Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • Critical infrastructure resilience through security systems development

      pg(s) 41-44

      Critical infrastructure can be exposed to disruptive events and incidents caused by external or internal impacts. Some of these events are internally system-manageable, but others must be addressed through the additional application of appropriate security measures, which can be implemented through security systems.
      The development of critical infrastructure security systems requires a careful definition of overall requirements, which in general is directly related to ensuring business continuity by determining the resilience of critical infrastructure elements. This publication presents in a systematized form the author’s experience in applying resilience assessment results as inputs to the development of CI security systems.

  • NATIONAL AND INTERNATIONAL SECURITY

    • The effect of central bank digital currencies on asset confiscation

      pg(s) 45-48

      The purpose of the article is to assess the ramifications of the introduction of retail Central Bank Digital Currencies (CBDC) in the field of asset recovery. Through systemic legal analysis, it strives to foresee benefits and challenges. The piece argues that since retail CBDC customer accounts are with the central banks, there is a potential for improved efficiency in asset freezing, seizing and confiscation, including international cooperation, as central banks may act as turnkey operators in the process. Further, there are identifiable benefits in the disposal phase. Possible programmable features and privacy considerations are among the challenges, along with the sheer volume of information that needs processing in asset tracing. The value of this article lies in the assessment of the effect of fundamental changes associated with the introduction of retail CBDC in the field of asset recovery.

    • Demographic change as a risk for the pension system and the stability of the security forces – experience from the Czech Republic

      pg(s) 49-52

      At the end of 2022, the population of the Czech Republic reached 10,827,529, the highest ending population since the end of the Second World War. Although the migration wave from Ukraine, which included mainly children and women of working age, has slightly slowed the aging of the population, according to the Czech Statistical Office, the Economic Dependency Index has steadily increased between 2013 and 2022, from 57 to 72 non-productive age persons per 100 working-age persons. The sustainability of the financing of oldage pensions under the social security system is fundamentally conditioned by the demographic evolution of the population. The aging of society, which is a virtually universal phenomenon in the EU Member States, is, on the one hand, a manifestation of the desired rising standard of living, but at the same time, it creates pressure to find additional resources for the financial security of citizens in old age. The long-term imbalance of the pension system is a source of political demand for its adjustment, whether comprehensive or sub-parametric. Long-service allowances are an important financial instrument to increase the motivation of those interested in employment in the security forces. Thus, a possible reduction of its importance within the pension system, e.g. by relativizing the valorisation mechanism, may represent not only a threat to social reconciliation but also an indirect security risk for the state, consisting in a reduced demand for work in the police, firefighters and other professions. The paper aims to determine whether the general attitudes of the Czech public towards the pension system in the Czech Republic presented by the STEM agency correspond to the attitudes of full-time and distance learning students at the Police Academy of the Czech Republic in Prague, to identify any differences and to evaluate the possibilities of future long-term reduction of demographic risk for the pension system and for ensuring the stability of human resource capacity for the security forces.

    • IIoT and cyber security in industrial enterprises

      pg(s) 53-56

      Digital transformation and sustainable development are key concepts that are actively developing in modern business and society. They go hand in hand, creating opportunities to improve efficiency, reduce the negative impact on the environment and increase people’s quality of life. The Industrial Internet of Things is a powerful tool for connecting industrial devices, sensors, and equipment to a network to improve monitoring, analysis, and process automation. With the increasing digitization of business in recent years, cyber-attacks are also on the rise. To protect against such actions, organizations need cybersecurity technology solutions, as well as reliable tools to detect, prevent, and respond to cybersecurity breaches. This publication presents an exploration of the combination and interconnectedness of IIoT and cybersecurity in industrial enterprises, which are necessary to keep these systems secure and protected from cyber threats. A conceptual framework for multi-layered cyberattack defense designed for industrial enterprises is proposed.

  • INFORMATION SECURITY

    • Automated Web Application Scanning with Wapiti, Selenium, and SQLMap

      pg(s) 57-60

      The security of web applications has become a crucial aspect in protecting users’ data and personal information. The potential for vulnerabilities in web applications to result in data theft, loss of trust in service providers, and significant financial loss underscores the significance of robust automated web application scans. This research paper examines the use of tools such as Wapiti, Selenium, and SQLMap for automated web application testing. The primary objective is to assess the efficacy of automated scanning for a specific web application and to establish a benchmark for evaluating the results. The scope of the analysis encompasses the various security aspects covered by these tools and assesses their effectiveness and accuracy in detecting vulnerabilities.

    • Comparison between Monolithic and Microservices Architecture in Web Applications Built with Java

      pg(s) 61-64

      In today’s times, people demand fast, stable, and reliable applications. Therefore, it is essential to choose the right software architecture before implementing functionalities adopted in the project. The monolithic architecture is implemented as a single unit, integrating all functionalities within a single codebase. In contrast, the microservice architecture decomposes the application into several independent services, each responsible for a specific business logic. Key factors such as scalability, fault tolerance, and data consistency are analyzed. Performance metrics, simplicity, flexibility, and the challenges of implementing and maintaining each architecture are gathered and compared. This study offers valuable insights into the practical implications of choosing between monolithic and microservice architectures, especially in the context of applications. It serves as a comprehensive guide for software developers to make informed decisions when designing scalable and reliable systems.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    • Experimental determination of fire resistance of steel elements (X-brace) protected with intumescent paint

      pg(s) 67-70

      The report presents and analyses data from tests of steel elements with different cross sections (massivity factor) protected with three different coating thicknesses. The obtained results are presented in graphics. Comparisons between the different protections in terms of fire resistance are made. The tests are part of a large-scale study of the behaviour of the same steel sections with applied reactive protection – intumescent paint (this report) and passive protection – plasterboard and rock wool.

    • Remote detection, recognition and tracking of objects in drones aircraft

      pg(s) 71-72

      A review and analysis of methods for the detection and recognition of unmanned aerial vehicles (UAVs) has been carried out. UAV detection channels were considered – acoustic, optical, radar, infrared, radio reconnaissance channel. The advantages and disadvantages of the channels used are compared and evaluated. In the case of small UAVs, there are a number of significant difficulties and limitations. One of the directions in UAV detection is acoustic observations. The noise created by the UAV’s power plant and propeller is an important unmasking feature. The creation and improvement of methods for the detection, direction-finding and recognition of small UAVs by receiving and processing their sound signals is an urgent task. In the implementation of this method of detection of UAVs are used frequency spectra, spectrograms, normalized autocorrelation functions and phase portraits of acoustic signals. Information features of the UAV sound image can be estimates of spectral coefficients determined from a discrete implementation containing a given number of samples, as well as parameters of autoregressive models.