• INFORMATION SECURITY

    Information security and data protection policy in an organization

    Security & Future, Vol. 9 (2025), Issue 2, pg(s) 54-56

    In recent years, information security and data protection have become key factors in ensuring the stability, trust, and continuity of operations in any organization. With the expansion of the process of digitalization and the increasing dependance on information technologies, the need for reliable mechanisms to protect data and prevent cyber threats becomes ever more critical. Security breaches lead not only to significant financial losses but also to serious damage to an organization’s reputation and the trust of its business partners. This paper describes the processes involved in building an effectively functioning information security system and outlines the key aspects of developing an information security policy. The presentation examines the fundamental principles, approaches, and technologies that ensure the integrity, confidentiality, and availability of information. Emphasis is placed on risk analysis, vulnerability assessment, and the implementation of adequate protection measures tailored to the specific organizational structure and its resources.

  • INNOVATION POLICY AND INNOVATION MANAGEMENT

    Application of Cybersecurity Awareness Training and End-User Behavioural Protection Simulation Platforms into Higher Education

    Innovations, Vol. 13 (2025), Issue 1, pg(s) 7-9

    As cyber threats continue to grow in scale and complexity, the demand for robust cybersecurity education has become increasingly urgent. This paper examines the application of cybersecurity awareness training and end-user behavioral protection simulation platforms within higher education settings. It analyses the challenges universities face in delivering both theoretical knowledge and hands-on experience in cybersecurity and highlights the pedagogical value of integrating simulation-based tools into undergraduate and postgraduate curricula. The study also underscores the importance of collaboration between academia, industry, and government to develop strategies for cultivating cyber competencies. By leveraging interactive platforms, institutions can better prepare students to recognize, respond to, and mitigate cyber risks in real-world environments.

  • DOMINANT TECHNOLOGIES IN “INDUSTRY 4.0”

    Small-Scale Photovoltaic Power Systems: Identifying Vulnerabilities and Recommending Security Protocols

    Industry 4.0, Vol. 9 (2024), Issue 3, pg(s) 110-112

    The integration of small-scale photovoltaic power systems into residential and commercial buildings is rapidly gaining popularity. Despite the original design specification for these systems to function solely on local networks or without internet connectivity, they are often linked to installers’ or building managers’ monitoring systems. The substantial surge in demand and deployment of photovoltaic systems necessitates an examination of their susceptibility to a broad spectrum of threats, encompassing both physical and cyber-attacks. This analysis endeavours to identify the components of these systems and evaluate the associated security vulnerabilities. Additionally, it will include a practical demonstration of selected attacks on a representative system to illustrate potential threats. The analysis will culminate in a summary of recommended security protocols aimed at fortifying the security and robustness of PV systems.

  • NATIONAL AND INTERNATIONAL SECURITY

    Shortage of water resources and cyber – attack are two greatest challenges to contemporary global stability and security

    Security & Future, Vol. 7 (2023), Issue 2, pg(s) 40-43

    In response to these global threats, it is essential that nations work together to develop coordinated approaches to ensure global security. This requires building trust, sharing information, and collaborating to develop effective solutions that address the root causes of these threats. One important step in ensuring global security is to focus on the prevention of crises before they occur. This can be achieved by investing in early warning systems, improving communication and cooperation between nations, and addressing the underlying causes of conflict and instability. Another key factor in ensuring global security is to promote sustainable development that prioritizes environmental protection, social justice, and economic progress. This can help to prevent resource scarcity and social inequality, which are often key drivers of conflict and insecurity. In addition, it is important to recognize the central role of technology in shaping global security. While technology can create new threats, it can also be harnessed to develop innovative solutions that promote global security. This includes investing in cybersecurity, developing new technologies to address environmental challenges, and promoting access to education and information to help people around the world build resilience and respond effectively to emerging threats. Global security is a complex and multifaceted issue that requires a coordinated and collaborative approach from nations around the world. By working together to prevent crises, promote sustainable development, and harness the power of technology, we can build a more secure and resilient world for generations to come.

  • INFORMATION SECURITY

    Vulnerability Analysis in Server Systems

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 141-146

    Nowadays with the advancement of technologies and the direct impact of Covid-19 on business processes, more and more services are provided to the end users electronically. This is a convenient method for both providers of these services and consumers, but this trend also leads to several vulnerabilities in the protection of computer server systems and networks, through which communication between the customer and the provider is carried out at a technological level. Impact on computer or network systems is presented.

  • INFORMATION SECURITY

    Cybersecurity trends

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 137-140

    With the evolution of the digital world and the constant interaction in the real time world, even the casual user must be constantly aware of all possible threats and all possible protection actions or at least follow the trends. The vulnerabilities’ definit ions depend on their attacking area but with the huge space of data we never know what exactly is happening and to what is the harmed area. This article is going to provide a basic definition on the term cybersecurity and some of the most common threats along with giving some real vulnerabilities with their impact for the past decade. And as each action needs the actor, at the end there are some of the most popular academies which provide qualitative education to those who want.

  • SOCIETY & ”INDUSTRY 4.0”

    A cybersecurity risk assessment

    Industry 4.0, Vol. 6 (2021), Issue 1, pg(s) 37-40

    The main purpose of this paper is to offer a data-driven approach to assess cyber risk and to ensure appropriate confidentiality, integrity, and availability. A study presents the decision hierarchical model of cyber security risk assessment based on AHP methodology and describes a quantitative measure for evaluating and ranking security incidents. It can be used to conduct cost-benefit analysis, design and optimize cybersecurity in the systems.

  • INFORMATION SECURITY

    Malware in Social Engineering

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 98-102

    Internet connectivity became obligatory for the business processes in each organisation and institution. Communication over the public network infrastructure like Internet brings potential threat for the means of social engineering email letters. Recognition of such letters seems to be a problem to workers. Some malware analysis of such example scam letters is made in this research paper. Impact on computer or network systems is presented.

  • INFORMATION SECURITY

    ON THE CONTEMPORARY CYBERSECURITY THREATS

    Security & Future, Vol. 1 (2017), Issue 3, pg(s) 111-113

    Cybersecurity is one of the most commented areas in IT nowadays. Plenty of network and application attacks are possessed worldwide. Security becomes serious issue for corporations and governmental computer networks as functionality of applications rises in technological aspect. Most affective and widely used network attacks and application vulnerabilities are commented in this reviewing paper. Primary solutions for network security are proposed.