Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • MECHANISMS FOR ENSURING THE REGION’S TECHNOLOGICAL SECURITY STRATEGY

      pg(s) 123-127

      One of the key concepts that expresses essential processes in techno-economic development is the technological way of production. The concept has been forming for a long time. The economic opportunities of the regions are differentiated due to the presence of different geographical, historical, demographic and other factors. The article identifies the author’s concept of “technological security of the region” and the main reason for the state’s technological security. The main provisions for the development of the concept of technological security strategy of the region are proposed. It is determined that the region’s technological security strategy is a long-term plan of action aimed at ensuring the technological interests of the region, finding and creating appropriate reserves to prevent, avoid and eliminate the risks, threats and threats to the development of the region. The mechanism of implementation of the technological security strategy of the region includes state regulators and market institutions, as well as their influence on the processes taking place in the innovation and technological sphere. It is proved that the main purpose of the mechanism of implementation of the technological security strategy of the region is to create conditions with ensuring a high level of technological security and with observance of social, labor and environmental standards for the population of the region. The priority tasks of scientific and technological support for the solution of technological security problems in the region is the innovative policy of both the state and the regions, on the development and application of high technologies, protection of intellectual property rights, creation of human resources of science and knowledge bases subject to state protection. The strategic directions of state regulation of the development of economic and technological potential of the region for ensuring its technological security have been determined.

    • ASSESSMENT OF NEUROTECHNOLOGIES: THE QUEST FOR SOCIAL AND PERSONAL SECURITY

      pg(s) 132-135

      Neurotechnologies are devices that by integrated technical (neurostimulation, neuromodulation, and neuroimaging) means change activity of the human brain. There are many different types of neurotechnologies, such as neural-control interfaces, brain-machine interfaces, direct neural interfaces, auditory brainstem implants, retinal implants, predictive brain implants, deep brain stimulators, transcranial stimulators. These devices can in various degrease monitor, coordinate and alternate brain activity and therefore neurotechnologies could fundamentally change the future of relationship between humans and technology. The article proposes new conceptual ramifications of neurotechnological devices, examines history of neurotechnological devices and points to possible threats and dangers of neurotechnologies for social and personal security.

    • RISK PERCEPTION BY STUDENTS: CASE OF FACULTY OF SECURITY ENGINEERING, UNIVERSTIY OF ZILINA

      pg(s) 136-139

      The perception, awareness and understanding of risk by the population are important factors for the society safety, which contribute to increasing the preparedness of the population for the effects of crisis events, whether natural, industrial, economic, social, or in enterprise. The article focuses on the analysis of the need for education of students in the area of risk management and crisis management. The research groups were only students, not the population in general. The results were achieved by analysing the current state of education at the Faculty of Security Engineering – University of Žilina and a partial statistical evaluation of the questionnaire survey among students of this faculty. The results indicate that the risk perception of students is relatively low and the need for education in this field is justified.

  • NATIONAL AND INTERNATIONAL SECURITY

    • ORGANIZED CRIME ACTIVITIES ON THE ILLEGAL MARKET AND SECURITY IMPLICATION

      pg(s) 140-143

      This work is inspired by the current problems of confronting organized crime, which in part controls illegal markets. Thus, it is also aimed at highlighting the most significant aspects of the research into illegal markets, whose knowledge enables the creation of effective strategic preferences in the fight against organized crime, whose actions have a number of negative implications for state security. Modern criminal organizations are profitable and market-oriented, and the methods of acting used are combined with the criminal and method of the operation of contemporary business organizations. The knowledge of the organization’s specifics and functioning of illegal markets enables the proper selection of methods to more efficiently counter the destructive actions of criminal organizations that control the illegal market. In fact, the destructive action of criminal organizations reflects directly on the state of security by increasing the level of corruption, the level of money laundering and the infiltration of organized crime into legal economic flows, the spread of illegal markets and the increase of the crime rate, but also the ability to generate criminal profits, increasing the economic power of criminal structures that is recursively used for influence on government holders.

    • SYSTEMIC APPROACH TO THE DEVELOPMENT OF SECURITY SYSTEMS FOR CRITICAL INFRASTRUCTURE PROTECTION AS A RESEARCH METHODOLOGY APPLIED AT THE CENTER OF COMPETENCE QUASAR

      pg(s) 144-147

      Ensuring the security of the population is one of the fundamental policies of the European Union. Various approaches are being implemented in this area, one of which is the creation of critical infrastructure security – national and European. In this regard, trough the development and operation of intelligent security systems, with a focus on critical infrastructure, is expected to improve the security of the population in EU Member States. Precisely the synergy of efforts of the scientific and industrial communities in our country for performance of specific models of security systems through the establishment and operation of centres of competence is at the core of this paper.

    • HUMAN SECURITY AND CROSS-BORDER COOPERATION

      pg(s) 148-151

      Cross-border cooperation (CBC) is a unique and effective instrument of European Union that has the potential to influence on human security in a positive way. This paper analyses the role of CBC between Bulgaria and Greece in the context of human security. The analysis is focused on the Right to Life, and especially, on the right to health and social welfare. The comparative analysis represents CBC results and benefits from two programming periods: 2007-2013 and 2014-2020. The expected outcomes of cross-border projects (by 2023) are also being explored, outlining the main trends and prospects for developing the cross-border partnership.

    • ELECTRONIC ADMINISTRATION OF UNMANNED AVIATION WITH PUBLIC KEY INFRASTRUCTURE (PKI)

      pg(s) 152-155

      As Unmanned Aircraft Systems (UAS) are converging an Internet of Things-like infrastructure, always connected to the internet, cryptographic security becomes a primary concern to ensure confidential, but even more importantly tamper-proof transport of data. Another emerging problem is the high number of unregistered drone flights, with no regard towards airspace regulations. The wellestablished and standardized processes of Public Key Infrastructure (PKI) can be utilized for electronic identification of drones and associating them to the owner, while providing encryption and integrity protection of data. Nowadays various companies provide PKI for drones. This material summarizes the trends, challenges, possibilities of hardware-based on-board secure storage of secrets and describes a possible solution for government-level electronic administration of drones and owners.

    • AN ATTEMPT TO SUMMARIZE THE PSYCHOLOGICAL PORTRAIT OF PERPETRATORS OF ORGANIZED CRIME

      pg(s) 158-160

      The summary psychological portrait of organized crime perpetrators includes a synthesized characteristic of their motivation, attitudes and values. It presents the specifics of their self-esteem, mental states and personal defences. The report analyses empirical data of organized crime individuals obtained through the Dark Triad questionnaire.
      The overall psychological portrait of organized crime perpetrators is oriented towards supporting the operative-investigative, investigativejudicial and penitentiary activities with them.

    • DEFINING THE STRATEGIC CENTER OF GRAVITY OF HEZBOLLAH

      pg(s) 161-162

      This article is about the strategic center of gravity of Hezbollah; Hezbollah is one of the toughest, and persistent semi-state actors. The author claims that Hezbollah’s state-sponsorship by the Islamic Republic of Iran is its strategic center of gravity (CoG). For identification, this paper starts with the definition of the CoG; lists the main possible CoGs ,and then determining the closest one to be the strategic CoG.

  • INFORMATION SECURITY

    • CROSS-SITE SCRIPTING ATTACKS AND THE SECURITY OF WEB APPLICATIONS

      pg(s) 163-166

      This report focuses on vulnerabilities on web-applications and web-sites from Cross-Site Scripting attacks (XSS). The different types of XSS attacks are examined: DOM-based, active and passive attacks. The spread of XSS attacks across platforms – government and financial institutions, transportation companies, hospitality and entertainment has been analyzed. Research and analysis of the security of corporate websites and their resistance to XSS attacks have been carried out. The basic guidelines for preventing valuable data theft and unauthorized access to websites and applications from XSS attacks are reviewed and systematized.

    • CODE CONTRACTS VS INPUT VALIDATION

      pg(s) 167-169

      The unstoppable growth of security flaws makes the developers more patient in integrating different security defenses in the application development! Most of the security breaches are due to uninformed or unqualified developers! The good part is that Internet provides a large amount of rules/documentations/guidelines/tools free for use to help the developers in their work! But as the coin has two sides each web application needs to provide two parts of security flaws protection. The first level of defense is the well known protection from the outside world, called user input validation! And the second side is to ensure that the application works without a problem! Which means to protect it from inside out by integrating what is called code contracts! Even thought those two types of protection have similar purposes there is a difference which we are going to present in the research!

    • ON THE POWER TO DETECT ERRORS OF ONE ERROR-DETECTING CODE

      pg(s) 170-173

      When messages are transmitted through the communication channel, due to the noises in the channel, they can be incorrectly transmitted. Therefore, the receiver must ensure that it has the correct message. Similarly, the data stored in the storage media due to different circumstances can be corrupted. In order to check whether the data is corrupted or to check whether the receiver received the correct message, so-called error-detecting codes are used. When using such a code, it is important to know the power of the code to detect errors. In this paper we will analyze the ability to detect errors of one such error-detecting code. We compare the error-detecting capabilities of the code in a case when a quasigroup of order 4, order 8 and order 16 is used for coding for three different lengths of the redundancy. At the end we made a conclusion about the best choice of parameters from the aspect of the ability of the code to surely detect errors.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    • SECURITY OF THE B-MSS – THE NEW CHALLENGE FOR THE SATELLITE SYSTEM DESIGNERS

      pg(s) 174-177

      The Broadband Mobile Satellite Services (B-MSS) are extremely important not only for government (army and police), but for  many civil applications as car, aero, railway and ship communications. Probably they will be part of the future 5-G network development and their security work is very important too. The solving of the main B-MSS security problems needs entirely new approach. The aim of this paper is to analyze two new radio-communication principles, named Spatial Correlation Processing – Random Phase Spread Coding, from security point of view. They were proposed by the author a decade before as antenna transmit-receive beam forming methods with many applications in microwave frequency bands too.

    • OPTIMIZATION OF THE DESIGN OF FRAGMENTATION WARHEADS FORMING AN AXIAL FLOW OF PREFORMED FRAGMENTS

      pg(s) 178-181

      Constructive variants of warheads forming an axial flow of propagation of preformed elements have been designed. Tests have been carried out on experimental units with varying thickness of wall and shape of the barrier between the preformed elements and the bursting charge. Obtained results show the formation of a high-speed axial flow of a large amount of striking elements of one and the same type having sufficient kinetic energy to hit the targets. Thus, by changing the wall thickness and the barrier shape, it is possible to increase the effectiveness of the fragmentation action by 35-40 % and to provide coverage of a larger area of damage.

    • MODIFIED PETRURGICAL MATERIALS BASED ON SEDIMENTARY ROCKS USED FOR BALLISTIC PURPOSES

      pg(s) 182-184

      Bulgaria has a variety of deposits (mainly in northeastern Bulgaria) of sedimentary rocks (marls) suitable for the development of compounding formulations and technology for the production of stone products. On the basis of some of these sedimentary rocks (marls), experimental technologies for innovative formulations with modifiers for usable petrurgical materials are developed and tested. The first prototypes of ballistic protection products are obtained, with physic-mechanical properties better than those when only natural sedimentary rock is used, and lighter and cheaper than in the case of corundum and silicon carbide.
      The properties of these materials allow for certain alternative applications such as the ballistic protection of ground-based mobile and stationary objects. They also make possible the production of quality articles with protective properties against high-speed kinetic effects, but at significantly lower cost than when traditional materials are used.