• INFORMATION SECURITY

    Analysis of internet of things security breaches

    Security & Future, Vol. 8 (2024), Issue 3, pg(s) 82-85

    The report analyzes the nature of the Internet of Things (IoT), presents a basic architectural model of IoT, and categorizes IoT according to various criteria. The most famous IoT security breaches are presented. The vulnerabilities that led to the security breaches and the scale and consequences of the impact of the breach are analyzed. Overview and analysis of IoT security breaches are the subject of this research. The main threats and vulnerabilities are systematize and the response of the world community is tracked

  • INFORMATION SECURITY

    IoT, Security and Privacy

    Security & Future, Vol. 8 (2024), Issue 1, pg(s) 29-30

    Many of the devices in the IoT group process personal information or information enabling profiling or revealing the identity of natural persons. Naturally, the question of the security of this information and compliance with the legal requirements for the protection of the personal data of natural persons and their inviolability arises. The study defined the main issues related to the protection of personal data, identified threats and risks to the security and privacy of information processed by IoT devices.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Model of the Whistleblower Protection System

    Security & Future, Vol. 7 (2023), Issue 1, pg(s) 9-11

    The construction of the system for the protection of whistleblowers is in accordance with the legal framework of the Republic of
    Bulgaria and the EU Directive.
    The report defines a multi-layered model of the protection system, including:
    – Information on violations;
    – Persons who granted protection:
    – Obliged entities, including:
    – Employers in the public and private sector;
    – Institutions, bodies, services and agencies of the EU;
    – European Commission.
    Signaling channels, duties and functional interactions between the main elements of the model are structured. A mechanism for
    synchronizing and controlling signal processing activities s presented. The model is a theoretical basis for the construction and functioning
    of the whistleblower protection system.