Practical approaches for collecting intelligence information

    Security & Future, Vol. 5 (2021), Issue 2, pg(s) 49-50

    The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The  main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.


    Development of sensing technical textiles with fbg sensory elements for security fields

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 123-124

    Fiber optic sensors are increasingly widespread and used sensors in many areas of industry and defence. Sensors using fiber Bragg gratings are very accurate sensors of strain and temperature. In this paper we deal with the selection of suitable materials and structures for the implementation of optical fibers with fiber Bragg gratings. The whole process has several key stages – evaluating of adhesives on textile samples, selection of a suitable textile thickness, and design of a multilayer structure of a textile block. The resulting textile block was developed and its basic functional parameters were verified.


    Web application with Python and security of the information system

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 103-106

    The aim of the research is to develop a database management system for collecting, processing, storing and using information for the teaching of PhD students at a university using the high-level Python language.
    Studied and researched in the process of development are the main characteristics of the most widely used database management systems. The practical aspects of the design, creation and use of databases were analysed. Has been formulated the requirements to the functional capabilities of the developed database. For the development of the web-application was used Python programming language. The database model, the user interface and a set of reports were developed. A physical data model, oriented towards the design and the development of a database management system using the Python programming language was proposed. The main risks and threats to the security of information in the web-application are characterized. Guidelines for infrastructure protection are proposed.


    Correlations between organized crime and terrorismi

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 83-85

    The activities of terrorist organizations in the international arena provide benefits of access to global financial flows, various criminal markets, offshore financial centers and banks that guarantee fast large cashless transactions, with guarantees of business and banking secrets. This often requires connecting with criminal organizations that specialize in financial and cybercrime, which is why terrorists are often associated with organized crime. The link between organized crime and terrorism is usually functional, when organized crime is put into function (financing and arming) of terrorism. At the same time, the connection can be instrumental, when terrorist groups are involved in organized crime, and vice versa – when criminal groups undertake terrorist activities. Precisely, the focus of the work will be on determining these correlations and their security implications, which we must take into account when creating effective strategies for combating organized crime and terrorism.


    Approaching a DoS attack using change and risk management methods

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 64-67

    The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.


    CMS security tips and tricks

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 61-63

    Content management systems become more popular and due to the speed provided during the development the number of websites developed with a CMS growns extremely. This is the reason the sites developed with a CMS become a more attractive target for cybercriminals. The CMSes are divided in 2 categories: free open-source and paid. According to that categorization the security level of the system is limitless. As part of my research, we are investigating only the free tools supporting the application development process and the presented tools and softwares are only from personal experience! So for the present article, we are going to present the Umbraco CMS with its integrated security tools and some other free to use tricks in order for the system we develop to be secure.


    Selected aspects of the field training of the University of Defence students as a challenge for ensuring security in the future?

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 53-56

    The article deals with the topic related to the training of the University of Defence students for the future security environment. The authors introduce their experience gained due to a specific method of training, which is aimed at a new generation of commanders-leaders. They present their results from 2016 to 2020 and the development of this course in consideration with new security challenges. The authors describe selected tools, by means of which the students achieve training goals, forms of multidisciplinary skills and the characteristics of cadets in one. The following results may initiate the discussion of the system and approach to the training of military cadets as potential workers in the field of national and international security.


    Machine vision – important factor for the security development in systems

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 51-52

    Biometry provides uniqueness in all of its main modalities or combinations between them usually applied for face recognition. A few examples are fingerprints, iris, face recognition, voice, structure of blood system and etc. Nowadays, biometric analysis has much more frequent application in developing digital community. Analysis and categorizing of a given subject behavior is an actual problem with serious application in the field of security. Apart from hardware requirements, the development of smart software methods and approaches for the recognition of suspicious faces and behavior is necessary. The searching of such solutions are directed to the realization of a software system for machine vision. For achieving the goals of this work, some of the most popular technologies such as High performance computing (HPC), cloud services (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Compute  as a Service (CaaS)), neural networks (Artificial Neural Network), big data, machine learning and decision tree are studied. It must be mentioned that there is a possibility for the system to be applied with higher precision for predicting future actions.


    Certain issues to minimize the human factor impact in transportation security

    Trans Motauto World, Vol. 5 (2020), Issue 3, pg(s) 98-100

    Aviation security as a topical area of scientific research is marked contrast to other application tasks of security sector. The specific nature aims at dealing with research objects that differ in considerable uncertainty of identification and description. In such a case, the requirements for aviation security systems are constantly becoming more complex, and the methodology of scientific research on security issues lags far behind the common trend of civil aviation development.
    In the last few years, the trend to improve aviation security management systems in transportation industry has become a transition from classical schemes of regulatory management to schemes of computer-assisted management using procedures with the challenge of reducing the human factor. In fact, the human factor is not the only criterion for management in such systems. We can identify a number of factors that reduce the effectiveness of security management in the current system, and their impact is not fully investigated. A system analysis of these factors shows that each of them is not only related to the human factor, but the parameters of these factors’ influence on the management efficiency are largely determined by the human component. In this case, the human factor becomes the main criterion for optimal aviation security management. There is a problem of minimizing the negative impact of the human factor on aviation security management procedures. The authors of this work offer and study an original approach to solving this problem.


    Options of Healthcare Facilities Protection Against Terrorist Attacks in the Czech Republic

    Security & Future, Vol. 4 (2020), Issue 1, pg(s) 20-22

    Medical facilities are distinctive types of premises accessible by a wide range of visitors seven days a week. They are places characterized by a high concentration of civilians and low-level security against the occurrence of various types of emergencies. Undoubtedly, terrorism is one of them. From a security point of view, hospitals are soft terrorist targets. Given the topicality of terrorism, we must address the question whether sufficient security is ensured for medical facilities. The aim of this paper is to point out the key role of security management in the overall management of hospitals. It will also outline some shortcomings in technical and operational security applications for their premises. The paper further discusses the effectiveness of crisis plans and emergency management exercises, as those are the primary conditions of successful emergency management.


    Building personal virtual private networks in public cloud platforms

    Industry 4.0, Vol. 5 (2020), Issue 3, pg(s) 112-113

    Virtual Private Networks (VPN) enable usage of the public Internet infrastructure to build se-cure and reliable connections providing functionally of private corporate IT networks. Back in 90s VPN were created to mainly allow access to corporate resources for employees who work remotely and/or travel. Today, VPN can be used to gain access to geographically isolated and highly protected Internet resources like websites, interactive platforms and more. Such VPN are good for protecting Internet users’ privacy and enhance their security especially when using public free Wi-Fi networks. Indeed, now VPN are used more and more and gain popularity for exactly those reasons – provide almost universal access and protect privacy of millions Internet users. This paper reviews building blocks and procedure to build our own VPN. This way power users are in full control of their privacy and security when using public Internet infrastructure while also gain access to otherwise restricted online resources.



    Security & Future, Vol. 3 (2019), Issue 4, pg(s) 174-177

    The Broadband Mobile Satellite Services (B-MSS) are extremely important not only for government (army and police), but for  many civil applications as car, aero, railway and ship communications. Probably they will be part of the future 5-G network development and their security work is very important too. The solving of the main B-MSS security problems needs entirely new approach. The aim of this paper is to analyze two new radio-communication principles, named Spatial Correlation Processing – Random Phase Spread Coding, from security point of view. They were proposed by the author a decade before as antenna transmit-receive beam forming methods with many applications in microwave frequency bands too.