• INFORMATION SECURITY

    ON THE CONTEMPORARY CYBERSECURITY THREATS

    Security & Future, Vol. 1 (2017), Issue 3, pg(s) 111-113

    Cybersecurity is one of the most commented areas in IT nowadays. Plenty of network and application attacks are possessed worldwide. Security becomes serious issue for corporations and governmental computer networks as functionality of applications rises in technological aspect. Most affective and widely used network attacks and application vulnerabilities are commented in this reviewing paper. Primary solutions for network security are proposed.

  • INFORMATION SECURITY

    BIOMETRIC MULTI-FACTOR AUTHENTICATION

    Security & Future, Vol. 1 (2017), Issue 2, pg(s) 65-68

    This paper focuses on multi-factor authentication methods. It primarily addresses biometric methods, in particular authentication through written expression. It summarises the results of many years of research activities by the authors in the field of the dynamic biometric signature1 (DBS), including new experiments. It concludes by comparing this type of signature with a signature based on cryptographic methods with a view to the current eIDAS Regulation.

  • INFORMATION SECURITY

    COMPARATIVE STUDY OF VULNERABILITY SCANNING TOOLS: NESSUS vs RETINA

    Security & Future, Vol. 1 (2017), Issue 2, pg(s) 69-71

    Detecting vulnerabilities for a network is an important procedure which ensures that all the data, network-based applications and information communicated in this network, is secure. Detection of network vulnerabilities is used to determine weaknesses of the network, the risk evaluation of attacks, the diagnosis and suggestions to solve the problems. There are several types of scanning tools used to detect vulnerabilities, offering different features. In this paper, we will present a performance comparative study between two most used free, software based, network vulnerability scanning tools: Nessus and Retina. The comparison will be based on three main features: The ability to search, Scanning Time, The ability to detect vulnerabilities. In the conclusions of this paper, both scanners performed very well in vulnerability identification. In terms of speed without active Web Application feature, Nessus performed much faster than Retina; (on the other hand, with active Web Application module, Nessus performs much slower than Retina. In terms of scan depth, Nessus has a small advantage, since it includes a web mirroring tool that is very helpful in HTTP.

  • INFORMATION SECURITY

    THE MOTIVATION OF HIGH SCHOOL TEACHERS IN THE FORMATION OF THEIR OWN COMPETENCIES IN THE FIELD OF INFORMATION SECURITY

    Security & Future, Vol. 1 (2017), Issue 1, pg(s) 21-22

    The article describes the problem of involving high school teachers in establishing the national information security by applying their own competencies in the field of information security and protection in the educational process, the demonstration of their trainees and active implementation in their own professional activities. Tasks of the personal and proprietary information protection often not resolved, which is a potential threat to the learning process, research activities of the University, and can be used cyber criminals for cyber extremist or terrorist crimes. The teaching staff motivation is a cornerstone in forming the own competencies in the field of information security process. The traditional leadership approach to formation procedure of information security in this case is insufficient, as the teacher is a leader of a new person preparation, ready to operate successfully in an information society.