Using blockchain technology for ID management: a case study for Albania

    Industry 4.0, Vol. 7 (2022), Issue 6, pg(s) 213-218

    In this paper we have presented a framework, which proposes to adopt blockchain technology for ID card management in Albania, to increase the security and privacy of personal data. The way how the actual ID cards in Albanian tend to offer security is by using a microprocessor, encrypting the data in the card. However, the centralized data management systems have single points of failure that leave the system vulnerable to attack and operational risks such as: (1) inside hacking, where unauthorized changes of personal information may happen from the inside system; (2) fake digital identities creation or (3) sale of personal identity‟s data to third interested parties. An answer to address the above-mentioned drawbacks is a decentralized identity management system, which calls for a user-centered strategy and returns complete identification control to the individual. Blockchain technology has the potential to revolutionize modern civilizations and their applications. Administrative processes, security, privacy, integrity and confidentiality are some actions that could have an impact. Furthermore, we present an analysis of previous work on blockchain-based identity management and provide a proposal use case applicable in Albania compared to actual implementation.


    Principle of Operation and Advantages of a Sensor for Fog Contamination Detection

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 84-86

    During out work in a project related to European security, we have created various devices. One of them is a sensor for control of contaminations in the composition of fogs, which is first of its kind in the world. The development of such a sensor is important because in this project, artificially generated fogs with special additives are used for decontamination, and it is crucial to control the quantity of impurities in these fogs. In this work, different aspects of the operation of this sensor, its advantages and design considerations are discussed.


    Technological development: Thermal vision as a phenomenon

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 82-83

    The article deals with technological development, especially with thermal imaging. The authors are convinced, that this technology can progressively and qualitative influence operations of security forces and crisis response teams. The article is divided into 3 main parts, where first chapter generally describes thermal imaging, second chapter deals with current applications and last chapter sets the perspectives for future.


    Distributed optical fiber acoustic sensing system for perimeter security

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 150-152

    Distributed fiber optic sensing is known for the few last decades. One of the most interesting area in security field is Distributed Acoustic Sensing (DAS). Nowadays, DAS systems have deployments in many different areas like pipeline monitoring, seismic activity monitoring, or perimeter security monitoring. They can use existing optic fiber networks and create a distributed sensor from this fiber which can monitor areas all acoustic events along the fiber. This paper deals with the evaluation mea surement with a commercial DAS system used for perimeter security. The system was evaluated on university optical fiber test polygon and three different events were classified–man jumping, man walking and car driving along the fiber route. Based on the measurement and another post-processing also the speed of movement can be determined.


    Comparison of Methods for Vibration Detection Using Single-Mode Optical Fiber to Ensuring Information Security

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 147-149

    The paper focuses on the security of fiber optic infrastructures. The main purpose of the paper is present the vibration detection system for unauthorized access to the fiber optic infrastructure detection. For this purpose, measurement of vibrations using the interferometric method and the measurement based on state of polarization changes evaluation is presented. For the measurement own designed systems were used. Both systems are theoretically described and the principles of use are explained. The measurement was performed at an experimental workplace in a laboratory at the university Based on evaluation measurement both systems are compared in term of sensitivity.


    A Comparative Analysis of HOTP and TOTP Authentication Algorithms. Which one to choose?

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 131-136

    Giving the right access, limiting resources, and recognizing a user’s identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-time passwords. A one-time password is an automatically generated string of characters – a password that is meant to be used only once. This password is only valid for one login session or transaction. Due to its randomness and usage (only once), it leads to higher security outputs, and that is why this type of password is used in authentication algorithms. We will analyse both algorithms and their working way and will present the obtained results and their usage in practice. The main characteristic is that the HOTP algorithm uses only hash functions and the TOTP algorithm uses time above the hash. To check when each algorithm is better to use, we need to know the given environment and circumstances. In this paper, we will try to answer the question” Which one is better at a particular time?”. Depending on many factors that we analyse through the sections, we are going to make conclusions that will be useful for future planning of good security passwords.


    Practical approaches for collecting intelligence information

    Security & Future, Vol. 5 (2021), Issue 2, pg(s) 49-50

    The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The  main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.


    Development of sensing technical textiles with fbg sensory elements for security fields

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 123-124

    Fiber optic sensors are increasingly widespread and used sensors in many areas of industry and defence. Sensors using fiber Bragg gratings are very accurate sensors of strain and temperature. In this paper we deal with the selection of suitable materials and structures for the implementation of optical fibers with fiber Bragg gratings. The whole process has several key stages – evaluating of adhesives on textile samples, selection of a suitable textile thickness, and design of a multilayer structure of a textile block. The resulting textile block was developed and its basic functional parameters were verified.


    Web application with Python and security of the information system

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 103-106

    The aim of the research is to develop a database management system for collecting, processing, storing and using information for the teaching of PhD students at a university using the high-level Python language.
    Studied and researched in the process of development are the main characteristics of the most widely used database management systems. The practical aspects of the design, creation and use of databases were analysed. Has been formulated the requirements to the functional capabilities of the developed database. For the development of the web-application was used Python programming language. The database model, the user interface and a set of reports were developed. A physical data model, oriented towards the design and the development of a database management system using the Python programming language was proposed. The main risks and threats to the security of information in the web-application are characterized. Guidelines for infrastructure protection are proposed.


    Correlations between organized crime and terrorismi

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 83-85

    The activities of terrorist organizations in the international arena provide benefits of access to global financial flows, various criminal markets, offshore financial centers and banks that guarantee fast large cashless transactions, with guarantees of business and banking secrets. This often requires connecting with criminal organizations that specialize in financial and cybercrime, which is why terrorists are often associated with organized crime. The link between organized crime and terrorism is usually functional, when organized crime is put into function (financing and arming) of terrorism. At the same time, the connection can be instrumental, when terrorist groups are involved in organized crime, and vice versa – when criminal groups undertake terrorist activities. Precisely, the focus of the work will be on determining these correlations and their security implications, which we must take into account when creating effective strategies for combating organized crime and terrorism.


    Approaching a DoS attack using change and risk management methods

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 64-67

    The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.


    CMS security tips and tricks

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 61-63

    Content management systems become more popular and due to the speed provided during the development the number of websites developed with a CMS growns extremely. This is the reason the sites developed with a CMS become a more attractive target for cybercriminals. The CMSes are divided in 2 categories: free open-source and paid. According to that categorization the security level of the system is limitless. As part of my research, we are investigating only the free tools supporting the application development process and the presented tools and softwares are only from personal experience! So for the present article, we are going to present the Umbraco CMS with its integrated security tools and some other free to use tricks in order for the system we develop to be secure.