Table of Contents

  • Artificial intelligence and security. Security 4.0

    pg(s) 3-5

    The Artificial Intelligence (AI) has giant possibilities to optimize the fight against crime and strengthen national security. In the conditions of unimaginable accumulation of information and the need for rapid decision-making, only the use of AI can lead to success. Intelligence, counterintelligence, forensic science, counteracting organized crime, rapid processing of available information, drafting of varied decisions, creating plans and multivariate scenarios, performing various analyzes is a time-consuming process. Only its use can significantly shorten this time and thus dramatically increase the possibilities for detection, prevention and curbing crimes.

  • Content security policy validation

    pg(s) 6-9

    Due to the unstoppable growth of security flaws, the developers need to pay attention and be patient in the integration of security defence in the application development! In most of the cases, they are either uninformed or unqualified of implementing it which cause some huge breaks in the application! There are a lot of documentations/guidelines/tools free for use to help the developers in their work! For the last few years browsers have integrated certain security header controls to support the web application security! In the present research we will present, in our opinion, one of the most important http security response header – the one responsible for the security of the main base of a web application namely the content! Content Security Policy may help in preventing the some of the most vulnerable security attacks (XSS), but in the hand of an unexperienced developer it can breaks the entire application!

  • Safety of the entity’s functioning in the context of the implemented quality management system in accordance with ISO 9001:2015 – a case study analysis

    pg(s) 10-13

    The aim of the article is to present what benefits for the entity result from the implemented quality management system in accordance with the ISO 9001:2015 standard and whether having such a system is about organizational security and is effective protection against threats related to its functioning.

  • Competence centres and intelligent security systems in Bulgaria

    pg(s) 14-16

    Joint Research Center, as a European Commission’s structure for science and knowledge, provides independent research to support the overall European Union policy. Innovative tool for dealing with expected and / or emerging challenges that need to be addressed at EU and Member States levels, and understood by the political environment is the building of competence centers. Centers focus their work on the development of analytical tools that can be applied to each policy area.
    A concrete example of rational national approach for implementation of this policy is establishment of the Center of Competence “Quantum Communication, Intelligent Security Systems and Risk Management” (Quasar). Thereby it is anticipated that innovative collaborative approaches and practices will be developed between different organizations with responsibility in the field of higher education and science, aiming at the modeling and development of interoperable, at national and European level, intelligent security systems.

  • The security environment and the challenges to the European Union and NATO in the field of security

    pg(s) 17-21

    There are three key moments for the development of security and defense globally: First is dynamics of events in the new security environment, second is the importance of so-called “Events leading to change” in the environment and third is the degree of ability of the Parties to anticipate certain situations related to security challenges.
    The need for a strategic reconsideration of the security environment and for EU-NATO interaction calls for consideration of the challenges and problems facing the CSDP and the Alliance to improve their joint security work.

  • Islam: The frightening religious otherness

    pg(s) 25-28

    Against the backdrop of the changing role of religion in geopolitical relations, and in connections with the identified global threats to humankind (such as terrorism, organized crime, human trafficking, etc.), a considerable number of theorists and ideologues focused on the problem of security are relating these threats to the growing activeness of religious minorities in various parts of the world, and specifically of supporters of the extreme, fundamentalist version of Islam. Speaking of security, we must inevitably think of fears. The latter are about personal and public safety or the anxiety that society may stop functioning. Widespread fears have a corrosive, long-term effect on social cohesion and stability. The social exclusion of ever-greater groups of people spreads to more and more spheres, such as those of the economy, the market, politics, education, healthcare, etc. The increasing marginalization of groups of people, and the inability of institutions to resolve the problem, result in the search for a scapegoat – the role of such may fall upon the political elites, ethnic minorities, migrants. Identifying an enemy is a precondition of social conflict. We are increasingly afraid of one another as we have become accustomed to believing that our worlds are so different that there meeting would bring about the end of at least one of them. Labeling, supported by passionate qualifications, has proved to be a universal way of dealing with the unfamiliar. Woe to him who cannot define himself and continues naively to believe we can live together without the aid of stereotypes. The oldest and strongest human emotion is fear, and the oldest and strongest fear is that of the unknown. Some of the images related to contemporary Islam are formed not within the House of Islam, but where the religious community is obliged to coexist with others. The change of representations of the so-called European Islam can be identified in Bulgarian reality as well. The willingness to adopt and follow certain principles of conduct typical for the arguments of fundamentalism grows in direct proportion with the growing variety of the immediate social environments of Muslims. In fact, the spaces of fundamentalist interpretation of the religious canon are formed not within the traditional Muslim communities but at the points of their active contacts with other cultural and religious models.

  • Analysis of data transmission methods using visible light for information security

    pg(s) 29-30

    We consider modern methods of transmitting messages by means of modulating the intensity of the flux of visible light from LEDs. The structure of data transmission and existing standards are analyzed. The possibility of using technology to organize a channel of information leakage has been determined. Discusses methods for countering information leakage by modulating the intensity of the light output of LEDs.

  • Counter-drone activity as a system

    pg(s) 31-34

    However, several counter-drone solutions exist, these are individual, isolated means of countering drones. The aim of the paper is to sum up the counter-commercial-drone solutions and to highlight the possible synergic effects of employing these assets as a system. The author reckons that during the formulation of counter-drone systems, the basic tenets of defensive counter-air and airspace control also can be applied. In the paper, the expression of drone means a remotely piloted aircraft system which can be purchased from commercial stores or from internet based stores.

  • Aging of the ASC Whetlerite type gas mask carbons during storage and operation – overview

    pg(s) 35-37

    Based on the experience from the storage and operation of the gas masks canisters and filter canisters for collective protection, an overview has been made of one of the main disadvantages of the gas mask carbons used of type ASC Whetlerite, the declining of their protective properties as a result of the “aging’ process. The “aging’ factors of the gas mask carbons have been considered and mechanisms adopted for deactivation of their active phases. It has been demonstrated that the inclusion of ТЕDА and derivatives of pyridine in the active phase of the gas mask carbons of the type ASC Whetlerite, only partially solves the problem with the increase of the robustness against “aging” in the conditions of increased atmospheric humidity in operation and storage and for the overall solution, gas mask carbons need to be developed based on impregnation compositions other than of the ASC Whetlerite.