Journal articles on the topic 'Security of information and communication systems'

To see the other types of publications on this topic, follow the link: Security of information and communication systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of information and communication systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
APA, Harvard, Vancouver, ISO, and other styles
2

Matrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.

Full text
Abstract:
The paper considers a secure information transfer protocol for corporate IP-telephony system. In the article are analized the advantages and disadvantages of the known protocols. A description of the process of establishing a connection, sending text messages and voice communication in the developed protocol is given. Its practical significance and expediency of use are described.
APA, Harvard, Vancouver, ISO, and other styles
3

WITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.

Full text
Abstract:
The article presents ICT (Information and Communication Technology) networks and systems that are used to provide communications for crisis management purposes. The articles describes wired and wireless communication assets and discusses their advantages and disadvantages when they are used to carry out national security tasks.
APA, Harvard, Vancouver, ISO, and other styles
4

Gorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.

Full text
Abstract:
Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and operated in isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the systems. However, increased standardization, open architecture adoption and connectivity to enterprise networks as well as internet opened up these systems for a wide range of audience and enabled remote attacks. In this new operation landscape, it is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for the ICS networks is the communication paths used by these networks. Public Key Infrastructure (PKI) (n.d.) plays a key role in securing the communication of ICS networks. Using Digital Certificates, PKI provides a mechanism to verify the identity of all the entities on a network and also ensures that the information is shared securely between communicating entities. PKI is a proven mechanism for secure communication and is widely used in many organizations. However, PKI as a solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and hard real-time communication requirements. This paper intends to focus on key challenges in Digital Certificate management and correct deployment of PKI in ICS networks and will also present recommendations to overcome these challenges without compromising the basic functionalities of ICS.
APA, Harvard, Vancouver, ISO, and other styles
6

Leines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.

Full text
Abstract:
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.
APA, Harvard, Vancouver, ISO, and other styles
7

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Full text
Abstract:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.
APA, Harvard, Vancouver, ISO, and other styles
8

Stanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.

Full text
Abstract:
Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security
APA, Harvard, Vancouver, ISO, and other styles
10

Menkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tabakaeva, Valeria A., Valentin V. Selivanov, and Vladimir R. An. "APPLICATION OF INTELLIGENT SYSTEMS IN OPTICAL COMMUNICATION SYSTEMS TO ENSURE INFORMATION SECURITY." Interexpo GEO-Siberia 8 (May 21, 2021): 337–43. http://dx.doi.org/10.33764/2618-981x-2021-8-337-343.

Full text
Abstract:
Information security management in optical networks is an urgent task that requires a modern approach; the use of intelligent systems has been proposed to solve this problem. The analysis of intelligent systems is carried out, the most suitable intelligent system for solving the problem is selected.
APA, Harvard, Vancouver, ISO, and other styles
12

Julian, Alfred. "Information Warfare and Information Systems Security." EDPACS 24, no. 3 (September 1996): 8–12. http://dx.doi.org/10.1080/07366989609452269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Matveeva, A. A., I. V. Kim, and I. I. Viksnin. "Information security methods for communication channels in multiagent robotic systems." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 1 (February 1, 2019): 102–8. http://dx.doi.org/10.17586/2226-1494-2019-19-1-102-108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Juneja, Mamta. "A Covert Communication Model-Based on Image Steganography." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 19–37. http://dx.doi.org/10.4018/ijisp.2014010102.

Full text
Abstract:
With the more and more advancement in technology, internet has become the most important medium for all kinds of confidential as well as non-confidential communications. Security is the major issue for such communications and steganography is most widely accepted tool for information security. An effort has been made in the present paper to propose a secured model for communication using image steganography. It presents two components based LSB steganography method, adaptive LSB based steganography method for embedding data in high and low transition parts of an image respectively. Hybrid edge detection filter is proposed to divide an image in low and high transition areas. AES (Advanced Encryption Standard) and Randomization is incorporated to provide two-tier security. Comparison analysis of output results with other existing techniques on basis of capacity, imperceptibility is giving the proposed approach an edge over others. The proposed approach has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.
APA, Harvard, Vancouver, ISO, and other styles
15

Luo, Kun. "Analysis of Information Security Maintenance Countermeasures in Power Automation Communication Technology." Lifelong Education 9, no. 6 (September 28, 2020): 127. http://dx.doi.org/10.18282/le.v9i6.1320.

Full text
Abstract:
This article is divided into three parts. The first part is to summarize the current situation of the use of power automation communication systems, information security, and the basic requirements of the current society for the information security of the system. The second part analyzes the current information security problems of power communication technology from human factors, natural factors, and technical loopholes. The third part explores the maintenance countermeasures to improve the information security of power automation communication technology and systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Maslova, Maria. "Applying intelligent methods of risk analysis in information communication systems." ITM Web of Conferences 30 (2019): 04018. http://dx.doi.org/10.1051/itmconf/20193004018.

Full text
Abstract:
In the modern world there is a constant growth of information and information technologies, a risk-oriented approach to managing information security of information and communication systems of companies seems increasingly promising. But apart from development, there are threats and risks that affect both the image and the financial component of companies. Therefore, one of the main tasks is to assess, analyze and prevent the risks of information security in information communication systems using modern methods in conjunction with the use of intelligent analysis methods.
APA, Harvard, Vancouver, ISO, and other styles
17

Chang, Kuo-chung, and Chih-ping Wang. "Information systems resources and information security." Information Systems Frontiers 13, no. 4 (April 27, 2010): 579–93. http://dx.doi.org/10.1007/s10796-010-9232-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shen, Aiguo, Guangsong Yang, and Dezhi Wei. "Performance of multi-antenna wireless systems based on time reversal." Journal of Physics: Conference Series 2079, no. 1 (November 1, 2021): 012025. http://dx.doi.org/10.1088/1742-6596/2079/1/012025.

Full text
Abstract:
Abstract 5G wireless mobile communication system is faced with massive equipment access, information security and effective transmission is worth paying attention to. Wireless physical layer security mainly uses encryption principle to enhance the security of information transmission, while time reversal technology combines its electromagnetic characteristics and physical channel characteristics to improve the security performance of wireless communication system. In this paper, a signal transmission model of wireless multi-antenna communication system based on time reversal cavity is proposed and white Gaussian noise is introduced. The simulation results show that the space-time focusing characteristics of time reversal cavity can make the signal energy more concentrated on the target user, which can not only effectively alleviate the communication quality problems caused by multipath effect, but also ensure the security of information transmission process.
APA, Harvard, Vancouver, ISO, and other styles
19

Abdallah, Asmaa, M. Ali, Jelena Mišić, and Vojislav Mišić. "Efficient Security Scheme for Disaster Surveillance UAV Communication Networks." Information 10, no. 2 (January 29, 2019): 43. http://dx.doi.org/10.3390/info10020043.

Full text
Abstract:
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and the accuracy of exchanged information are critical parameters. In this paper, we propose networking and security architecture for disaster surveillance UAV system. The networking scheme involves a two-tier cluster network based on IEEE 802.11ah, which can provide traffic isolation between the tiers. The security scheme guarantees the accuracy and availability of the collected information from the disaster area applying fingerprint features and data redundancy techniques; the proposed scheme also utilizes the lightweight Ring-Learning with Errors (Ring-LWE) crypto-system to assure the confidentiality of the transmitted data with low overhead.
APA, Harvard, Vancouver, ISO, and other styles
20

Hart, Penny. "Information Security and Virtual Teams." International Journal of Systems and Society 4, no. 2 (July 2017): 1–7. http://dx.doi.org/10.4018/ijss.2017070101.

Full text
Abstract:
This article contends that there are two increasingly important phenomena for organisations: the existence of virtual teams and the realisation that information needs to be protected more effectively. On-line communication methods expose organisations to issues regarding security of their ICT infrastructure, systems and data. At the same time, making possible virtual teams able to be unconstrained in purpose, time or location. While security measures are built into the teams' communication channels and processes, the perceptions, practices and organizational background of team members are equally important to the security of information being exchanged. A socio-technical approach is called for when investigating different perceptions of information security by individual team members, how they negotiate a common understanding for the team and what complexities and practices are introduced in multi-organisation teams. The article sets out issues which may need to be considered and proposes a course of research to increase understanding of the situation.
APA, Harvard, Vancouver, ISO, and other styles
21

Cai-Sen Chen, Cai-Sen Chen, Yang-Xia Xiang Cai-Sen Chen, Jia-Xing Du Yang-Xia Xiang, 陳嵩 Jia-Xing Du, and Cong Lin Song Chen. "Based on SM - 9 Cloud Edge System Information Security Transmission." 電腦學刊 33, no. 1 (February 2022): 189–98. http://dx.doi.org/10.53106/199115992022023301017.

Full text
Abstract:
<p>In the past few years, cloud edge system from conception to gradually improve, develop to today has become a mature side of cloud model. Compared with simple cloud computing, cloud edge system has lower network latency and is suitable for application scenarios with higher real-time requirements. Although it can make up for some shortcomings of cloud computing, it also faces many problems in practical application, how to realize the safe transmission of information in the open network environment is one of the difficulties. Since the data transmission process between the edge and the cloud exists in the form of plaintext transmission, this allows attackers to easily disrupt normal data interactions. It is an important research point to ensure the stable operation of the cloud edge system while maximizing the security of communication. To this end, the following work has been done in the direction of secure data transmission in this paper:1. Analyzed the potential risks of the cloud edge system communication network from the per-spective of data source security and data transmission security. 2. Summarizes the requirements and limitations of secure communication, introduces a light-weight SM9 encryption algorithm with low implementation cost and low resource consumption. And compared with other encryption algorithms. 3. Provide algorithmic foundation for establish a framework for secure transmission of light-weight data and achieve data confidentiality protection. Provides a viable reference for secure data transmission in the cloud edge system.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Full text
Abstract:
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
23

Menkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

BAFTIU, Naim, Ahmet NUREDINI, and Samedin KRRABAJ. "Encrypted Data Service for Security Electronic Communications." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 3 (December 26, 2019): 84. http://dx.doi.org/10.32936/pssj.v3i3.120.

Full text
Abstract:
The law on electronic communications has so far enumerated a considerable number of natural persons, legal entities as well as public institutions that use code systems and crypto devices during communication. Of particular interest is addressing the key role of operators and providers of encrypted data services in combating abuses committed through or against computer systems as the responsible performance of their duties to protect the security of networks and computer systems affects significantly in controlling illegal risks and attacks. In this perspective, the specific legal obligations for the protection of privacy regarding personal data that are processed for the purpose of providing information services are also analyzed. The purpose of the paper is, Utilizing communication between two parties sharing a common key, implementing a shared key to protect data communicated with different security attributes, Role of cryptography in data protection during communication, and Focus on privacy. Of the data communicated, against their authenticity. Keywords: Communication, Security, Electronic privacy
APA, Harvard, Vancouver, ISO, and other styles
25

Riguidel, Michel. "Creating a new security for tomorrow’s communication networks and information systems." Annales Des Télécommunications 55, no. 7-8 (July 2000): 401–18. http://dx.doi.org/10.1007/bf02994847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gonçalves, Fábio, Joaquim Macedo, and Alexandre Santos. "An Intelligent Hierarchical Security Framework for VANETs." Information 12, no. 11 (November 2, 2021): 455. http://dx.doi.org/10.3390/info12110455.

Full text
Abstract:
Vehicular Ad hoc Networks (VANETs) are an emerging type of network that increasingly encompass a larger number of vehicles. They are the basic support for Intelligent Transportation Systems (ITS) and for establishing frameworks which enable communication among road entities and foster the development of new applications and services aimed at enhancing driving experience and increasing road safety. However, VANETs’ demanding characteristics make it difficult to implement security mechanisms, creating vulnerabilities easily explored by attackers. The main goal of this work is to propose an Intelligent Hierarchical Security Framework for VANET making use of Machine Learning (ML) algorithms to enhance attack detection, and to define methods for secure communications among entities, assuring strong authentication, privacy, and anonymity. The ML algorithms used in this framework have been trained and tested using vehicle communications datasets, which have been made publicly available, thus providing easily reproducible and verifiable results. The obtained results show that the proposed Intrusion Detection System (IDS) framework is able to detect attacks accurately, with a low False Positive Rate (FPR). Furthermore, results show that the framework can benefit from using different types of algorithms at different hierarchical levels, selecting light and fast processing algorithms in the lower levels, at the cost of accuracy, and using more precise, accurate, and complex algorithms in nodes higher in the hierarchy.
APA, Harvard, Vancouver, ISO, and other styles
27

Yacouba, Kouraogo, Orhanou Ghizlane, and Elhajji Said. "Securing Communication 2FA Using Post-Quantic Cryptosystem." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 102–15. http://dx.doi.org/10.4018/ijisp.2020040106.

Full text
Abstract:
Many financial institutions interact with their customers via short message services (SMS), which is today one of the fastest and most powerful means of communicating information around the world. This information can sometimes be an access code such as the unique password (OTP) for two-factor authentication (2FA) or banking information and personal identities. All this data is confidential, and it is a major disadvantage to send them since an SMS service does not provide data encryption during network transmission and on mobile. Recently, OTPs via SMS have suffered from strong attacks that intercept messages. In order to avoid attacks and offer effective content security to 2FA credentials sent via SMS, the authors propose an SMS encryption mechanism using a post quantic cryptosystem quasi-cyclic MDPC and an electronic signature of the OTPs. Finally, this article performs an implementation and a security analysis of the proposal.
APA, Harvard, Vancouver, ISO, and other styles
28

Ho, Pin‐Han, Zonghua Zhang, and Rongxing Lu. "Special Issue on “Security and Privacy Preservation in Vehicular Communications” Wiley's Security and Communication Networks Journal." Security and Communication Networks 1, no. 3 (May 2008): 191–93. http://dx.doi.org/10.1002/sec.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Clark, Sarah. "Book Review: Library Security: Better Communication, Safer Facilities." Reference & User Services Quarterly 55, no. 3 (March 24, 2016): 245. http://dx.doi.org/10.5860/rusq.55n3.245.

Full text
Abstract:
Dr. Steve Albrecht is a renowned security consultant with experience working with and consulting for libraries that are implementing or improving security plans and procedures. He is also a retired San Diego Police reserve sergeant. Library Security: Better Communication, Safer Facilities is a practical book dealing with security and customer service in an era in which workplace violence, mental illness, child neglect, and homelessness are realities for all libraries, regardless of their size or location. Filled with engaging anecdotes and forthright advice, this volume is both readable and useful. Although Albrecht emphasizes issues that are especially common in public libraries, this book provides information beneficial to those working in any kind of library, archive, or information setting that is open to the public.
APA, Harvard, Vancouver, ISO, and other styles
30

Zou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.

Full text
Abstract:
Combining tiny sensors and wireless communication technology, wireless body area network (WBAN) is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
31

Mishra, Sushma, Donald J. Caputo, Gregory J. Leone, Fred G. Kohun, and Peter J. Draus. "The Role Of Awareness And Communications In Information Security Management: A Health Care Information Systems Perspective." International Journal of Management & Information Systems (IJMIS) 18, no. 2 (March 28, 2014): 139. http://dx.doi.org/10.19030/ijmis.v18i2.8495.

Full text
Abstract:
The purpose and intent of this research study is to understand and interpret the perception of stakeholders in healthcare organizations concerning security awareness and communications. The data is analyzed using the demographic characteristics of age, gender, education, and relevant work experience in order to determine if there are any significant differences between the groups regarding the state of awareness and the communication functions in a health care environment. The statistical results are presented in tabular form with descriptive analysis applied to each of the categories. Data-based conclusions are drawn and future research directions are indicated and discussed.
APA, Harvard, Vancouver, ISO, and other styles
32

EL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.

Full text
Abstract:
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain. In recent years, multiple cyber-attacks have targeted medical supply chain communication networks due to their lack of security measures. In the era where cyber-attacks are cheaper and easier due to the computational power and various algorithms available for malicious uses, security, and data privacy requires intensive and higher measures. On the other hand, Information Hiding Techniques (IHT) compromise various advanced methods to hide sensitive information from being disclosed to malicious nodes. Moreover, with the support of Blockchain, IHT can bring higher security and the required privacy levels. In this paper, we propose the implementation of Blockchain and smart contract with the information hiding technique to enhance the security and privacy of data communication in critical systems, such as smart healthcare supply chain communication networks. Results show the feasibility of the framework using Hyperledger smart contract along with the desired security level.
APA, Harvard, Vancouver, ISO, and other styles
33

Yılmaz, Mustafa Harun, Ertuğrul Güvenkaya, Haji M. Furqan, Selçuk Köse, and Hüseyin Arslan. "Cognitive Security of Wireless Communication Systems in the Physical Layer." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3592792.

Full text
Abstract:
While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS) concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.
APA, Harvard, Vancouver, ISO, and other styles
34

Farkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.

Full text
Abstract:
AbstractRecent publication is summing up the most important requirements, by which “Heads of State and Government of NATO member countries” have defined the basic tasks and guidelines for the alliance and the member states in order to guarantee their security. These also highly affected command and control supporting communication and information services, systems, beyond that the cyber operation related concepts and developments – latter field becoming of more and more importance. In this part of the article, the author analysed the security threats of the NATO and the according response of them. This part covers the first ten years of the analysed NATO summits, from 1999.
APA, Harvard, Vancouver, ISO, and other styles
35

Farkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.

Full text
Abstract:
Abstract Recent publication is summing up the most important requirements, by which “Heads of State and Government of NATO member countries” have defined the basic tasks and guidelines for the alliance and the member states in order to guarantee their security. These also highly affected command and control supporting communication and information services, systems, beyond that the cyber operation related concepts and developments – latter field becoming of more and more importance. In this part of the article, the author analysed the security threats of the NATO and the according response of them. This part covers the first ten years of the analysed NATO summits, from 1999.
APA, Harvard, Vancouver, ISO, and other styles
36

Babu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.

Full text
Abstract:
Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
37

Olakanmi, Oladayo Olufemi, and Kehinde Oluwasesan Odeyemi. "VerSA." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 65–82. http://dx.doi.org/10.4018/ijisp.2021070105.

Full text
Abstract:
The advent of the internet of things (IoT) and augmented reality technology not only introduces a wide range of security risks and challenges but also increases traffic on the existing wireless communication networks. This is due to the enormity of the traffics generated by the connected IoT devices whose number keeps increasing. Therefore, any IoT network requires an effective security solution capable of securing data and minimizing traffic on the IoT networks. To address these, the authors propose a practicable secure data aggregation scheme, VerSA, based on data grouping aggregation, batch verification through the aggregated signature ratios, and symmetric encryption with a pairing free key distribution. The scheme is capable of grouping and aggregating sub-network data into homogeneous and heterogeneous groups, detecting and filtering injected false data. The results show that the proposed scheme is not only secure against IoT related attacks but also has the lowest computational and communication overheads compared to the recent state-of-the-art schemes.
APA, Harvard, Vancouver, ISO, and other styles
38

Smolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.

Full text
Abstract:
Abstract The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented. Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the modernization of IT systems, which could improve the secure dataflow and ensure continuous exchange of information between the components responsible for the security of the state.
APA, Harvard, Vancouver, ISO, and other styles
39

Moskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.

Full text
Abstract:
The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.
APA, Harvard, Vancouver, ISO, and other styles
40

Annane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.

Full text
Abstract:
Virtualization plays a key role in the area of Mobile Cloud Computing (MCC). In MCC, the protection of distributed VMs and mobile users’ sensitive data, in terms of security and privacy, is highly required. This paper presents a novel cloud proxy known as Three Policies Secure Cloud Proxy (Proxy-3S) that combines three security policies: VM users’ access control, VMs’ secure allocation and VMs’ secure communication. The proposed approach aims to keep the distributed VMs safe in different servers on the cloud. It enhances the access authorization to permit intensive distributed application tasks on the cloud or mobile devices while processing and communicating private information between VMs. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. Several experiments were conducted using a real-world healthcare distributed application. The experiments achieved promising results for high-level data protection and good efficiency rating compared to existing works.
APA, Harvard, Vancouver, ISO, and other styles
41

Petrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (July 2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.

Full text
Abstract:
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that company has a competitive advantage. This article is relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies. The results of this research show that each manager must handle threats, because otherwise the organization's objectives cannot be met. Given that uncertainty is a fact of life, then the uncertainty response should become a permanent managerial concern.
APA, Harvard, Vancouver, ISO, and other styles
42

Blaga, Nataliya, and Volodymyr Hobela. "IMPROVEMENT OF INFORMATION SECURITY OF THE COMMUNICATION PROCESS AT THE ENTERPRISE." Social & Legal Studios 13, no. 3 (September 29, 2021): 156–62. http://dx.doi.org/10.32518/2617-4162-2021-3-156-162.

Full text
Abstract:
The mechanism of communication process and information security at an enterprise is considered. The theoretical aspects of the communications at the enterprise are based on the variety of its form and the relation of organizational and information structures: most activities have underlying links via information processes. Thus information security of communication process has a significant impact on the information security of the enterprise as a whole. In modern conditions and circumstances, the information security of the enterprise is largely reduced to cybersecurity and suffers from most threats of the latter. However, the human factor is responsible for most of the real facts of inflicting harm due to information security breaches. Thus, traditional mechanisms of privacy and confidentiality ensuring need to be adapted to new realities. New opportunities also set new requirements for understanding the very concept of information security: information must not only be protected but also timely and accurate as far as it is possible to be provided with modern telecommunication systems and information technologies: information security is a system of information protection of the enterprise – protection against theft, delayed and inaccurate providing of essential information to the recipient inside the enterprise or outside it. There are proposed and justified four principles necessary but not sufficient to ensure efficient mechanism of information security regarding communication process at small to medium enterprises. These include information awareness of staff even if they are not advanced with information technologies, traditional methods of protection against cyber threats such as passwords and encryption, control over information flows and the infrastructure that provides them, reliable cooperation and protection of remote access. These principles should be followed by managers at all levels.
APA, Harvard, Vancouver, ISO, and other styles
43

Nordstrom, L. "Assessment of Information Security Levels in Power Communication Systems Using Evidential Reasoning." IEEE Transactions on Power Delivery 23, no. 3 (July 2008): 1384–91. http://dx.doi.org/10.1109/tpwrd.2008.919231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Allen, Sandra. "Information Systems Security in an Open Systems Environment." EDPACS 23, no. 5 (November 1995): 1–17. http://dx.doi.org/10.1080/07366989509451379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Grabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.

Full text
Abstract:
In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may include neural networks, adaptive learning systems, etc. They must be prepared to train, respond to threats and ensure the safety of their existence, which is very topical during modern information warfare. This analytical article will cover more theoretical aspects related to the security of information systems from the system theory point of view. Knowledge base of the information structure can be a neural network, in which training should be provided from external threats.The author considers artificial neural networks as one of the potential threats in the context of information warfare.
APA, Harvard, Vancouver, ISO, and other styles
46

Henderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Xia, Zhe, Yining Liu, Ching-Fang Hsu, and Chin-Chen Chang. "Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications." Security and Communication Networks 2020 (July 13, 2020): 1–8. http://dx.doi.org/10.1155/2020/6183861.

Full text
Abstract:
Authentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it is more desirable in the group oriented environment, such as multicast/conference communications. In this paper, we first demonstrate that a recent group authentication scheme by Chien (Security and Communication Networks, 2017) suffers some security flaws, i.e. an adversary in the asynchronous communication model can pretend to be a legitimate group member without being detected. We then use the Anonymous Veto Networks (AV-net) to patch Chien’s scheme, so that its security can be rigorously proved in a well-defined security model.
APA, Harvard, Vancouver, ISO, and other styles
48

Gorohov, Roman S., and Sergey N. Novikov. "STATE OF CAD INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 110–13. http://dx.doi.org/10.33764/2618-981x-2020-6-1-110-113.

Full text
Abstract:
The analysis of the current state of CAD is carried out. The article describes the position of advanced CAD information security equipment. Since any CAD system is a non-standard information system, an individual approach to guarantee its security is required. Special attention is paid to the need for a rational combination of cryptographic and steganographic methods to protect project documentation from unauthorized access. Based on theoretical provisions and practical data, the issues of reliable and secure transmission of project documentation over fiber-optic communication lines are considered. It is concluded that when considering the state of information security of design automation systems used in enterprises with project documentation for classified products, as well as dual-use products, reliable security tools should be created, for which it is necessary to use all the tools implemented in field of information security, including steganographic, cryptographic and hardware methods of ensuring it.
APA, Harvard, Vancouver, ISO, and other styles
49

A. Alrubaidi, Mohammed, and Nabil Hassan Abdo Al-Hemyari. "Impact of Information Technology Risks on Information Systems Security: A Field Study of Telecommunication Companies in Yemen." مجلة الدراسات الاجتماعية 27, no. 1 (May 6, 2021): 125–57. http://dx.doi.org/10.20428/jss.27.1.5.

Full text
Abstract:
This study aimed to assess the impact of information technology risks on security of information systems by following an analytical method based on the structural equation modeling (SEM). The study population was seven telecommunication companies in Yemen. A questionnaire was distributed to 356 participants, but only 218 forms were valid for analysis. The data was analyzed by the partial least squares (PLS). The study findings revealed that information technology risks had a negative impact on the security of information systems. The study recommended that the security of information systems should be strengthened so as to maintain the confidentiality of information, its availability and safety from risks, and to cope with speedy developments in information and communication technology.
APA, Harvard, Vancouver, ISO, and other styles
50

Shi, Shuyun, Min Luo, Yihong Wen, Lianhai Wang, and Debiao He. "A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems." Security and Communication Networks 2022 (March 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/6735003.

Full text
Abstract:
With the development of telecommunication systems and customized monitoring devices, telehealth has been widely used to improve medical quality and reduce overall health costs. However, the convenience of connection between the providers and patients through a public channel also leads to significant security and privacy concerns. Though there have been many authentication schemes designed for secure communications in telecare systems, most of them suffer from malicious attacks or have heavy computation and communication costs. Thus, in this article, we proposed a blockchain-based user authentication scheme integrating with access control and physical unclonable function (PUF). Permissioned blockchain and PUF are used to support secure data sharing across the healthcare service providers and identify the devices, respectively. Security analysis shows that our protocol satisfies the security requirements for telehealth services and is provably secure in the random oracle model. The performance evaluation demonstrates that it has less computation and communication costs compared with three of the latest schemes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography