described using functional dependence. It is noted that the system of management of controlling has incoming strategic goals of the corporate security information system. The conception of corporate security information system together with strategic goals of the corporate security system itself are presented. At each level of the hierarchy of management, the controlling of the corporate security information system has a specific purpose. In this regard, there is an urgent need for further scientific and theoretical comprehension of the strategic aspects of corporate security.
APA, Harvard, Vancouver, ISO, and other styles
36

Kravchenko, Sergey. "The Security of Socio-Technical Systems." NBI Technologies, no. 2 (December 2018): 20–24. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.3.

Full text
Abstract:
The paper deals with the problem of information security of socio-technical systems when developing online applications. The structure of the socio-technical system, its subsystems and the stages of protection the information of such a system are described. The application of the socio-technical approach, its advantages and disadvantages are also studied. The material presented in the paper reveals the approach aimed at improving the efficiency in the development of online applications through the use of social engineering method. The positive factor is the use of feedback by users able to significantly improve existing systems, to reduce the risk of failure of the user from the operation of the remote systems associated with the lack of ease of use and unreliable protection of their personal data. To achieve this goal, we should identify the factors that affect the user’s behavior, as well as prevent users from performing unwanted actions. The creation of an information security system in online applications should help to neutralize the factors that encourage users to use tools to bypass or ignore information security mechanisms. Therefore, the use of social engineering approach in the development of information security systems will contribute to the goal of creating safe and usable applications.
APA, Harvard, Vancouver, ISO, and other styles
37

Ruan, Xian Jing. "Information Security System of the New Energy Automobile Production Line Based on RFID." Applied Mechanics and Materials 416-417 (September 2013): 1434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1434.

Full text
Abstract:
The application of RFID technology in the new energy automobile manufacturing, can achieve that the visualization, on time and collaborative business processes of energy vehicles discrete manufacturing production process, to establish a advanced "just-in-time" production model, provide real-time and accurate information for production plans and management decisions, which will help to improve the quality of enterprise production management decision-making and the overall optimization of production operations management functions. On the basis of proposed mainly from management systems and supporting techniques to solve the security issues of the RFID system, give the basic framework of build the RFID system safety management system. The security of the RFID system is technically divided into two security domains, focusing on security issues by the reader to the application system. The intrusion detection technology is introduced in RFID system, and research on the improved of intrusion detection from two aspects: First, the use of clustering algorithm for data preprocessing to reduce the computational complexity, improve the detection efficiency; second, use immune particle swarm evolutionary algorithm directly improved feature selection to improve detection accuracy.
APA, Harvard, Vancouver, ISO, and other styles
38

Jaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.

Full text
Abstract:
Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:• Smart and positive energy infrastructures• Increased energy density management during peaks• Real-time pricing to customers• Integrated mobility services• New virtual power plants• Micro grid
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.

Full text
Abstract:
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible .Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Pan, Fenggang Lai, Jing Du, Wenda Lu, and Xiao Yu. "A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid." Security and Communication Networks 2021 (April 30, 2021): 1–7. http://dx.doi.org/10.1155/2021/5513590.

Full text
Abstract:
A multisource and heterogeneous database is an important problem that disturbs the use of the electric power information system. The existing database synchronization scheme has some problems in practical applications, such as high resource loss and poor portability. This paper presents a high-efficiency database synchronization scheme for the electric power information system. The database is monitored, and its changes are captured by the shadow table and trigger method. Thus, data could be exchanged in trusted networks and nontrusted networks. In addition, a predetermined strategy is used to avoid data conflicts and ensure consistency and reliability of data synchronization. The above method is applied in the protection system of power networks. The results show that the synchronization scheme can effectively ensure the security of the system and has higher synchronization efficiency.
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Ying Xin, and Wei Shi. "Design on Enterprise Information Management System Based on SSH Frame." Applied Mechanics and Materials 198-199 (September 2012): 233–37. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.233.

Full text
Abstract:
In order to improve the efficiency of enterprise management, the information management system uses Windows XP as the development platform, JSP as development technology and SSH as development framework to realize functions including basic information management, security management, operation management, financial management, item management and user management. The system can be used in different platform and improve operational benefit effectively.
APA, Harvard, Vancouver, ISO, and other styles
42

Jia, Ling. "The Research and Application of Network Security Technology in the University Network." Advanced Materials Research 756-759 (September 2013): 791–95. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.791.

Full text
Abstract:
The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.
APA, Harvard, Vancouver, ISO, and other styles
43

Laptiev, Oleksandr, Valentyn Sobchuk, Andrii Sobchuk, Serhii Laptiev, and Tatiana Laptieva. "IMPROVED MODEL OF ESTIMATING ECONOMIC EXPENDITURES ON THE INFORMATION PROTECTION SYSTEM IN SOCIAL NETWORKS." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 19–28. http://dx.doi.org/10.28925/2663-4023.2021.12.1928.

Full text
Abstract:
In modern conditions, an important role in ensuring the information security of the enterprise and especially its economic component belongs to the processes of information security of the state as a whole. The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological basis is the basis for making sound and effective management decisions of the information security of the state at all levels. The article analyzes the approaches to estimating the assessment of economic costs for the information security system. The base model is selected. Using the basic model of assessing the level of protection of information in the social network from external influences on the information social resource, improvements were made to assess the economic feasibility of implementing a mechanism of technical means of information protection in social networks depending on the value of information. The improvement is based on the assumption that the amount of funds allocated by the attacking party is equal to the value of the information, the value of the information is the same for both parties, and the opposing parties are on equal terms. The main parameters on which the efficiency of the proposed model of estimating economic costs depends. The efficiency of the proposed model of estimating economic costs depends on the accuracy of formulating the probability of success of protection and determining the value of information. The prospect of further research and development may be aimed at taking into account in the model additional factors that affect the estimation of costs for the information security system, which will allow calculations to be performed with greater accuracy.
APA, Harvard, Vancouver, ISO, and other styles
44

Dudykevych, Valeriy, Ivan Prokopyshyn, Vasyl Chekurin, Ivan Opirskyy, Yuriy Lakh, Taras Kret, Yevheniia Ivanchenko, and Ihor Ivanchenko. "A multicriterial analysis of the efficiency of conservative information security systems." Eastern-European Journal of Enterprise Technologies 3, no. 9 (99) (May 8, 2019): 6–13. http://dx.doi.org/10.15587/1729-4061.2019.166349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Litvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.

Full text
Abstract:
The article is devoted to the assessment of information security risks in automated systems of class "1". An adapted approach to the assessment of information security risks in such automated systems using the Methodology and requirements of the standards of GSTU SUIB 1.0 / ISO / IEC 27001: 2010 and GSTU SUIB 2.0 / ISO / IEC 27002: 2010 is proposed. The efficiency and methods of implementation of the approach are proved on the example of consideration of real threats and vulnerabilities of class 1 automated systems. The main requirement for the creation of information security management system in the organization is risk assessment and identification of threats to information resources that are processed in information and telecommunications systems and speakers. The basic standards on information security in Ukraine are considered, which give general recommendations for the construction and assessment of information security risks within the ISMS. The most common methods and methodologies for assessing information security risks of international standard are analyzed, their advantages and disadvantages are identified. The order of carrying out of works on an estimation of risks of information security of the AS of a class "1" is defined. The vulnerabilities considered by the expert according to the standard ISO/IEC 27002:2005 and the Methodology are given. A conditional scale for determining the impact on the implementation of threats to integrity, accessibility, observation is given. Measures and means of counteracting the emergence of threats are proposed. This approach can be used both for direct information risk assessment and for educational purposes. It allows to get the final result regardless of the experience and qualifications of the specialist who conducts risk assessment, with the subsequent implementation and improvement of the existing risk management system in the organization.
APA, Harvard, Vancouver, ISO, and other styles
46

Yandri, Erkata, Roy Hendroko Setyobudi, Herry Susanto, Kamaruddin Abdullah, Yogo Adhi Nugroho, Satriyo Krido Wahono, Feri Wijayanto, and Yanuar Nurdiansyah. "Conceptualizing Indonesia’s ICT-based Energy Security Tracking System with Detailed Indicators from Smart City Extension." E3S Web of Conferences 188 (2020): 00007. http://dx.doi.org/10.1051/e3sconf/202018800007.

Full text
Abstract:
The purpose of this study is to conceptualize Indonesia’s ICT-based energy security tracking system with detailed indicators of renewable energy (RE) and energy efficiency (EE) from the smart city extension. The opportunities for improvement to the energy security system is still wide open with the support of advances in information and communication technology (ICT) to integrate the internet and smart grid. The method refers to five main dimensions: availability, efficiency, affordability, sustainability, and governance. Then, how to link the concept of energy security with detailing indicator of RE and EE to the smart city. Empirically, energy security is a function of availability, efficiency, affordability, sustainability, and governance. The most important dimension is the Government (Go) to realize the interconnectivity and the information. If the Go has been realized, the other four dimensions will be easily obtained. With the development of ICT, the energy security status will certainly be more easily accessed anytime and anywhere by the stakeholders. The concept of a smart city usually integrated with the ICT infrastructure, especially for monitoring, management and decision-making tool. This research provides an overview of how the concept of energy security system is closely related to the implementation of the smart grid.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Ling Juan. "Research of Engineering Spot Attendance and Employee Information Management Integration System." Advanced Materials Research 977 (June 2014): 472–75. http://dx.doi.org/10.4028/www.scientific.net/amr.977.472.

Full text
Abstract:
To improve the efficiency of engineering spot attendance and employee management, a novel integrated management system is designed. The system uses a three-tier logical architecture design, which can be divided into user interface layer, business logic layer and data store layer. The realization of information management is based on VB6.0 and ACCESS database programming technology. The development of attendance information gathering functions of engineering spots is based on radio frequency identification technology and non-contact IC card. The separation of business logic and user interface makes the system more security and extensible. Experimental results show that the system has high efficiency, and it has user-friendly, secure and practical advantages.
APA, Harvard, Vancouver, ISO, and other styles
48

Hu, Zhong Xia. "Using IPv6 Technology to Construct Network Security System of Electronic Commerce." Advanced Materials Research 718-720 (July 2013): 1986–91. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.1986.

Full text
Abstract:
The e-commerce transaction security is the security of business activities in the public network, and its essence is based on computer network security, protect the business process to precede smoothly, the core content of the e-commerce information security. IPv6 network layer denial of service attacks, the fight against replay attacks, prevent data passive or active eavesdropping, to prevent data session stealing attacks and other functions, which greatly enhances the security of the network can be realized. The paper presents using IPv6 technology to construct network security system of electronic commerce. Experimental results show that the proposed method has high efficiency.
APA, Harvard, Vancouver, ISO, and other styles
49

Chepkov, Ihor B., Valerii V. Zubariev, Oleksandr O. Sverhunov, and Oleksandr V. Zubariev. "Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems." Environmental safety and natural resources 30, no. 2 (July 3, 2019): 67–90. http://dx.doi.org/10.32347/2411-4049.2019.2.67-90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Samchyshyn, O. V., and D. V. Perevizna. "ANALYSIS OF TYPES OF USER’S IDENTIFICATION AND ADVANTAGES OF USER’S ATRIBUTE IDENTIFICATION BY QR-CODE." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 18 (December 30, 2020): 111–20. http://dx.doi.org/10.46972/2076-1546.2020.18.11.

Full text
Abstract:
Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography