Automating and delegating daily tasks is a growing trend. Digital devices and the Internet of Things have boosted this development. This has transformed machine-to-machine (M2M) communication, industrial production, and control solutions as well as smart homes and consumer devices. IoT infrastructure and device networking require scalable, secure, efficient, resilient, and widely supported application layer communication protocols. It is vital to note that IoT infrastructure development prioritizes service implementation and functionality. However, IT security vulnerabilities and system reinforcement are typically neglected. Our present research focuses on a black-box vulnerability evaluation during smart street lighting system development. The goal is to raise awareness of the importance of safety-conscious growth.
Journal section: INFORMATION SECURITY
AI models are reshaping software performance testing. Machine Learning and Deep Learning algorithms automate test scenario generation, enable real-time monitoring, and predict performance issues. They facilitate dynamic load balancing, anomaly detection, testing automation, and offer performance optimization recommendations.
Small and medium-sized enterprises in the European Union are also vulnerable to ransomware attacks. There is currently no clear indicator of this proportion. The rate of ransomware attacks depends on a number of factors, such as the cybersecurity situation in a given country, the size and sector of SMEs, IT security measures and IT security awareness.
Based on our own study, the most important thing is to encourage SMEs to improve IT security, to develop policies and disaster recovery plans that define IT security measures, and to train employees, i.e. training and security awareness are key issues in detecting and avoiding various attacks. Our targeted survey of SMEs on this topic shows that in the current changing environment, SMEs need much more training and support, regardless of their specialism or sector of operation. They need meaningful and actionable training and support that will enable them to develop IT security strategies that are best suited to their business volumes..
This paper will focus on the implementation of decentralized technologies, such as blockchain, on the issuance and management of real estate properties, starting with ownership of the certificates. The focus will be the improvement of the actual process, as well as increasing integrity and trustworthiness of ownership certificates. A series of technology and methodology selections will be made, along with the main plan of setting up the decentralized networks and enabling communication with the user. We propose a framework to manage real estate property’s certificates and explain in detail the architecture of the system and each component of the system. This system will be based on Ethereum EVM, where the main execution will take place, the smart contracts will be deployed and the main dataset will be stored. IPFS will be used to store files such as photos or scanned documents and will be attached to the certificate in blockchain.
The article with the title “Information security in archival science” focuses on the need for the state archives system to be able to meet the modern needs of archival information users, individuals and legal entities. Modernization and updating of archives cannot happen without using the new technological possibilities. At the same time, a challenge of the modern society of rapidly developing and changing information technologies is to what extent can digital information be trusted? Archival institutions have the opportunity to participate in the creation of the so-called a new architecture of security, trust and reliability.
The article is divided into an introduction, presented a model of the development and implementation of blockchain technology in the National Archives of South Korea, conclusion and literature.
The main goal of this paper is to present methods and tools for secure software development. The process of creating secure software involves analysis, design and implementation based on multi criteria decision making risk assessment. The results of this study give readers some proposals how to produce secure software systems and conduct cost-benefit analysis.
Digital cryptocurrencies especially privacy-oriented cryptocurrencies over the past years have experienced significant growth in terms of usage. The increased usage of privacy-oriented cryptocurrencies due to the offered privacy and anonymity, allows a cybercriminal to commit illegal transactions that are harder to trace back than Bitcoin. In this paper, we provide a forensic overview of the privacyoriented cryptocurrencies Monero, Verge, Dash, and Zcash. We analyse forensics experiments with these cryptocurrencies and make some assumptions and conclusions related to the analysed experiments.
The use of ID-1 cards is in an extremely large increase nowadays starting from identity cards, bank cards, driving licenses, membership cards, etc. In some of the uses, the security of the card and the data that the card holds are very important. Some of the security elements are defined in the production of the card and some during the personalization of the data on the card. Laser card engraving is a high-security feature that is applied during the process of personalizing the data on the card. In this article, we will present h ow to implement the digital signature in the data personalization using laser engraving and QR barcodes to minimize the costs of cards and to ensure the data on cards are not modified.
Comparison of Methods for Vibration Detection Using Single-Mode Optical Fiber to Ensuring Information Securitypg(s) 147-149
The paper focuses on the security of fiber optic infrastructures. The main purpose of the paper is present the vibration detection system for unauthorized access to the fiber optic infrastructure detection. For this purpose, measurement of vibrations using the interferometric method and the measurement based on state of polarization changes evaluation is presented. For the measurement own designed systems were used. Both systems are theoretically described and the principles of use are explained. The measurement was performed at an experimental workplace in a laboratory at the university Based on evaluation measurement both systems are compared in term of sensitivity.
Nowadays with the advancement of technologies and the direct impact of Covid-19 on business processes, more and more services are provided to the end users electronically. This is a convenient method for both providers of these services and consumers, but this trend also leads to several vulnerabilities in the protection of computer server systems and networks, through which communication between the customer and the provider is carried out at a technological level. Impact on computer or network systems is presented.
With the evolution of the digital world and the constant interaction in the real time world, even the casual user must be constantly aware of all possible threats and all possible protection actions or at least follow the trends. The vulnerabilities’ definit ions depend on their attacking area but with the huge space of data we never know what exactly is happening and to what is the harmed area. This article is going to provide a basic definition on the term cybersecurity and some of the most common threats along with giving some real vulnerabilities with their impact for the past decade. And as each action needs the actor, at the end there are some of the most popular academies which provide qualitative education to those who want.
Giving the right access, limiting resources, and recognizing a user’s identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-time passwords. A one-time password is an automatically generated string of characters – a password that is meant to be used only once. This password is only valid for one login session or transaction. Due to its randomness and usage (only once), it leads to higher security outputs, and that is why this type of password is used in authentication algorithms. We will analyse both algorithms and their working way and will present the obtained results and their usage in practice. The main characteristic is that the HOTP algorithm uses only hash functions and the TOTP algorithm uses time above the hash. To check when each algorithm is better to use, we need to know the given environment and circumstances. In this paper, we will try to answer the question” Which one is better at a particular time?”. Depending on many factors that we analyse through the sections, we are going to make conclusions that will be useful for future planning of good security passwords.