• BIOMETRIC MULTI-FACTOR AUTHENTICATION

    pg(s) 65-68

    This paper focuses on multi-factor authentication methods. It primarily addresses biometric methods, in particular authentication through written expression. It summarises the results of many years of research activities by the authors in the field of the dynamic biometric signature1 (DBS), including new experiments. It concludes by comparing this type of signature with a signature based on cryptographic methods with a view to the current eIDAS Regulation.

  • COMPARATIVE STUDY OF VULNERABILITY SCANNING TOOLS: NESSUS vs RETINA

    pg(s) 69-71

    Detecting vulnerabilities for a network is an important procedure which ensures that all the data, network-based applications and information communicated in this network, is secure. Detection of network vulnerabilities is used to determine weaknesses of the network, the risk evaluation of attacks, the diagnosis and suggestions to solve the problems. There are several types of scanning tools used to detect vulnerabilities, offering different features. In this paper, we will present a performance comparative study between two most used free, software based, network vulnerability scanning tools: Nessus and Retina. The comparison will be based on three main features: The ability to search, Scanning Time, The ability to detect vulnerabilities. In the conclusions of this paper, both scanners performed very well in vulnerability identification. In terms of speed without active Web Application feature, Nessus performed much faster than Retina; (on the other hand, with active Web Application module, Nessus performs much slower than Retina. In terms of scan depth, Nessus has a small advantage, since it includes a web mirroring tool that is very helpful in HTTP.

  • THE MOTIVATION OF HIGH SCHOOL TEACHERS IN THE FORMATION OF THEIR OWN COMPETENCIES IN THE FIELD OF INFORMATION SECURITY

    pg(s) 21-22

    The article describes the problem of involving high school teachers in establishing the national information security by applying their own competencies in the field of information security and protection in the educational process, the demonstration of their trainees and active implementation in their own professional activities. Tasks of the personal and proprietary information protection often not resolved, which is a potential threat to the learning process, research activities of the University, and can be used cyber criminals for cyber extremist or terrorist crimes. The teaching staff motivation is a cornerstone in forming the own competencies in the field of information security process. The traditional leadership approach to formation procedure of information security in this case is insufficient, as the teacher is a leader of a new person preparation, ready to operate successfully in an information society.