Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cybernetyczny" wg kryterium: Wszystkie pola


Wyświetlanie 1-2 z 2
Tytuł:
Information security management in the global world of the 21st century
Autorzy:
Maśloch, Piotr
Górny, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1917555.pdf
Data publikacji:
2020
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
management
global economy
information security
cyber-attack
globalization
zarządzanie
gospodarka globalna
bezpieczeństwo informacji
atak cybernetyczny
globalizacja
Opis:
Purpose: The article attempts to determine what contemporary globalization is and what opportunities and threats this process creates (in terms of global threats to enterprise information systems). Design/methodology/approach: The management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. In this sense, this article will analyse the threats resulting from the dynamic development of information technology, based on the results of research conducted on a sample of Polish enterprises. Findings: This publication is an attempt to identify the basic threats resulting from the fact that the organization operates in a digitized global reality. Research limitations/implications: It seems that the threats mentioned in the article will be gaining momentum and will be evaluated in the unpredictable today direction. Social implications: The 21st century brought a completely new look at the processes of globalization and management of a modern enterprise. It turns out that information has become the basic tool of competitive struggle in the global market. For this reason, the management of information security and counteracting cyber-attacks is an important aspect of the functioning of enterprises in the 21st century. Originality/value: The article addresses current problems of cyberspace security in the context of globalization. It can be useful for company managers as well as for conducting research in this field.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2020, 145; 321-331
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods
Autorzy:
Di Giandomenico, Felicita
Masetti, Giulio
Chiaradonna, Silvano
Powiązania:
https://bibliotekanauki.pl/articles/2172130.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
intrusion tolerance
cyberattack
diversity based redundancy
protection mechanisms
tolerancja na włamania
atak cybernetyczny
mechanizm ochronny
Opis:
Borrowing from well known fault tolerant approaches based on redundancy to mask the effect of faults, redundancy-based intrusion tolerance schemes are proposed in this paper, where redundancy of ICT components is exploited as a first defense line against a subset of compromised components within the redundant set, due to cyberattacks. Features to enhance defense and tolerance capabilities are first discussed, covering diversity-based redundancy, confusion techniques, protection mechanisms, locality policies and rejuvenation phases. Then, a set of intrusion tolerance variations of classical fault tolerant schemes (including N Version Programming and Recovery Block, as well as a few hybrid approaches) is proposed, by enriching each original scheme with one or more of the previously introduced defense mechanisms. As a practical support to the system designer in making an appropriate choice among the available solutions, for each developed scheme a schematic summary is provided, in terms of resources and defense facilities needed to tolerate f value failures and k omission failures, as well as observations regarding time requirements. To provide an example of more detailed analysis, useful to set up an appropriate intrusion tolerance configuration, a trade-off study between cost and additional redundancy employed for confusion purposes is also carried out.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 4; 701--719
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies