• A variant of the risk profile of a business model in the development of intelligent security systems

    pg(s) 7-10

    Business models (BMs) are business plans used by an organization to create, deliver, and acquire value. There is a strong need in different areas of business to develop a better understanding of BM’s risks. The appropriate risk framework would support the full range of risk management capabilities, namely identifying key risks, quantifying and, finally, managing those risks.
    Therefore, in developing the organization’s BM, it is necessary to create a better understanding of the risks associated with the development of security systems. The proposal for a variant of the BM risk profile framework for the establishment of security systems is the content of this publication.

  • Flexible business models applied to products and systems in the field of security systems with different Technologiy Readiness Levels

    pg(s) 3-6

    The growing importance of business models (BM) is primarily due to significant changes in competitive conditions for business over the past two decades. The creation of BM in the development of security systems is a structured approach that is consistent with the characteristics of security objects.
    At the same time, in the international aspect, in the field of intelligent security systems, the practice of systematic application of different levels of the Technology Readiness Levels (TRL) scale is required, which allows security systems technology to develop from concept to research, development and implementation. Iterations between different levels of TRL are possible, especially during the development phase.
    Namely the study of the flexible application of BM in the development of security systems and their connection with the TRL i s the purpose of
    this paper.

  • Possible approach for standard operating procedures development for intelligent security systems functioning

    pg(s) 81-84

    Standard Operating Procedures are a common guide to the organization’s activities. Their development and use are an integral part of a successful management system of an organization, as it provides staff with information on the proper per formance of a job and facilitates consistency in achieving the desired end result.
    Standard Operating Procedures describe the exact steps needed to perform the organization’s security tasks and are important both for maintaining the level of competence of the staff performing a particular job and for training new employees. To reduce errors within organisation in terms of security-related activities and the mission-critical processes is the basis of this paper.

  • Multi-Domain Operations – A New Approach in Warfare?

    pg(s) 78-80

    In this paper, the author studies the so-called Multi-Domain Operations, which is a relatively new term in military science. The study focuses on the origin, definition and elements of multi-domain operations. Since the terminology is developing – or at least changing – quite fast from multi-domain battle across multi-domain operations to all-domain operations besides terms like cross-domain operations/effects, this emerging process need to be studied. The paper examines if this term describes a new approach of warfare or it is an old concept in a new guise.

  • Possible integrity framework between the Intelligent Security Systems parameters and the Business Continuity Management processes

    pg(s) 42-45

    At its core, business continuity management (BCM) is a process that identifies potential threats to an organization and the impacts on business operations that they could cause if they happen. This process provides a framework for building resilience of the organization and the ability to respond effectively. BCM can help organizations to reduce the negative effects and to protect business reputation under adverse circumstances, whether internal or external, to reduce downtime and recovery costs.
    Like continuity, sustainability focuses on maintaining the processes and procedures that help businesses survive unexpected threats. Recognizing that businesses operate in an environment of constant change, sustainability focuses on how best to preserve the value in these complex environments.
    But effective BCM process can happen through synergy of administrative and organizational activities (strategies and plans) and operation of flexible, intelligent security systems (ISS). The innovative solutions for the development of the systems are closely related to the requirements formulated in the separate stages of the process of building the BCM of the organization, incl. sustainabili ty, providing warning and prevention of the threats, prevention of terrorist acts and thus ensuring the safety of people and the competitive advantage of business. Understanding the value of connecting different security systems and how they can be integrated is a key component in
    developing more intelligent security.
    The link between risk management and BCM plays a significant role here. Risk management strategies (risk avoidance, risk acceptance or risk mitigation – by risk sharing or risk transfer) are responses to a “preliminary event” of perceived and assessed risks. Most BCM strategies and tactics focus on the processes that must occur after an event or disaster. The goals of these processes are to return the business to normal operation as efficiently and effectively as possible. Namely the relationship between the process of building BCM and ISS development is the subject of this publication

  • Developing the opportunities for building nuclear security

    pg(s) 7-10

    The potential for criminal or intentional unauthorized acts involving or directed at nuclear or other radioactive material or their associated facilities and associated activities is an ongoing global concern. Because of their widespread use, nuclear and other radioactive materials are vulnerable to sabotage, or to being stolen, lost or acquired illegally by individuals or groups that may use th em for malicious purposes. The objective of a nuclear security regime is to prevent, detect and respond to nuclear security events, and to protect persons, property, society and the environment from harmful consequences associated with nuclear and other radioactive materials.

  • Some standardized peculiarity in defining the processes / stages providing input data for Intelligent Security Systems development – peripheral security systems

    pg(s) 3-6

    The creation of an intelligent security environment is one of the main trends in the coming years, as security technologies will be a significant part of the developed systems, incl. physical protection and system integration systems will play a key role in d ata collection to ensure critical infrastructure (CI) security. Organizations equipped with intelligent security systems provide increased operational efficiency by using system integration for data collection and allow systems to “communicate” and work in tandem to provide real-time information for emergency preparedness or execution.
    In addition, data collected from advanced security technologies can be analyzed by system integrators to help senior CI management better understand how their organization works and make improvements based on the information gathered. Understanding the value of connecting different physical security systems, incl. and CI peripheral security systems, as well as ways to integrate them with other systems, is a key component in developing a smarter and more secure facility. Whether applying new CI solutions or upgrading compatibility solutions, system integration offers a variety of cost options that meet the specific needs of the business environment.
    Last but not least, threat information is used to determine the security regime of the CI as a basis for developing common requirements and performance targets, as well as criteria for assessing the conformity or effectiveness of physical protection systems. Modern standardized approaches have been developed, summarizing the good international practices, for determining the goals and / or requirements for physical protection, in accordance with the specifics of CI and for preventing any level of potential impact both in the sites and for the population in the neighboring territories. The development of requirements for peripheral security systems as an element of intelligent CI security systems and their integration in the CI as early as possible is the subject of this publication.

  • System for minimizing the negative impact of personnel on the airport’s aviation security procedures

    pg(s) 86-90

    The problem of civil aviation safety is largely determined by the “human factor”. Transport security is a multidimensional concept that includes various security factors that are provided by aviation personnel in the relevant areas of professional activity. A particularly important factor should be considered the activities of personnel in the field of airport security. An acceptable level of airport aviation security can be achieved if the level of professional activity of the security personnel meets the established requirements. The system of requirements is implemented in a set of algorithms and procedures for personnel activities, the implementation of which is mandatory in
    strict accordance with the requirements. However, the physical nature of the human component, under the strictest control, does not guarantee absolute compliance with the requirements, i.e. the professional activity of aviation personnel is not guaranteed against accidental or unintentional errors. These errors are a source of negative impact of personnel on the airport’s aviation security. In this case, it is necessary to have the means to minimize the negative impact. The paper considers some software and technical means of minimization

  • Correlations between organized crime and terrorismi

    pg(s) 83-85

    The activities of terrorist organizations in the international arena provide benefits of access to global financial flows, various criminal markets, offshore financial centers and banks that guarantee fast large cashless transactions, with guarantees of business and banking secrets. This often requires connecting with criminal organizations that specialize in financial and cybercrime, which is why terrorists are often associated with organized crime. The link between organized crime and terrorism is usually functional, when organized crime is put into function (financing and arming) of terrorism. At the same time, the connection can be instrumental, when terrorist groups are involved in organized crime, and vice versa – when criminal groups undertake terrorist activities. Precisely, the focus of the work will be on determining these correlations and their security implications, which we must take into account when creating effective strategies for combating organized crime and terrorism.

  • Machine vision – important factor for the security development in systems

    pg(s) 51-52

    Biometry provides uniqueness in all of its main modalities or combinations between them usually applied for face recognition. A few examples are fingerprints, iris, face recognition, voice, structure of blood system and etc. Nowadays, biometric analysis has much more frequent application in developing digital community. Analysis and categorizing of a given subject behavior is an actual problem with serious application in the field of security. Apart from hardware requirements, the development of smart software methods and approaches for the recognition of suspicious faces and behavior is necessary. The searching of such solutions are directed to the realization of a software system for machine vision. For achieving the goals of this work, some of the most popular technologies such as High performance computing (HPC), cloud services (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Compute  as a Service (CaaS)), neural networks (Artificial Neural Network), big data, machine learning and decision tree are studied. It must be mentioned that there is a possibility for the system to be applied with higher precision for predicting future actions.

  • Possible approach for developing a model of intelligent security system applicable in its design in the quasar center of competence

    pg(s) 47-50

    Through the development and operation of intelligent security systems, with a focus on critical infrastructure, it is expected to improve the security of the population in our country. This process finds real dimensions in the goals and tasks of the centers of competence, which are in the process of construction during the current period. A key element contributing to the proper functioning of intelligent security systems is its design, in accordance with the specifics of the security environment.
    Precisely the synergy of the efforts of the scientific, educational and industrial communities for the development of contemporary models of security systems, structured within the functional scope of the QUASAR competence center, is the basis of this article.