Table of Contents


    • Possible integrity framework between the Intelligent Security Systems parameters and the Business Continuity Management processes

      pg(s) 42-45

      At its core, business continuity management (BCM) is a process that identifies potential threats to an organization and the impacts on business operations that they could cause if they happen. This process provides a framework for building resilience of the organization and the ability to respond effectively. BCM can help organizations to reduce the negative effects and to protect business reputation under adverse circumstances, whether internal or external, to reduce downtime and recovery costs.
      Like continuity, sustainability focuses on maintaining the processes and procedures that help businesses survive unexpected threats. Recognizing that businesses operate in an environment of constant change, sustainability focuses on how best to preserve the value in these complex environments.
      But effective BCM process can happen through synergy of administrative and organizational activities (strategies and plans) and operation of flexible, intelligent security systems (ISS). The innovative solutions for the development of the systems are closely related to the requirements formulated in the separate stages of the process of building the BCM of the organization, incl. sustainabili ty, providing warning and prevention of the threats, prevention of terrorist acts and thus ensuring the safety of people and the competitive advantage of business. Understanding the value of connecting different security systems and how they can be integrated is a key component in
      developing more intelligent security.
      The link between risk management and BCM plays a significant role here. Risk management strategies (risk avoidance, risk acceptance or risk mitigation – by risk sharing or risk transfer) are responses to a “preliminary event” of perceived and assessed risks. Most BCM strategies and tactics focus on the processes that must occur after an event or disaster. The goals of these processes are to return the business to normal operation as efficiently and effectively as possible. Namely the relationship between the process of building BCM and ISS development is the subject of this publication


    • Contemporary Low Slow and Small (LSS) threat from the air defence view

      pg(s) 46-48

      This article analyzes the air defense relevance of LSS-type threats. Summaries possible attack scenarios. The air defences have to face new types of challenges in addition to the traditional threat like so-called the LSS (Low Slow and Small) threat by micro, mini drones (including so-called COTS drones) and small UAS systems. The properly heterogeneous sensor and intervention systems need to be integrated if we are to create effective air defences against LSS-type threats. The layered air defence have to can integrate almost all effectors with their sensors and other sensor systems into flexible and effective C2 system.

    • Practical approaches for collecting intelligence information

      pg(s) 49-50

      The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The  main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.

    • Examples of nuclear security measures for nuclear facilities

      pg(s) 51-54

      The lifetime of a nuclear facility extends from the earliest planning stages through to its decommissioning. It is important to consider nuclear security early in the design of new facilities and during partial redesigns or modifications, as it can result in nuclear security for these facilities that is more efficient, more effective and better integrated with other safety, safeguards, operational and other measures. Nuclear security measures are also important during commissioning and operation, they should not cease at decommissioning, as they are important in addressing the protection of the remaining quantities of nuclear material or other radioactive ma terial, which has accumulated during the operations stage.

    • Emotional intelligance in small unit’s leadership

      pg(s) 55-57

      Emotional Intelligence is a concept that dates back to the last decade of the 20th century when it started gaining momentum. Today its theories and practices are widely accepted and are applied by thousands of managers across the World. If we assume that business managers and military leaders and commanders often have similar problems in their field of work concerning subordinates then we need to look into the possibility of military leaders applying Emotional Intelligence as their civilian counterparts do

    • Tactical efficiency in the process of handling and usage of firearms – important security related precondition for carrying out the police duty

      pg(s) 58-60

      The police, during the performance of its duties, bears a huge responsibility before the general public, in relation to the professional performance of their duties, without causing disturbance of the general security and violating the basic human rights and freedoms. Forming the public opinion on the quality of police services is directly related to the manner in which legal powers are exercised, and in particular, the part related to the use of means of coercion. Firearms as the most extreme form of coercion are of great importance for the police work, because its use can cause serious injury or death, so it should be used only when there are absolutely no other options to solve the conflict between the police and the citizens. Given the different circumstances and conditions under which firearms are used, the police officers have a tremendous responsibility to anticipate, understand and apply all legal, security and tactical procedures and rules for the reasonable use of firearms.That is the main reason why the focus on this paper is on the tactical and security related procedures, which include a number of activities related to the process of preparation and taking up arms, the process of immediate use of weapons and the final process of disarmament


    • Steganographic algorithm using the different color components of a 24-bit image

      pg(s) 61-63

      The article deals with the steganography system which hides text inside images without losing data in components of RGB model The secret message is hidden in the cover image using Least Significant Bit (LSB) algorithm. The comparative results for the proposed algorithm are very promising for blue components of image. To evaluate steganography system properties are used the measures like Signalto- Noise Ratio (SNR), Peak Signal-to-Noise Ratio (PRSN), Mean Squared Error (MSE) and Structural Similarity Index for measuring (SSIM). The aim of the study is to determine whether there is a change in the qualitative characteristics of the stego image, when it is hidden the same information, but in a different color channel, to determine which color channel shows the most invisibility to others and is it advisable to be used in the transmission of confidential information.