Siga este enlace para ver otros tipos de publicaciones sobre el tema: Security threats.

Artículos de revistas sobre el tema "Security threats"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security threats".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Texto completo
Resumen
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc. A maritime space safe from such kind of threats generally means maritime security. Thus, a great part of the threats to maritime security are or may constitute threats to international peace and security, subject to their recognition as such threats by the United Nations Security Council in its resolutions. Usually such threats also pose risk to maritime safety (safety at sea, safety of navigation, ships, crew and passengers); however, any threat to maritime safety does not necessarily endanger maritime security or amount to the threat to international peace and security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

A. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.

Texto completo
Resumen
This article considers threats to integration systems, as well as methods of prevention. Threat modeling involves identifying potential threats to a system, assessing the likelihood and impact of each threat, and developing strategies to prevent or mitigate those threats. For integration systems, there are many potential information security threats, including unauthorized access, malware, insider threats, DoS attacks, SQL injection, and data leakage. To ensure the security and integrity of enterprise integration systems, it is crucial for organizations to understand these threats and implement appropriate security controls and monitoring. In addition, it shows the role of regular security assessments, employee training, and the integration of advanced threat detection technologies to actively address emerging threats and enhance overall system resilience. This article highlights the importance of information security threat modeling for integration systems and provides an overview of some of the key threats that organizations should be aware of when implementing and managing these systems. Keywords: threats, integration threats, sql injection, Biztalk, DOS attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Prayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (May 30, 2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.

Texto completo
Resumen
The transition and development of forms of threats to the security of an international state at this time cannot always be resolved by armed forces and not only like war, this form of threat is known as non-traditional threat terms that threaten human security. The global Covid-19 pandemic not only poses a threat to aspects of national security but also has a major impact on human security. This study uses the Copenhagen perspective as the main theory in research and is supported by the concept of non-traditional security and the concept of securitization. This research method is a qualitative approach. The result shows that the global Covid-19 pandemic has provided various forms of threats to sectors on non-traditional security issues in Indonesia. The non-traditional security sectors that have received threats due to the global Covid-19 pandemic are several sectors such as Indonesian public health security, economic security, sociocultural security, etc.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Texto completo
Resumen
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (May 12, 2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.

Texto completo
Resumen
Increasing technological complexity of cyber threats creates a major challenge between securing data privacy and maintaining potent cybersecurity practices. The paper examines privacy-protecting security methods in cybersecurity by detailing organizational approaches to defend private information throughout the cyber threat detection and mitigation process. Organizations need to establish the appropriate levels of data security because implementations that limit privacy too much threaten their security capabilities but weak protection measures create vulnerabilities to data breaches. The research implements Cybersecurity: Suspicious Web Threat Interactions data to examine actual cyber threats which comprise phishing attacks and malware and unauthorized access attempts. The effectiveness of data protection approaches including encryption and differential privacy together with homomorphic encryption and federated learning and anonymization solutions gets tested for their ability to secure confidential information throughout cybersecurity operations. The research investigates threat detection accuracy together with computational efficiency and GDPR and CCPA compliance effects when using these techniques. Results demonstrate that security frameworks gain significant improvements from privacy-preserving systems because these systems decrease breach threats and meet all regulatory compliance requirements. The main limiting factors for these privacy-preserving methods consist of excessive computational requirements as well as adversarial threat vectors and the detection versus protection trade-offs that need improvement. This paper presents strategic guidance about privacy-aware cybersecurity models which optimize security capabilities together with data protected information. This research investigates cybersecurity and privacy-preserving methods to assist the development of ethical systems meeting regulatory standards which protect users from advancing cyber threats through privacy-protected mechanisms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Texto completo
Resumen
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.

Texto completo
Resumen
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable to attacks. Mobile devices are the new frontier forviruses, spam and other potential security threats. All theseviruses, spam, Trojans and worms are out there in our vicinity togain access to our personal data. This research aims to analyze thethreats of viruses in the wireless communication systems andsecurity including their role in the service outbreak, laying downthe possible scenarios and also identifying possible remedies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (June 28, 2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Texto completo
Resumen
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.62.

Texto completo
Resumen
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable to attacks. Mobile devices are the new frontier forviruses, spam and other potential security threats. All theseviruses, spam, Trojans and worms are out there in our vicinity togain access to our personal data. This research aims to analyze thethreats of viruses in the wireless communication systems andsecurity including their role in the service outbreak, laying downthe possible scenarios and also identifying possible remedies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Saptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.

Texto completo
Resumen
Boundary is an important part of the state's sovereignty and becomes a fortress of all kinds of threats. The threat about security of natural resources is one of non-military threat which affects Indonesia’s security. Betung Kerihun National Park adjoins to Malaysia in northern of Indonesia, so it can be vulnerable to threats. The purposes of this research are to analyze the threat of security toward management of Betung Kerihun National Park (TNBK), the efforts made to overcome the security threat, and the management of TNBK on the border of Indonesia and Malaysia. The research uses qualitative method using in-depth interviews and later analyzing the primary and secondary data. The results show that the security threats of TNBK are agarwood stealing, gold mining, illegal logging, wildlife distribution, lack of security staff, no security forces (Satgas Pamtas) on the northern boundary of TNBK, and border patrol inspection line construction. The efforts to overcome security threats are preventive, pre-emptive, and repressive. The management of TNBK on the border of Indonesia and Malaysia in order to protect border security are including management functions of planning, organizing, leading (directing), and evaluating. The recommendations to overcome the security threat of national parks on the border between Indonesia and Malaysia are the active role of security forces and the establishment of buffer zone management.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Texto completo
Resumen
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.

Texto completo
Resumen
The article analyses texts of resolutions of the UN GA First Committee and highlights threats mentioned in these documents for the period 2014–2021. The main objective of this research is to study the essentiality of security threats contained in the resolutions texts of the UN GA for the period 2014– 2021, as well as to classify the identified threats. M ethods of document analysis, content analysis and classification are applied in this study. On the whole, 800 documents are analysed. The content analysis of the English-language resolutions texts of the UN GA First Committee makes it possible to single out those documents that had the content related to threats. The method of document analysis allows to single out threats to international security and threats in general. The classification method helps all threats to be classified according to certain approaches. Two approaches to the classification of threats are distinguished: by realism and by power. According to the realism of the threats discussed in the texts of the documents, they can be classified as real and potential ones. The following types can be distinguished according to the power of influence: the greatest threat to the survival of humanity; a threat to humanity and all living beings on Earth; a threat to humanity and the survival of civilisation; a threat to humanity; a global threat; a threat to international peace and security; a growing threat to international security; a threat to peace and security; a threat to achieving the goals of sustainable development; a threat to human health and environment; a threat to peace; a threat to security; a threat. On the basis of the conducted analysis, it can be stated that nuclear weapons are most often mentioned in the resolutions texts of the UN GA First Committee as a threat to international security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Ayub, Kamran, and Roushdy Alshawa. "Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare." Journal of Robotics and Automation Research 5, no. 3 (December 31, 2024): 01–08. https://doi.org/10.33140/jrar.05.03.09.

Texto completo
Resumen
Wireless Body Area Networks (WBANs) are critical components of emerging smart healthcare solutions. Due to the intrinsic nature of wireless communication and the potentially sensitive medical data they carry, such networks are often very vulnerable to many types of security threats. As a result, the security of WBANs becomes a prime concern when they are considered for use in healthcare or medical applications. This text enumerates common security threats that a typical WBAN should prepare for. It also provides a set of enhancement mechanisms and techniques that could be implemented to augment the security of WBANs. Furthermore, a vital precautionary activity that should be taken in the initial steps towards developing a secure WBAN system— threat modeling—is also described. This text presents two elaborated example cases for the threat modeling technique for WBANs: patrolling and insulin injection WBANs. The cases demonstrate that threats in WBANs are further sources of vulnerabilities, beyond the definition of threats from common knowledge, that should be evaluated and addressed before deployment. Results show that there are plenty of possible problems that threaten the security and privacy of WBAN systems, which should be taken into strong consideration. It is believed that the proposed threat modeling methodology here will significantly contribute to secure designs of WBANs and can also potentially be generalized to other embedded systems as well.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Syed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (October 30, 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.

Texto completo
Resumen
Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security concept and added up the non-traditional threats as necessary part in security planning. Non-Traditional threats, terrorism, ambiguous warfare, cyber threats, water security, human security and energy crises etc now have equal importance with the border security. To protect the state from these actors, Pakistan is now reassessing and reorganized its security strategies. But these policies need more deliberate efforts to deal with such internal and external factors that are slowly and constantly weakening the state.Int. J. Soc. Sc. Manage. Vol. 4, Issue-4: 267-274
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Pendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Texto completo
Resumen
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Karpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (December 20, 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.

Texto completo
Resumen
Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Beladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (March 31, 2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.

Texto completo
Resumen
Abstract:In today's rapidly evolving digital landscape, organizations face an increasing number of cyber threats that jeopardize their sensitive data, operations, and reputation. A Cyber Security Security Operations Center (SOC) Analyst plays a critical role in detecting, analyzing, and mitigating cyber threats in real-time. This role involves continuous monitoring of security alerts, incident response, threat intelligence analysis, and ensuring compliance with security policies and frameworks. SOC Analysts leverage advanced security tools such as SIEM (Security Information and Event Management) systems, IDS/IPS, firewalls, and endpoint protection solutions to safeguard organizational assets. Their expertise in log analysis, network traffic monitoring, and threat hunting helps in identifying vulnerabilities and minimizing the risk of cyberattacks. As cyber threats become more sophisticated, the role of a SOC Analyst remains pivotal in strengthening an organization’s cybersecurity posture and resilience.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Albarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (November 23, 2024): 10867. http://dx.doi.org/10.3390/app142310867.

Texto completo
Resumen
The Web of Things (WoT) represents a significant advancement on the Internet of Things (IoT), where web technologies are integrated to enhance device interoperability and accessibility. While this integration offers numerous benefits, it also introduces new and complex security challenges. This paper presents a critical analysis of WoT security, examining the ecosystem’s vulnerabilities and associated threats. Our contributions include an in-depth analysis of existing threat enumeration methodologies, highlighting misconceptions and inefficiencies that may weaken security measures. We further conduct a comprehensive survey of critical threats within the WoT environment, detailing potential attack vectors and misuses linked to these threats. To address these security gaps, we propose a set of defenses tailored to each identified threat, providing a holistic view of the WoT’s security landscape. We also develop abstract architectural models of the WoT using UML, serving as foundational tools for understanding the interactions and risks within WoT systems. Finally, we model a specific attack scenario, demonstrating how attacks unfold in real-world WoT environments and the importance of defense strategies. These findings aim to guide the development of secure WoT systems, ensuring robust defenses against evolving security threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Sri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (January 31, 2024): 56–63. https://doi.org/10.5281/zenodo.13325168.

Texto completo
Resumen
The threat of different cyber threats as well as the development of new sophisticated malware necessitates the use of modern security measures to protect endpoint devices. One of the key promising approaches for enhancing the endpoint protection is Applying Explainable Artificial Intelligence (XAI) that provides a comprehensible explanation for identifying potential threats. This undergoing researching paper aims to identify and discuss how or whether XAI can help conduct security threats at endpoints and how it can identify and mitigate complex cyber threats while at the same time simplifying and being accountable.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Smirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Texto completo
Resumen
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Texto completo
Resumen
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Batham, Diksha, Ghanshyam Prasad Dubey, Mohini Sharma, Shailendra Mourya, Ashish Singh, and Anushka Sharma. "Mobile Security – Light on Security Threats." International Journal of Emerging Technology and Advanced Engineering 14, no. 2 (June 22, 2024): 25–34. https://doi.org/10.46338/ijetae0224_04.

Texto completo
Resumen
The smartphone has evolved into a little computer that can perform all of our daily tasks, including social media use, email correspondence, and banking. The use of smartphones is also increasing quickly. Because there are more and more connected biases in the network field every day, cyberattacks are also increasing. All connected device linked to the Internet has become the target of cyberattacks as new types of network attacks have emerged. Consequently, network data security cannot be disregarded. Not only is operating system and device usage directly related to mobile security, but internet and communication with stoners, data encryption, and the sequestration consciousness of drug users are also important factors. the primary donation and the study's conclusionare to collect information about mobile security, Mobile hazards and network security in the present and future. research in this area on mobile vulnerabilities, attack types, and malware. Every mobile device has a number of vulnerabilities due to different features and terrain. Cybersecurity has become crucial for the service, associations, and specific computer users. Since the advent of the internet, security has become a top priority, and the development of safety technology is informed by security history. Positive safety pitfalls are made possible by the net shape itself. But only if the Internet's design is altered. will decrease the potential attacks that could be made across the network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Muliński, Tomasz. "ICT security in revenue administration - incidents, security incidents - detection, response, resolve." Studia Informatica. System and information technology 27, no. 2 (January 11, 2023): 75–93. http://dx.doi.org/10.34739/si.2022.27.04.

Texto completo
Resumen
The article shows the author's approach to the methods of acquiring and analyzing reports and security incidents, categorizing their sources in relation to the literature describing ICT security threats, taking into account the legal regulations in force in the Polish public administration. Methods of verification and analysis of detected threats, methods of threat resolution were presented. Tools and procedures used to evaluate reported incidents and assess the threat level of reported incidents were discussed. The incidents and events identified in the period April 2018 - February 2022 were analyzed. Due to the implementation of remote work, there were challenges related to the need to ensure secure remote access to ICT systems of the tax administration. This entailed the need to develop other methods of analysis, response and development of procedures for safe use of workstations by employees providing remote work. The article shows a wide variety of events that members of the security incident response team had to deal with. The obtained results will also be compared with the conducted scientific research on the perception of security threats in public administration and how changes in IT service in the studied organization influenced security management and affect the developed model of combating intentional security threats to information systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Tanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (January 31, 2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.

Texto completo
Resumen
In an increasingly digitized world, cybersecurity has emerged as a critical domain for ensuring the safety and integrity of information systems. This paper provides a comprehensive overview of the current state of cybersecurity, highlighting the evolving threat landscape, key challenges, and strategic defenses. Cyber threats have become more sophisticated and widespread, targeting both individuals and organizations. These threats include various forms of malware, phishing attacks, ransomware, and advanced persistent threats. As a result, the need for robust cybersecurity measures has never been more pressing. This abstract discusses the importance of adopting a multi-layered security approach that encompasses technical solutions, policy frameworks, and human factors. Technical solutions include the deployment of firewalls, intrusion detection systems, and encryption technologies. Additionally, emerging technologies such as artificial intelligence (AI) and machine learning (ML) are playing an increasingly significant role in identifying and mitigating cyber threats. These technologies can analyze vast amounts of data to detect anomalies and predict potential attacks before they occur. Policy frameworks are essential in establishing guidelines and standards for cybersecurity practices. These policies help ensure that organizations implement best practices for protecting their information assets. International cooperation and compliance with regulations such as the General Data Protection Regulation (GDPR) are crucial for maintaining a secure cyber environment. Human factors are often considered the weakest link in cybersecurity. Therefore, continuous education and awareness programs are necessary to equip individuals with the knowledge to recognize and respond to cyber threats. Employee training on safe internet practices and regular updates on emerging threats can significantly reduce the risk of successful cyber attacks. As cyberattacks continue to escalate in frequency and severity, it is imperative for both private and public sectors to collaborate in developing robust cybersecurity strategies. This paper aims to contribute to the ongoing discourse by offering insights into effective practices and future directions for research and development in the field of cybersecurity. In conclusion, the dynamic nature of cyber threats requires a proactive and adaptive approach to cybersecurity. By integrating advanced technologies, establishing comprehensive policies, and fostering a culture of awareness, we can enhance our defenses against the ever-evolving cyber threat landscape
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

صادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (December 1, 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.

Texto completo
Resumen
After the Cold War, security policy has been changed dramatically. Currently, security no longer covers only war and army. For instance, at the time I am writing this paper, health security because of Corona virus is much riskier than atomic weapons, terrorists or any other army threats. Political systems are concerned to care about political, health, cyber, economic, food, water, environment, education and other security sectors. Kurdistan region has faced some interior and foreign security challenges. In theoretical framework, the research sheds some light on security situation in concept, changing of security priority and different approaches to point out security threat of various types. This research has come to this result that there are ten major domestic security challenges that threaten Kurdistan region. Later on, in the field framework the research has collected data for each one of security threats depending on deep discussions with tens of specialized experts in Kurdistan region security policy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Koper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (October 30, 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.

Texto completo
Resumen
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must be dealt with to provide security to a state, other threats are related to economic, ecological, social or cultural aspects.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Biehun, Anatolii, Olha Osypova, Maksym Plakhtii, and Oleksandr Urdenko. "The analysis of external and internal threats of electronic ticket functioning at entertainment events." Modeling and Information Systems in Economics, no. 101 (December 1, 2021): 20–31. https://doi.org/10.33111/mise.101.3.

Texto completo
Resumen
E-ticketing activities are fully inherent in both traditional business threats and e-commerce threats posed by e-business technologies and the widespread use of computer and telecommunications technology. Threats in the sale of electronic tickets arise at almost all stages of activity and affect the interests of both sellers and buyers. Therefore, the need for comprehensive measures to identify and monitor threats is obvious to companies engaged in the sale of electronic tickets. The solution to the problem of counteracting the security threats of enterprises engaged in the sale of electronic tickets to entertainment events, primarily related to addressing the protection of information technology used in it, ie to ensure information security. The classification of threats to information security is an important step in assessing the security of information systems and the development of measures to ensure information security of the enterprise. In this study, which has a scientific and methodological nature, classified and systematized the threats that accompany the activities in the field of electronic tickets for entertainment events. The classification of threats to information security of enterprises engaged in the sale of electronic tickets to entertainment events is carried out on the basis of a combination of the following criteria: 1. The origin of the threat: external and internal threats. 2. Sources of threats: threats caused by human activities; threats, the source of which are software and hardware; threats posed by the natural environment. 3. Intention to realize a security threat: intentional and unintentional actions of the violator. The results of the classification of information security threats can be further used in the process of conducting an information security audit of the enterprise. Specific software solutions for conducting an information security audit of the enterprise are also considered.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Aliyu Yauri, Bashir, and Joshua Abah. "Mitigating Security Threats in Virtualized Environments." International Journal of Scientific Engineering and Research 3, no. 5 (May 27, 2015): 86–92. https://doi.org/10.70729/ijser15175.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Bari, Ahamed Basha Abdul. "Healthcare Facilities and Cyber Security Threats." Chettinad Health City Medical Journal 11, no. 04 (December 31, 2022): 1. http://dx.doi.org/10.24321/2278.2044.202232.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Jaźwiński, Ireneusz. "Economic Security Threats. Determinants of State Functioning and Economic Policy." Przegląd Strategiczny, no. 16 (January 22, 2024): 77–88. http://dx.doi.org/10.14746/ps.2023.1.6.

Texto completo
Resumen
Threats to economic security affect national security. The aim of the article is to present the economic security threats taking into account selected determinants of state functioning and economic policy. In shaping economic security, it is important to properly consider threats to this security. Various research methods were used in the work, including the method of critical analysis of the literature as well as the method of analysis and synthesis. Considering the issues of economic security, it is also worth analyzing the threat to this security. In theory and practice, different aspects and types of threats to economic security can be taken into account. Many economic and social indicators should be used in the identification and assessment process of economic security threats. Poland’s security is affected by various economic threats, including those related to the international situation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Guchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.

Texto completo
Resumen
The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare.
 Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Smalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.

Texto completo
Resumen
Over time, the issue of security has not lost its relevance, but on the contrary gained momentum because of the large-scale threats that have arisen and evolve. In today's world, there are threats that are beyond the control of a particular country and, for the sake of security, begin to pool their forces and resources. The author reveals the particularities of threats to European collective security in the 21st century. The article identifies threats based on doctrinal approaches. The threat is a set of factors and conditions that could potentially pose a danger to the state in the future. The author examines approaches to the classification of threats to collective security and their characteristics, as well as the author's classification of threats according to their relevance and time of occurrence. According to scientific approaches, the threats to European collective security are divided into: economic, military, information, environmental and other nature; direct and indirect; potential and immediate; external and internal. The author proposed his own classification of threats, according to which they are divided into: new threats, again relevant and classic. The author shows the threats influence on the formation of the European collective security system and how they affect its current changes. It is noted that contemporary external threats were emerging at the turn of the late 1980s – early 1990s, and some of them continue to be shaped and strengthened today. Given the current challenges that pose a threat to collective security, a number of specific actions need to be taken to improve the performance of collective security organizations in order to more effectively address contemporary threats. The author proposes ways to improve the activity of modern collective security systems in order to avoid the emergence and development of large-scale threats to collective security in the 21st century.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Texto completo
Resumen
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specifically, the authors integrate threat modelling with the socio-technical security modelling language (STS-ml), introduce automated analysis techniques that propagate threats in the combined models, and present tool support that enables reuse of threats facilitated by a threat repository. The authors illustrate their approach on a case study from the Air Traffic Management (ATM) domain, from which they extract some practical challenges. The authors conclude that threats provide a useful foundation and justification for the security requirements that the authors derive from goal modelling, but this should not be considered as a replacement to risk assessment. The usage of goals and threats early in the development process allows raising awareness of high-level security issues that occur regardless of the chosen technology and organizational processes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Dervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.

Texto completo
Resumen
Abstract In the process of designing and forming each system, it is necessary to identify potential vulnerabilities and threats to that system and to include appropriate countermeasures. The process that helps to find the problem in the first phase of design is called threat modeling. Threat modeling is based on the idea that every system has valuable resources that need to be protected. These resources have certain weak points that internal or external threats can use to harm them, while there are as well countermeasures used to mitigate them. Therefore, this paper analyses the security of a Web of Things (WoT)-based system for remote management of windows, which is in the design stage by using a threat modeling approach based on STRIDE and DREAD. The results obtained through Microsoft Threat Modeling Tool (MTMT) justified the use of threat modeling in the design phase given that we have identified in total 118 threats, with Elevation of privilege class of threats being the most prominent ones. The Information disclosure threats are found to be the ones characterized as medium and low risk ones, while the most represented high-risk threats again come from the Elevation of privilege class of threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Yarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (September 9, 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Texto completo
Resumen
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 or –0.5. The Harrington-Mencher function is proposed to determine the information security threat index. Nonlinear normalization was carried out to bring the initial data to a comparable measurement. Canonical analysis was performed to determine the indicator weights. The data from 159 countries were taken for 2018 to assess the index. The result was presented on the map showing countries’ distribution by the information security threat index, thus forming five groups. The group with a “very well” resistance to threats includes economically developed countries with a high level of information security. The “well” group was formed by new industrial and developing countries with economic potential sufficient to prevent information threats and combat their consequences. The information security level in developing countries, where the results of overcoming information threats will affect the economic sphere, is defined as “acceptable”. Countries with a low level of development and information security formed groups designated as “bad” and “very bad”, which indicates a high level of threats to their information security. AcknowledgmentThis work is carried out with in the tax payer – funded researches: No. 0118U003574 “Cybersecurity in the banking fraud enforcement: protection of financial service consumers and the financial and economic security growth in Ukraine”.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Jenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (January 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.

Texto completo
Resumen
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Texto completo
Resumen
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that materialises into an attack, forms an essential basis for a quantitative security metric. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on a Markov chain and Common Vulnerability Scoring System. Moreover, the paper introduces the method to estimate the probability of security attacks. The use of the new security threat model and its computation is demonstrated through their application to estimating the probabilities of cloud threats and types of attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.

Texto completo
Resumen
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs according to their threat levels. Prioritizing high-risk threats, this approach aids network management in strategic focus. By enabling swift identification and categorization of network security threats, this research equips organizations to take prompt, targeted actions, enhancing overall network security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.

Texto completo
Resumen
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs according to their threat levels. Prioritizing high-risk threats, this approach aids network management in strategic focus. By enabling swift identification and categorization of network security threats, this research equips organizations to take prompt, targeted actions, enhancing overall network security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.

Texto completo
Resumen
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs according to their threat levels. Prioritizing high-risk threats, this approach aids network management in strategic focus. By enabling swift identification and categorization of network security threats, this research equips organizations to take prompt, targeted actions, enhancing overall network security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Климов, Д. В. "External threats to enterprise security." Экономика и предпринимательство, no. 2(115) (May 6, 2020): 805–7. http://dx.doi.org/10.34925/eip.2020.115.2.161.

Texto completo
Resumen
В экономических отношениях предприятия выступают объектами экономических угроз. Экономическая угроза - это возможность потенциально причинить ущерб субъектам хозяйственной деятельности с внешней и внутренней среды. Угрозы существуют всегда и задача руководителей - предотвращать и избегать опасности, выходить из кризисных ситуаций с минимальными потерями. Уходя от наибольших угроз, все равно невозможно избавиться от всех угроз на предприятии. В список угроз постоянно входят новые звенья и перестают быть актуальными старые. Для того, чтобы избегать и правильно предотвращать угрозы, необходимо знать «врага в лицо». От места возникновения, все угрозы делятся на внутренние и внешние. Для каждого предприятия внутренние и внешние угрозы будут индивидуальны. Подробно рассмотрим внешние угрозы предприятия. In economic relations, enterprises are objects of economic threats. An economic threat is an opportunity to potentially cause damage to business entities from the external and internal environment. Threats always exist and the task of managers is to prevent and avoid danger, to get out of crisis situations with minimal losses. Avoiding the greatest threats, it is still impossible to get rid of all the threats in the enterprise. The list of threats constantly includes new links and the old ones cease to be relevant. In order to avoid and correctly prevent threats, it is necessary to know the “enemy in person”. From the place of occurrence, all threats are divided into internal and external. For each enterprise, internal and external threats will be individual. We consider in detail the external threats of the enterprise.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Ihor, Ya. Kulyniak, H. Bondarenko Yuliia, and I. Zhygalo Ivan. "Theoretical aspects of the essence and relationship between the shadow economy and the financial and economic security of the state." Economic journal Odessa polytechnic university 1, no. 11 (January 28, 2020): 29–39. https://doi.org/10.5281/zenodo.3975502.

Texto completo
Resumen
The article clarifies the essence of such concepts as "shadow economy", "economic security", "and financial security", "financial and economic security". The main reasons that cause the development of the shadow economy in Ukraine are highlighted. The main issues of the effective counteraction of external and internal threats in the sphere of financial and economic activity of entities are considered. As a result of the analysis and research, the components of the economic security of the state were given. The SWOT-analysis of the shadow economy of Ukraine was carried out and the main threats to the financial and economic security of both the region and the state were identified. The strengths, weaknesses, opportunities and threats were evaluated according to specially designed scales. The integral estimation for each quadrant of the SWOT-matrix of the shadow economy of Ukraine is made. The graph of the strategic vector orientation of the shadow economy as a threat to the financial and economic security of the state is constructed. It is established that the state needs to develop measures to counteract external threats and actively influence to reduce the negative impact of the shadow economy weaknesses as a threat to financial and economic security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Gould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.

Texto completo
Resumen
This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Abhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (December 5, 2024): 1268–79. https://doi.org/10.32628/cseit241061171.

Texto completo
Resumen
Securing cloud-based financial platforms presents unique challenges in an era of increasing cyber threats and distributed architectures. This article introduces a novel framework integrating artificial intelligence with microservices security, specifically designed for insurance and annuity sector applications. The proposed solution leverages predictive analytics and machine learning algorithms to enhance threat detection and response capabilities within containerized environments, implemented using Kubernetes on AWS infrastructure. The article demonstrates significant improvements in threat detection accuracy, system response time, and overall security posture while maintaining operational efficiency. The framework's implementation across multiple financial institutions reveals enhanced capabilities in identifying zero-day threats, reducing false positives, and maintaining regulatory compliance. Results indicate substantial improvements in security incident response times and operational efficiency compared to traditional security approaches. This article contributes to the growing body of knowledge in cloud security by presenting a scalable, AI-driven security architecture that addresses the unique challenges of microservices in financial platforms, while providing a blueprint for future implementations in similar high-security environments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Maher, Zulfikar Ahmed, Ali Ghulam, Muhammad Yaqoob Koondhar, Iftekhar Ahmed Mahar, and Mansoor Hyder. "Security Based SCURM Process (SUBSCRUM) For Secure Agile Development." VFAST Transactions on Software Engineering 12, no. 3 (September 8, 2024): 138–46. http://dx.doi.org/10.21015/vtse.v12i3.1893.

Texto completo
Resumen
This study presents an integrated approach for the consideration of security during agile development. A security-based SCRUM process (SBSCRUM) is introduced by taking advantage of the security patterns presented by security experts which contains the solution for a security threat. In the proposed security based SCRUM process the SCRUM team will be responsible for identifying the expected security threats to the system, in which all the expected threats to the system are modelled using mis-use case diagrams and then these modelled threats are mitigated using the security patterns which provide detailed solution to mitigate the threats and at final stage the security testing is performed to ensure that all the security threats identified are mitigated using security patterns. SBSCRUM is evaluated through the case studies in this paper. SBSCRUM will enable the software developers to develop secure software using agile development methods which lacks in the past.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Sri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (January 31, 2024): 56–63. https://doi.org/10.5281/zenodo.13253288.

Texto completo
Resumen
The threat of different cyber threats as well as the development of new sophisticated malware necessitates the use of modern security measures to protect endpoint devices. One of the key promising approaches for enhancing the endpoint protection is Applying Explainable Artificial Intelligence (XAI) that provides a comprehensible explanation for identifying potential threats. This undergoing researching paper aims to identify and discuss how or whether XAI can help conduct security threats at endpoints and how it can identify and mitigate complex cyber threats while at the same time simplifying and being accountable.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Shammugam, Inthrani, Ganthan Narayana Samy, Pritheega Magalingam, Nurazean Maarop, Sundresan Perumal, and Shanmugam6 Bharanidharan. "Information security threats encountered by Malaysian public sector data centers." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 1, 2021): 1820–29. https://doi.org/10.11591/ijeecs.v21.i3.pp1820-1829.

Texto completo
Resumen
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected through interview sessions. A total of 33 respondents from various government organizations were interviewed. The results revealed that the technical threats, spyware, phishing, bluesnarfing threats, social engineering and virus, trojan, malware, ransomware, viral websites threats are the major categories of threats often encountered by the malaysian public sector organizations. The causes for these threats are lack of budget, competent personnel, and manpower for security tasks, user awareness; lack of compliances and monitoring; insufficient security policies and procedures as well as deliberate cyber attacks. The outcome of this study will give a greater degree of awareness and understanding to the ICT security officers, who are entrusted with data center security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.

Texto completo
Resumen
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable to attacks. Mobile devices are the new frontier forviruses, spam and other potential security threats. All theseviruses, spam, Trojans and worms are out there in our vicinity togain access to our personal data. This research aims to analyze thethreats of viruses in the wireless communication systems andsecurity including their role in the service outbreak, laying downthe possible scenarios and also identifying possible remedies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Kopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka, and Katarzyna Bakalarczyk-Burakowska. "Security threats in cyberspace." Scientific Journal of the Military University of Land Forces 205, no. 3 (September 23, 2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.

Texto completo
Resumen
The article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security. Cyberspace is subject to increasingly sophisticated and targeted threats, while our growing reliance on cyberspace exposes our privacy to risks, giving rise to new and significant security gaps. Due to its specific characteristics, it generates serious threats to individuals as well as to national and international security. Depending on the research perspective we adopt, these threats are variable, multidimensional, and multifaceted in nature. Therefore, they require systematic analysis and response.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Bahgat, Gawdat. "Oil security: Potential threats." Contemporary Security Policy 19, no. 2 (August 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía