ECOSYSTEM OF SECURITY 4.0
The complex of interconnected structures of the security services, the opposing organizations and the environment in which they are immersed is a single living organism, building its own ecosystem.
The complex of interconnected structures of the security services, the opposing organizations and the environment in which they are immersed is a single living organism, building its own ecosystem.
Different agencies and organizations engaged in the struggle against the terrorism use different approaches and tools for adequate response to the “plague of the century”. Depending on the knowledge and skills of their employees they provide certain level of technical and operative readiness which guarantees them appropriate degree of security in relation to terrorist threats. But is it this sufficient, are their efforts sufficient to guarantee that their reactions are adequate to the dynamically changing security environment?
This report attempts to answer this question through creation of a matrix of minimum and obligatory requirements for building a reliable counteraction system against potential terrorist threats, that should become the next step in the development of the theory and practice for application of Directive 2008/114/ЕО of the EC Council, is of significant importance for increase of the security and protection of critical infrastructure objects.
Changes in the security environment should therefore be reflected by this system in order to prepare the population on the crisis events that have not yet occurred or have not occurred to such an extent or magnitude. The aim of the article is to examine the current system of civil protection in the Slovak Republic from the point of view of activities devoted to the preparation of the population and to the analysis of the population itself for crisis events through the analysis of the questionnaire survey results. Initial results indicate clear deficiencies both in the civil protection systems and in the preparedness of the population for crisis situations.
Cyber space as a new dimension of human activities has brought new possibilities not only for economic development offering new possibilities in information exchange together with approach to online data sources worldwide but also for human to human communication and entertainment in general. These factors underline not only its political magnitude but also have become important from military point of view in two directions. On one hand, freedom of use the cyber space has been one of vital state interests to be protected by military power. On the other hand, the cyber space has been a new way how to disrupt potential adversary´s economic, political as well as military power.
Importance of this new, but already explored, battlefield should be reflected about defence planning of the country to develop requirements of appropriate capabilities to protect own interests and if necessary, to limit power of potential adversary in general.
As result of the analysis of the structure and consistency of the national security and cybersecurity in the national legislation the authors reach the conclusion that the national security in Bulgaria is government function and has system character in line with the complex system theory. The national security system together with the cybersecurity system have fully functionality of the complex system because beside structure, interaction and relations, the system feedbacks, as periodic reports and document review procedures that reshapes the links and relations. The processes of: control as a cycle, security risk management and capability planning are reflected in the national legislation and are prescriptive, as well.
Participation in missions abroad is considered a kind of military career achievement other than military routine and familiar surroundings, which is straining both personal qualities and professional skills. This report presents a comparative analysis between participated and not participated in missions, officers, sergeants and soldiers, and how it has influenced their leadership development
It has been more than seven decades since the world’s first nuclear bomb was dropped on two Japanese cities. Since then, nine different countries have acquired nuclear weapons technology. Nuclear weapons, undoubtedly, are a hazardous power for a country. They do not only have explosive power; the power of deterrence may be more prominent than nuclear disintegration. During the Cold War era, nuclear weapons were used for deterrence effects. Two superpowers were in an endless arms race, significantly so, over these tremendous weapons. Fortunately, they were never used but deterrence was always a hot topic. However, nuclear weapons have always shown the evolution of classical geopolitics alongside the importance of today’s geopolitics which has been very much at the top of world politics since the first World War and even though countries are separated by great distances, nuclear weapons’ ranges mean that a country’s territory can be reached easily. Currently, these weapons are shaping countries’ defence policies, geopolitics strategies and their interests.
This report studies the threat for the European security posed by terrorist attacks with chemical, biological, nuclear or radiological (CBRN) materials. Latest tendencies of the problem of the last few years are being studied, and some cases broadly discussed in the media worldwide are being analyzed. Terrorists’ methodologies are being assessed, and their possibilities to obtain weapons of mass destruction. The possibility for developing an improvised explosive device with chemical substances aiming to cause damage to critical infrastructure targets which would pose a threat to the national security of the country is also considered.
Cultural heritage often becomes a victim of armed conflicts either by collateral damage or by deliberate destruction and looting. As a consequence of the terrorist attacks of recent years – especially the large-scale and widely broadcasted iconoclastic destruction perpetrated by ISIL/Daesh in Iraq and Syria – their protection gradually became part of the international security policy agenda. Proving the symbolic significance of these attacks, they have been often claimed both as acts against the peaceful coexistence of different religions and cultures in the region and as an insult against Western civilisation and multilateral bodies which the meticulously drawn-up discourse of the terrorist group strongly underpinned. Using the securitization theory as a framework, the aim of this paper is to analyze through discursive means the reaction of different international political actors – especially France, Italy, UN and UNESCO – over the attacks of the terrorist organisation, arguing that a continuous securitization process has been taking place as regards the safeguarding of cultural heritage.
Study outlines the contours and the magnitude of the asymmetry in the opposition of cyber defense against hackers. Propose a
model that reflects the dynamics of the opposition on both sides and the impact of the listed disproportions. It consist a functional analysis of the differences between organizational and technical approaches applied from both sides. Contains research into why even the most highly protected systems suffer from successful hacking attacks. The analysis sheds light on the magnitude of pressure exerted by malicious actors on cyber security for organizations and the disproportionate response from experts who protect information systems and networks.
Cybersecurity became the most famous topic concerning security development. Having social engineering in mind, all technical devices can be beaten and a cyberattack can have success just having incompetent personnel employed. In this research paper, some real social engineering texts as e-mails are shown and malicious intends presented. Short analysis is made about SE letters subjects
The main objective of this study is not to identify the best machine learning model, but instead to review the main datasets, publicly available, used to train and test security solutions that employ modern classification algorithms for anomaly detection. Hence, DARPA 1998 and KDD were studied as they were the first initiatives taken in this direction, while NSL-KDD, ISCXIDS2012 and CICIDS2017 are taken in consideration for future research because of their advantages. Personalized datasets will always bring a reasonable amount of uncertainty, especially since some feature vectors used for training remain unknown. Nevertheless, training on data specific to the protected infrastructure is more efficient, from the security point of view, than training on old attack signatures.
The technology of constructing models of software systems using non-deterministic finite state machines is offered. In this case, each vertex of the automaton model (state) is matched by the output function and the transition function. The first determines the actions performed in this state, and the second defines the conditions for the transition to other states. Bypassing an automated model tree of a program to implement it in some programming language, you can create your own program.
This report discusses the current problems related to the equipment for personal protection of employees from fire safety and civil protection, part of the unified rescue system, for incidents in critical infrastructure sites. It is emphasized on the types of protective equipment used in general or specific fire extinguishing activities. The specific requirements are applicable to the design and manufacture of the individual protection devices, which will ensure the proper appearance and the highest possible level of fire safety in the extinguishing operation, without being an obstacle for his moves during work, despite direct exposure to danger for the parts of his body.
Underwater swimmers can be amateurs without criminal intent, as well as poachers, underwater treasure hunters, or underwater saboteurs carrying out terrorist acts or gathering intelligence pose new challenges to the underwater safety of water transport in ports, coastal and offshore facilities and other sites of the critical coastal infrastructure. While the former category is usually handled with police-type techniques using non-lethal weapons, a lethal force could be used at some stages when dealing with terrorist divers. In this context, it is of theoretical and applied interest to identify the areas in which the underwater explosion leads to different types of impacts on divers. The material proposes an approach to assess the strength of the underwater blast caused by means of warning and protection from underwater swimmers, which could be used in the construction of specific protection systems for harbors, naval bases or element of the critical coastal infrastructure against unauthorized access by divers.