• Artificial intelligence and data security

    pg(s) 88-90

    New technological capabilities are becoming an increasingly important part of our daily lives. If we want to be sustainable and competitive, we as a society must take advantage of them. The huge volume of data cannot be used effectively without the implementation of artificial intelligence algorithms. And to be effective and useful, data must be protected and secure.

  • Possibilities for using steganography methods in the quantum century

    pg(s) 86-87

    Security of confidential information has always been an important issue. The aim of this work is to present and discuss the main themes at a new level in steganography methods nowadays. This review paper introduces a comprehensive survey related to nowadays embedding techniques. Steganography is often used with cryptography so that the information is doubly protected, but the combination of these techniques ensures that even if the steganographic method is discovered, the encrypted data remains secure and unreadable without the proper decryption key. This dual-layered approach significantly enhances the overall security of the hidden information.

  • Analysis of internet of things security breaches

    pg(s) 82-85

    The report analyzes the nature of the Internet of Things (IoT), presents a basic architectural model of IoT, and categorizes IoT according to various criteria. The most famous IoT security breaches are presented. The vulnerabilities that led to the security breaches and the scale and consequences of the impact of the breach are analyzed. Overview and analysis of IoT security breaches are the subject of this research. The main threats and vulnerabilities are systematize and the response of the world community is tracked

  • Comparison between Monolithic and Microservices Architecture in Web Applications Built with Java

    pg(s) 61-64

    In today’s times, people demand fast, stable, and reliable applications. Therefore, it is essential to choose the right software architecture before implementing functionalities adopted in the project. The monolithic architecture is implemented as a single unit, integrating all functionalities within a single codebase. In contrast, the microservice architecture decomposes the application into several independent services, each responsible for a specific business logic. Key factors such as scalability, fault tolerance, and data consistency are analyzed. Performance metrics, simplicity, flexibility, and the challenges of implementing and maintaining each architecture are gathered and compared. This study offers valuable insights into the practical implications of choosing between monolithic and microservice architectures, especially in the context of applications. It serves as a comprehensive guide for software developers to make informed decisions when designing scalable and reliable systems.

  • Automated Web Application Scanning with Wapiti, Selenium, and SQLMap

    pg(s) 57-60

    The security of web applications has become a crucial aspect in protecting users’ data and personal information. The potential for vulnerabilities in web applications to result in data theft, loss of trust in service providers, and significant financial loss underscores the significance of robust automated web application scans. This research paper examines the use of tools such as Wapiti, Selenium, and SQLMap for automated web application testing. The primary objective is to assess the efficacy of automated scanning for a specific web application and to establish a benchmark for evaluating the results. The scope of the analysis encompasses the various security aspects covered by these tools and assesses their effectiveness and accuracy in detecting vulnerabilities.

  • IoT, Security and Privacy

    pg(s) 29-30

    Many of the devices in the IoT group process personal information or information enabling profiling or revealing the identity of natural persons. Naturally, the question of the security of this information and compliance with the legal requirements for the protection of the personal data of natural persons and their inviolability arises. The study defined the main issues related to the protection of personal data, identified threats and risks to the security and privacy of information processed by IoT devices.

  • IoT related security issues and black-box testing experiences in a smart lighting system

    pg(s) 61-64

    Automating and delegating daily tasks is a growing trend. Digital devices and the Internet of Things have boosted this development. This has transformed machine-to-machine (M2M) communication, industrial production, and control solutions as well as smart homes and consumer devices. IoT infrastructure and device networking require scalable, secure, efficient, resilient, and widely supported application layer communication protocols. It is vital to note that IoT infrastructure development prioritizes service implementation and functionality. However, IT security vulnerabilities and system reinforcement are typically neglected. Our present research focuses on a black-box vulnerability evaluation during smart street lighting system development. The goal is to raise awareness of the importance of safety-conscious growth.

  • IT security awareness among SMEs

    pg(s) 53-56

    Small and medium-sized enterprises in the European Union are also vulnerable to ransomware attacks. There is currently no clear indicator of this proportion. The rate of ransomware attacks depends on a number of factors, such as the cybersecurity situation in a given country, the size and sector of SMEs, IT security measures and IT security awareness.
    Based on our own study, the most important thing is to encourage SMEs to improve IT security, to develop policies and disaster recovery plans that define IT security measures, and to train employees, i.e. training and security awareness are key issues in detecting and avoiding various attacks. Our targeted survey of SMEs on this topic shows that in the current changing environment, SMEs need much more training and support, regardless of their specialism or sector of operation. They need meaningful and actionable training and support that will enable them to develop IT security strategies that are best suited to their business volumes..

  • Blockchain based solution for securing real property transaction: a case study for North Macedonia

    pg(s) 78-81

    This paper will focus on the implementation of decentralized technologies, such as blockchain, on the issuance and management of real estate properties, starting with ownership of the certificates. The focus will be the improvement of the actual process, as well as increasing integrity and trustworthiness of ownership certificates. A series of technology and methodology selections will be made, along with the main plan of setting up the decentralized networks and enabling communication with the user. We propose a framework to manage real estate property’s certificates and explain in detail the architecture of the system and each component of the system. This system will be based on Ethereum EVM, where the main execution will take place, the smart contracts will be deployed and the main dataset will be stored. IPFS will be used to store files such as photos or scanned documents and will be attached to the certificate in blockchain.

  • Information security in archival science

    pg(s) 75-77

    The article with the title “Information security in archival science” focuses on the need for the state archives system to be able to meet the modern needs of archival information users, individuals and legal entities. Modernization and updating of archives cannot happen without using the new technological possibilities. At the same time, a challenge of the modern society of rapidly developing and changing information technologies is to what extent can digital information be trusted? Archival institutions have the opportunity to participate in the creation of the so-called a new architecture of security, trust and reliability.
    The article is divided into an introduction, presented a model of the development and implementation of blockchain technology in the National Archives of South Korea, conclusion and literature.