Distributed optical fiber acoustic sensing system for perimeter security

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 150-152

    Distributed fiber optic sensing is known for the few last decades. One of the most interesting area in security field is Distributed Acoustic Sensing (DAS). Nowadays, DAS systems have deployments in many different areas like pipeline monitoring, seismic activity monitoring, or perimeter security monitoring. They can use existing optic fiber networks and create a distributed sensor from this fiber which can monitor areas all acoustic events along the fiber. This paper deals with the evaluation mea surement with a commercial DAS system used for perimeter security. The system was evaluated on university optical fiber test polygon and three different events were classified–man jumping, man walking and car driving along the fiber route. Based on the measurement and another post-processing also the speed of movement can be determined.


    Comparison of Methods for Vibration Detection Using Single-Mode Optical Fiber to Ensuring Information Security

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 147-149

    The paper focuses on the security of fiber optic infrastructures. The main purpose of the paper is present the vibration detection system for unauthorized access to the fiber optic infrastructure detection. For this purpose, measurement of vibrations using the interferometric method and the measurement based on state of polarization changes evaluation is presented. For the measurement own designed systems were used. Both systems are theoretically described and the principles of use are explained. The measurement was performed at an experimental workplace in a laboratory at the university Based on evaluation measurement both systems are compared in term of sensitivity.


    A Comparative Analysis of HOTP and TOTP Authentication Algorithms. Which one to choose?

    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 131-136

    Giving the right access, limiting resources, and recognizing a user’s identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-time passwords. A one-time password is an automatically generated string of characters – a password that is meant to be used only once. This password is only valid for one login session or transaction. Due to its randomness and usage (only once), it leads to higher security outputs, and that is why this type of password is used in authentication algorithms. We will analyse both algorithms and their working way and will present the obtained results and their usage in practice. The main characteristic is that the HOTP algorithm uses only hash functions and the TOTP algorithm uses time above the hash. To check when each algorithm is better to use, we need to know the given environment and circumstances. In this paper, we will try to answer the question” Which one is better at a particular time?”. Depending on many factors that we analyse through the sections, we are going to make conclusions that will be useful for future planning of good security passwords.


    Practical approaches for collecting intelligence information

    Security & Future, Vol. 5 (2021), Issue 2, pg(s) 49-50

    The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The  main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.


    Development of sensing technical textiles with fbg sensory elements for security fields

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 123-124

    Fiber optic sensors are increasingly widespread and used sensors in many areas of industry and defence. Sensors using fiber Bragg gratings are very accurate sensors of strain and temperature. In this paper we deal with the selection of suitable materials and structures for the implementation of optical fibers with fiber Bragg gratings. The whole process has several key stages – evaluating of adhesives on textile samples, selection of a suitable textile thickness, and design of a multilayer structure of a textile block. The resulting textile block was developed and its basic functional parameters were verified.


    Web application with Python and security of the information system

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 103-106

    The aim of the research is to develop a database management system for collecting, processing, storing and using information for the teaching of PhD students at a university using the high-level Python language.
    Studied and researched in the process of development are the main characteristics of the most widely used database management systems. The practical aspects of the design, creation and use of databases were analysed. Has been formulated the requirements to the functional capabilities of the developed database. For the development of the web-application was used Python programming language. The database model, the user interface and a set of reports were developed. A physical data model, oriented towards the design and the development of a database management system using the Python programming language was proposed. The main risks and threats to the security of information in the web-application are characterized. Guidelines for infrastructure protection are proposed.


    Correlations between organized crime and terrorismi

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 83-85

    The activities of terrorist organizations in the international arena provide benefits of access to global financial flows, various criminal markets, offshore financial centers and banks that guarantee fast large cashless transactions, with guarantees of business and banking secrets. This often requires connecting with criminal organizations that specialize in financial and cybercrime, which is why terrorists are often associated with organized crime. The link between organized crime and terrorism is usually functional, when organized crime is put into function (financing and arming) of terrorism. At the same time, the connection can be instrumental, when terrorist groups are involved in organized crime, and vice versa – when criminal groups undertake terrorist activities. Precisely, the focus of the work will be on determining these correlations and their security implications, which we must take into account when creating effective strategies for combating organized crime and terrorism.


    Approaching a DoS attack using change and risk management methods

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 64-67

    The Information Technology security threats are emerging with each day passing by. The implementation of the technology into every field of society brings changes. Finding a way to manage these changes would be a success, and, by doing so, it would mitigate the risks they bring. Data transmission nowadays is unsecure like never before. Challenging is the way that should be found to cope with these kinds of evolutionary changes. Among the top threats in networks lies the DoS attack. It has been a long time since this kind of attack is around, but that doesn’t reduce the fact that this type of attacks is still dangerous and devastating. In order to cope with this kind of attack, we need to know how to manage risks and changes during a DoS attack. Because of this, it is very important that defensive mechanisms are implemented and integrated so that unauthorized access would be prevented from accessing your network or data. This refers to individuals and everyone else working in companies that are working in the field of IT, because at some point, we all share the same thing-devices (mobile phones, personal computers, devices at work, etc.). The base of the IT foundation is knowing how to protect yourself and your data. Due to this, we need to work hard and exploit every possible threat and attack from the inside out. Not only to reduce or mitigate the already occurred impact, but also to prevent these types of failures from happening in the future.


    CMS security tips and tricks

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 61-63

    Content management systems become more popular and due to the speed provided during the development the number of websites developed with a CMS growns extremely. This is the reason the sites developed with a CMS become a more attractive target for cybercriminals. The CMSes are divided in 2 categories: free open-source and paid. According to that categorization the security level of the system is limitless. As part of my research, we are investigating only the free tools supporting the application development process and the presented tools and softwares are only from personal experience! So for the present article, we are going to present the Umbraco CMS with its integrated security tools and some other free to use tricks in order for the system we develop to be secure.


    Selected aspects of the field training of the University of Defence students as a challenge for ensuring security in the future?

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 53-56

    The article deals with the topic related to the training of the University of Defence students for the future security environment. The authors introduce their experience gained due to a specific method of training, which is aimed at a new generation of commanders-leaders. They present their results from 2016 to 2020 and the development of this course in consideration with new security challenges. The authors describe selected tools, by means of which the students achieve training goals, forms of multidisciplinary skills and the characteristics of cadets in one. The following results may initiate the discussion of the system and approach to the training of military cadets as potential workers in the field of national and international security.


    Machine vision – important factor for the security development in systems

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 51-52

    Biometry provides uniqueness in all of its main modalities or combinations between them usually applied for face recognition. A few examples are fingerprints, iris, face recognition, voice, structure of blood system and etc. Nowadays, biometric analysis has much more frequent application in developing digital community. Analysis and categorizing of a given subject behavior is an actual problem with serious application in the field of security. Apart from hardware requirements, the development of smart software methods and approaches for the recognition of suspicious faces and behavior is necessary. The searching of such solutions are directed to the realization of a software system for machine vision. For achieving the goals of this work, some of the most popular technologies such as High performance computing (HPC), cloud services (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Compute  as a Service (CaaS)), neural networks (Artificial Neural Network), big data, machine learning and decision tree are studied. It must be mentioned that there is a possibility for the system to be applied with higher precision for predicting future actions.


    Certain issues to minimize the human factor impact in transportation security

    Trans Motauto World, Vol. 5 (2020), Issue 3, pg(s) 98-100

    Aviation security as a topical area of scientific research is marked contrast to other application tasks of security sector. The specific nature aims at dealing with research objects that differ in considerable uncertainty of identification and description. In such a case, the requirements for aviation security systems are constantly becoming more complex, and the methodology of scientific research on security issues lags far behind the common trend of civil aviation development.
    In the last few years, the trend to improve aviation security management systems in transportation industry has become a transition from classical schemes of regulatory management to schemes of computer-assisted management using procedures with the challenge of reducing the human factor. In fact, the human factor is not the only criterion for management in such systems. We can identify a number of factors that reduce the effectiveness of security management in the current system, and their impact is not fully investigated. A system analysis of these factors shows that each of them is not only related to the human factor, but the parameters of these factors’ influence on the management efficiency are largely determined by the human component. In this case, the human factor becomes the main criterion for optimal aviation security management. There is a problem of minimizing the negative impact of the human factor on aviation security management procedures. The authors of this work offer and study an original approach to solving this problem.