Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • Possible approach for developing a model of intelligent security system applicable in its design in the quasar center of competence

      pg(s) 47-50

      Through the development and operation of intelligent security systems, with a focus on critical infrastructure, it is expected to improve the security of the population in our country. This process finds real dimensions in the goals and tasks of the centers of competence, which are in the process of construction during the current period. A key element contributing to the proper functioning of intelligent security systems is its design, in accordance with the specifics of the security environment.
      Precisely the synergy of the efforts of the scientific, educational and industrial communities for the development of contemporary models of security systems, structured within the functional scope of the QUASAR competence center, is the basis of this article.

    • Machine vision – important factor for the security development in systems

      pg(s) 51-52

      Biometry provides uniqueness in all of its main modalities or combinations between them usually applied for face recognition. A few examples are fingerprints, iris, face recognition, voice, structure of blood system and etc. Nowadays, biometric analysis has much more frequent application in developing digital community. Analysis and categorizing of a given subject behavior is an actual problem with serious application in the field of security. Apart from hardware requirements, the development of smart software methods and approaches for the recognition of suspicious faces and behavior is necessary. The searching of such solutions are directed to the realization of a software system for machine vision. For achieving the goals of this work, some of the most popular technologies such as High performance computing (HPC), cloud services (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Compute  as a Service (CaaS)), neural networks (Artificial Neural Network), big data, machine learning and decision tree are studied. It must be mentioned that there is a possibility for the system to be applied with higher precision for predicting future actions.

  • NATIONAL AND INTERNATIONAL SECURITY

    • Selected aspects of the field training of the University of Defence students as a challenge for ensuring security in the future?

      pg(s) 53-56

      The article deals with the topic related to the training of the University of Defence students for the future security environment. The authors introduce their experience gained due to a specific method of training, which is aimed at a new generation of commanders-leaders. They present their results from 2016 to 2020 and the development of this course in consideration with new security challenges. The authors describe selected tools, by means of which the students achieve training goals, forms of multidisciplinary skills and the characteristics of cadets in one. The following results may initiate the discussion of the system and approach to the training of military cadets as potential workers in the field of national and international security.

  • INFORMATION SECURITY

    • Application of Digital Signatures in the Electronic System for Public Procurement in Republic of North Macedonia

      pg(s) 57-60

      The development of telecommunications and computer science has created a favorable climate regarding the increased development of electronic communication and has also led to an increase in the number of electronic documents that are being generated, stored or transmitted via computer networks. These documents are valuable but prone to manipulation by unauthorized persons that consequently leads to a need for enforced protection of the information contained in those documents from unauthorized third parties.
      Digital signatures provide required validation and verification of electronic documents and represent a series of units and zeros obtained from a particular digital signature algorithm. The article emphasizes the practical application of digital signatures in the electronic system for public procurement by introducing the manner of the electronic signing of documents depending on the application software used by users in the Republic of N. Macedonia.

    • CMS security tips and tricks

      pg(s) 61-63

      Content management systems become more popular and due to the speed provided during the development the number of websites developed with a CMS growns extremely. This is the reason the sites developed with a CMS become a more attractive target for cybercriminals. The CMSes are divided in 2 categories: free open-source and paid. According to that categorization the security level of the system is limitless. As part of my research, we are investigating only the free tools supporting the application development process and the presented tools and softwares are only from personal experience! So for the present article, we are going to present the Umbraco CMS with its integrated security tools and some other free to use tricks in order for the system we develop to be secure.

    • Approaching a DoS attack using change and risk management methods

      pg(s) 64-67

      The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    • Audio recording system for underwater monitoring with fast notification for detected sound anomaly

      pg(s) 68-71

      To enforce the Republic of Bulgaria’s “Maritime Spaces, Inland Waterways and Ports Act” and EC Decision 2010/477/EU is a need for an underwater monitoring system in the national maritime spaces. As an element of such a system, a prototype of a bottompositioned modular system has been developed at IMS-BAS, designed for reading and recording and transmission of hydro physical, hydro chemical, biological and ecological data for the marine environment, sounds from biological sources and anthropogenic noises, registration and classification of a sound anomaly, a fragment of it is overwritten wirelessly in an autonomous radio beacon, which quickly floats and transmits the information to a base station on a radio channel, and then acts as a radio marker. One of the radio buoys is connected to the central airtight body by a rope wound on a spool. Its purpose is in case of technical problems or pre-programmed to float and signal on a radio channel. After lifting the station to the surface, the recorded information is taken off and maintained.

    • World Radiocommunication Conference WRC‘19 – Impact over security of the modern human society

      pg(s) 72-74

      ITU’s World Radiocommunication Conference 2019 (WRC 19) is playing a key role in shaping the technical and regulatory framework for the provision of Radiocommunication services in all countries, in space, air, at sea and on land. It will help accelerate progress towards meeting the Sustainable Development Goals (SDGs). It is providing a solid foundation to support a variety of emerging technologies that are set to revolutionize the digital economy, including the use of artificial intelligence, big data, the Internet of Things (IoT) and cloud services. The last items are very close related to the security of the modern human society. The importance of the WRC,19 decisions is discussed in the report. Two new radio-communication principles, named Spatial Correlation Processing – Random Phase Spread Coding (SCP-RPSC), are analysed from WRC, 19 decisions point of view. They were proposed by the author a decade before as antenna transmit-receive beam forming methods with many applications in microwave frequency bands.

    • Investigation of characteristics of cylindrical piezoceramic transducers used in systems for underwater monitoring and management

      pg(s) 75-77

      The frequency characteristics of hydroacoustic cylindrical piezoceramic transducers in transmission and reception modes have been determined. The measurements were performed in pulse mode in a pool measuring 200x20x6 meters. The processed results from the measurements of the main characteristics are shown with tables and graphs.

    • Influence of the clock of the encoding pulses in hydroacoustic transmission of binary numbers

      pg(s) 78-79

      Hydroacoustic waves are used to experimentally transmit binary numbers underwater. The numbers are first encoded into pulse sequences, according to the encoding scheme: two consecutive short pulses for a digit zero and two consecutive long pulses for a digit one. A clock period determines the timing of the encoding pulses. The influence of the clock period duration on the number of correctly transmitted binary numbers is tested in 30m deep coastal seawater, at a 1500m distance. The performance is compared at three different periods of the clock: 10ms, 20ms and 40ms. Increasing the clock period of the encoding pulses leads to an increase in the number of correct transmissions. At the longest tested clock period of 40ms all the transmissions of binary numbers are successful. Certainty of correct transmission increases at the longer clock periods of the encoding pulses due to attenuated interference from reflected signals.

    • Safety of the technological process in the production and storage of explosives and ammunition

      pg(s) 80-82

      The report examines the main dangers that arise in the production and storage of explosives and ammunition. A classification of places where an explosive atmosphere may occur has been made. The obligations of the employer arising from the risks posed by the production of ammunition and pyrotechnic articles are described.