Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • Measuring attitudes and preparedness to respond in a disaster situation

      pg(s) 3-6

      The behavior of citizens in disaster situation is the basis of its mastery. Due to their sudden nature, large scale and detrimental potential, critical situations require quick actions, the adequacy and correct orientation of which have a key role in the protection and preservation of human life. At that moment, the main factors that form adequate behavior are: the risk perception, including the knowledge and the understanding of the disaster; the information that is provided by the authorized bodies for the specific case and its adequacy and the personal characteristics of the people in the disaster threat. The most significant impact on all these factors has the acquired knowledge and practical skills in the field of safety and disaster protection, provided in advance and referred to the so-called “pre-impact” or preparation phase. This knowledge is focused on the nature of the disaster, the way it could affect people, the correct behavior of each person, during and after it, the evacuation routes and available shelters, first aid techniques, etc. It is directed to citizens and gives the basic information needed for successful crisis management, and not only qualitatively improves the organization of the population, reduces chaos and confusion and ensures adequate collective response and discipline, but gives opportunity for volunteering in providing additional support to the medical teams in their efforts to help people in need.

    • Management systems for nuclear security

      pg(s) 7-10

      The role of management at a nuclear facility is to perform functions such as planning, organizing, staffing, leading and directing work, controlling, monitoring and assessing work and evaluating results. Management systems are methods, processes and tools used by the managers of a nuclear facility to create a framework to carry out work in a safe and secure manner while ensuring that the objectives of the facility operator are achieved within the legal and regulatory framework of the country.

  • NATIONAL AND INTERNATIONAL SECURITY

    • Application of the requiremnts of the iso 9001 standard based on selected areas – their role and impact on the development and security of the organisation

      pg(s) 11-14

      The aim of the article is to present how an organization can achieve the appropriate level of development based on the implemented quality management system in accordance with the requirements of the ISO 9001 standard based on selected areas and what significance it has in ensuring the safety of its operation. The first chapter talks about the advantages for the organization resulting from having an implemented standard in the implementation of customer orientation. The next chapter presents the advantages of the organization resulting from building trust and credibility in the implementation of the requirements of the standard, the third chapter shows how the competences of top management influence the building of the position and development of the entire organization. This article aims to present several selected areas of application of the standard and to find the answer whether, in times of many threats and unpredictability of changes in the organization’s environment, the ISO 9001 standard is a sufficient tool allowing for the safe development of the organization.

    • Introduction in the management system at Kozloduy NPP supporting Process 8 “Training and qualification”

      pg(s) 15-17

      According to Art. 3 of the Bulgarian Safe Use of Nuclear Energy Act, nuclear energy and ionizing radiation are used in accordance with the requirements and principles of nuclear safety and radiation protection in order to ensure the protection of human life, health and living conditions of current and future generations, the environment and material values from the harmful impact of ionizing radiation. Persons responsible for facilities and activities under this Act shall establish and maintain an effective safety management system.

    • Considerations regarding aircraft maintenance system approach in Romanian air force

      pg(s) 18-21

      The Romanian Air Force increased the interoperability with the NATO partners, including the acquisition and operation of the F-16 aircraft from the Norwegian and Portuguese Air Forces, F-16s that are distributed within different Romanian airbases. In this respect, the Romanian Air Force must undertake necessary steps in the direction of gradually grow of the operational capabilities, starting from a first phase by making operational one squadron of F-16 A/B MLU (Mid Life Update) aircraft in 2017. The squadron operationalization includes the logistics services starting from the Air Force Headquarters and implemented at the ground level of the airbases assigned to receive the specific aircraft. An updated, with new efficient solutions for maintenance management system, was envisaged and destined to the safety operation and maintenance activity of the new family of aircraft.

    • Regarding Aspects of CyberSecurity and Cyber Defense in the Interaction of National Security Systems to Ensure the Functionality of the National Situation Center and the Crisis Management Center

      pg(s) 22-24

      The report analyzes the needs and requirements of the National Situation Center (NSC) and the Crisis Management Center (CMC) regarding aspects of cyber security and cyber defense. The need for the interaction of the national security systems in crisis management, in order to ensure the functionality of the NSC and the CMC, is substantiated. For this purpose, it is important to define the critical entities in the national security ecosystem and to analyze the interactions between them according to legal documents and agencies and organizational structures of the European Union and Bulgaria. This, in turn, is a prerequisite for achieving effective and timely exchange of information, which will properly support the decision-making process in crisis management. The different types of cyber threats that could affect the operation of national security systems when crises occur, such as disasters, accidents and other crises are taken into account.

    • The Use of Metaverse System And Virtual Reality In The Simulation Assesment Of Human behavior during threats inside buildings

      pg(s) 25-28

      The article The article describes a simulation experiment to assess human behavior during threats inside buildings, using Metaverse systems and virtual reality (VR). The study was carried out on a model of a real building, where avatars controlled by users simulated responses to crises. This approach has several advantages over the traditional use of NPCs (non-player characters). Usercontrolled avatars enable a more realistic representation of behavior, as participants can make decisions in real time depending on the developing situation. Unlike NPCs, whose reactions are pre-programmed and predictable, human-controlled interactions introduce an element of unpredictability and authenticity, better reflecting real human reactions. Thanks to Metaverse and VR systems, it is possible to precisely reproduce building interiors and threat scenarios, which allows for analyzing various evacuation strategies and behaviors in stressful situations. In addition, experiment participants can repeatedly participate in various simulations, which increases the scope of collected data and allows for a more comprehensive analysis. The article emphasizes that using Metaverse and VR systems for simulations with users brings significant benefits to research on security and crisis management. This approach allows for the creation of more realistic models of human behavior, which are key to improving evacuation procedures and responses to threats inside buildings. The study presents the results of research carried out based on an original solution implemented in the Metaverse environment.

  • INFORMATION SECURITY

    • IoT, Security and Privacy

      pg(s) 29-30

      Many of the devices in the IoT group process personal information or information enabling profiling or revealing the identity of natural persons. Naturally, the question of the security of this information and compliance with the legal requirements for the protection of the personal data of natural persons and their inviolability arises. The study defined the main issues related to the protection of personal data, identified threats and risks to the security and privacy of information processed by IoT devices.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    • Study of defects on details of air weapons and causes of their appearance

      pg(s) 31-33

      Vortex Gas Pistons technology has been developed and manufactured to be specifically applied in most air rifles and it uses regular air instead of any other type of gas. Manufacturer ****** offers 6 different types of Vortex Gas Pistons covering most of the Break Barrel and Underlever lines. Despite the demand for high quality materials and optimal construction, operational impacts invariably take their toll on the weapon and defects often occur due to a variety of reasons – either quality or manufacturing defects in the material and those resulting from friction between individual parts, pressure and errors in the maintenance and operation of the weapon.
      Each one of the listed impacts, as well as their combination, may be the cause of defects, which in this study are searched for on the items
      submitted for evaluation details of original and destroyed air gun piston and barrel, showing defect.

    • The role of technology and innovation in enhancing the resilience of Bulgaria’s critical infrastructure

      pg(s) 34-38

      This paper explores the pivotal role of technology and innovation in enhancing the resilience of Bulgaria’s critical infrastructure. It examines the integration of advanced technologies such as artificial intelligence, Internet of Things (IoT), blockchain, digital twins, unmanned aerial vehicles (UAVs), cyber-physical systems (CPS), and big data analytics in sectors like hazardous waste management, border security, and airport security. By analyzing case studies and current implementations, the paper highlights the successes and challenges faced in adopting these technologies. The study also discusses the importance of public-private partnerships and regulatory frameworks in fostering an environment conducive to technological innovation. The findings underscore the necessity for continuous investment in technology to safeguard critical infrastructure against emerging threats and to ensure long-term sustainability.