Limitation and Regulation of Access to Information to Achieve Information Security in the Interaction of National Security Systems in Crisis Situations Related to Cyber Security and Cyber Defence

    Industry 4.0, Vol. 9 (2024), Issue 1, pg(s) 39-41

    Achieving information security in the organization is related to the implementation of certain standard security procedures. The set of methods and tools for information security and communication and information systems (CIS) are the tools for implementing these procedures. The subject of the research is the subsystem for limiting and regulating access to information and communication and information systems, which is necessary for the analysis and simulation modelling of the interaction of national security systems in crisis situations related to cybersecurity and cyber defence.


    Information security in archival science

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 75-77

    The article with the title “Information security in archival science” focuses on the need for the state archives system to be able to meet the modern needs of archival information users, individuals and legal entities. Modernization and updating of archives cannot happen without using the new technological possibilities. At the same time, a challenge of the modern society of rapidly developing and changing information technologies is to what extent can digital information be trusted? Archival institutions have the opportunity to participate in the creation of the so-called a new architecture of security, trust and reliability.
    The article is divided into an introduction, presented a model of the development and implementation of blockchain technology in the National Archives of South Korea, conclusion and literature.


    Possible approaches to ensure security of information for nuclear facilities

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 68-71

    Sensitive information is information, in whatever form, including software, the unauthorized disclosure, modification, alteration, destruction, or denial of use of which could compromise nuclear security. Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities or processes. Information security not only includes ensuring the confidentiality of information, but also includes ensuring the accuracy and completeness of the information (its integrity) and the accessibility or usability of the information on demand (its availability).


    Decentralization of the Internet of Things in Industry 4.0

    Industry 4.0, Vol. 7 (2022), Issue 3, pg(s) 90-92

    Rapid progress in the field of industrialization and informatization methods has led to huge progress in the development of nextgeneration production technologies. The Internet of Things (IoT) is a pervasive technology, and now it is used in all areas of everyday life, from healthcare to technological production. The new industrial revolution began with connected technologies supported by the Internet of Things. However, the security of the Internet of Things is still an open question since in case of unauthorized access, data from sensors can be changed, for example, by a user with authorized access rights, which can lead to unforeseen consequences.


    Aequor Tracer: Traffic Analyzer for GPON Networks

    Industry 4.0, Vol. 6 (2021), Issue 6, pg(s) 215-217

    For many years, passive optical networks (PONs) have received a considerable amount of attraction regarding their potential for providing broadband connectivity for every user: from the customer’s point of view. However, Internet services providers (ISPs) must rely on producers of technologies to secure data. This article proposes additional opportunities to ensure data protection. PONs use their encapsulation method in optical domain transmissions. That is why it is necessary to solve security questions before optical line termination (OLT). When data are forwarded from the optical to the electrical domain, it is possible to evaluate time with dedicated hardware for optical networks. Own developed system can provide the following features: location of Internet protocol (IP) address, anomaly detection in traffic, ransomware detection based on similar behavior during data transmission, testing of defined address, usage of maps with defin ed IP ranges, providing all information on independent hardware via web page.


    Analysis of changes in the probability of an incident with information security

    Security & Future, Vol. 5 (2021), Issue 1, pg(s) 24-27

    Risk assessments are not a one-off action, but there are no formal guidelines on when and how often a risk assessment should be performed. Changing factors affect the risk assessment parameters. The strongest influence of these changes is the probability of an accident. Examining changes in the likelihood of an accident will allow for more accurate planning of periods for checking ri sk factors and assessing risk. In this way, the assessed risk will reflect the changes that have taken place and will lead to more adequate risk management. The analysis of the influence of the changing risk factors is made with the help of a model, which is built on the basis of one asset and the accident scenarios determined for it. The model examines the characteristics of changes in the risk factors for the asset. Th e probability distribution for the random number of changes is determined. The results of the amended conditions are also random. They are expressed in a change in the level of probability of an accident. For these random variables, the main probabilistic characteristics are d etermined and dependencies are derived that can be used for analysis.


    Data security model in cloud computing

    Industry 4.0, Vol. 5 (2020), Issue 2, pg(s) 55-58

    In the last decade, cloud computing has become an extremely important business assistant that offers significantly lower costs than traditional computer-aided resource provision and greater adaptability to business changes. Thus, it helps them to achieve their business goals. The development of cloud computing poses significant risks, which serve as a partial barrier to their use by the businesses. Security and protection of information are considered to be one of the most critical points in the use of cloud computing. Compared to traditional solutions, cloud computing moves application software and databases to large data centers where information and service management are not always secure and reliable. As a result of this, the community and businesses have many concerns and questions about the security of data and applications in cloud infrastructures. In addition, concerns about data security and applications also arise due to the fact that both user data and applications are managed by the cloud provider. Clouds typically use a standardized data and application security architecture, while the demand for consumer and business services is steadily growing and becoming more diverse and with more sophisticated software design that leads to continuous upgrades to data security models in cloud computing. Due to the different methods of implementation in cloud computing service delivery models, the demand for a reasonable level of data protection is of utmost importance. The purpose of this publication is to propose a new information security model, which offers a solution for improving the use of sensitive data by introducing a three-factor authentication – an improvement of preventive control.

  • Infrared optical sensors in building automation

    Industry 4.0, Vol. 3 (2018), Issue 6, pg(s) 305-307

    Speaking about Industry 4.0 we can’t help mentioning the role of optical sensors in building automation, especially in smart factories and automation of SCADA system. Building smart factories in concept of Industry 4.0 requires intelligent sensors and seems relevant. The paper considers management system of distributed factory and information security of it if there are used optical sensors.



    Security & Future, Vol. 1 (2017), Issue 1, pg(s) 21-22

    The article describes the problem of involving high school teachers in establishing the national information security by applying their own competencies in the field of information security and protection in the educational process, the demonstration of their trainees and active implementation in their own professional activities. Tasks of the personal and proprietary information protection often not resolved, which is a potential threat to the learning process, research activities of the University, and can be used cyber criminals for cyber extremist or terrorist crimes. The teaching staff motivation is a cornerstone in forming the own competencies in the field of information security process. The traditional leadership approach to formation procedure of information security in this case is insufficient, as the teacher is a leader of a new person preparation, ready to operate successfully in an information society.