Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security model" wg kryterium: Temat


Tytuł:
Security Assessment Methodology for Isolated Systems of a Certain Class
Autorzy:
Wiechecki, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/226348.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cybersecurity
security assessment methodology
security model
Graham-Denning model
Bell-LaPadula model
Clark-Wilson model
Opis:
This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 499-505
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Model of User Access Control to Virtual Machines Based on RT-Family Trust Management Language with Temporal Validity Constraints - Practical Application
Autorzy:
Lasota, K.
Kozakiewicz, A.
Powiązania:
https://bibliotekanauki.pl/articles/309357.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
RT-family languages
security model
user access control
virtualization environment
Opis:
The paper presents an application of an RT-family trust management language as a basis for an access control model. The discussion concerns a secure workstation running multiple virtual machines used to process sensitive information from multiple security domains, providing strict separation of the domains. The users may act in several different roles, with different access rights. The inference mechanisms of the language are used to translate credentials allowing users to access different functional domains, and assigning virtual machines to these domains into clear rules, regulating the rights of a particular user to a particular machine, taking into account different periods of validity of different credentials. The paper also describes a prototype implementation of the model.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 13-21
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Delicated to the crisis management solution Communication Security Monitoring and Control Centre
Rozwiązanie Communication Security Monitoring and Control Centre przeznaczone do zarządzania kryzysowego
Autorzy:
Ros, S.
López, O.
Uriarte, M.
Powiązania:
https://bibliotekanauki.pl/articles/298357.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Warmińsko-Mazurski w Olsztynie
Tematy:
infrastruktura komunikacyjna
ocena ryzyka
mechanizm bezpieczeństwa
model bezpieczeństwa
świadomość sytuacyjna
sterowanie
communication infrastructure
risk assessment
Security Mechanisms
security model
awareness
control
Opis:
An emergency situation often occurs as a result of unpredictable events, and as a consequence, existing communications may either get collapsed or congested. The aim of the Communication Security Monitoring and Control Centre (CSMCC) solution proposed in SECRICOM is to provide a suitable security framework that enables the development of security service. These services give response to individuals and institutions operating in heterogeneous communication infrastructures, when responding to major incidents. In the light of this objective, a Security Model has been designed facilitating the measurement of operators' and end customers' confidence in the security of the communication infrastructure, and addressing security challenges in terms of a distributed and heterogeneous solution. The proposed Security Model has been supported by the Security Middleware Service and Framework, which is responsible for measuring, documenting and maintaining the security level of the services provided by the SECRICOM communication system.
Sytuacje kryzysowe występują zazwyczaj w wyniku nieprzewidzianych wydarzeń, co implikuje problemy z niedostępnością lub przeciążeniem systemu łączności. Zadaniem zaproponowanego w ramach projektu SECRICOM rozwiązania Communication Security Monitoring and Control Centre (CSMCC) jest bezpieczeństwo usług z nim związanych. Usługi te są kierowane do podmiotów obsługujących różnorodne infrastruktury telekomunikacyjne na potrzeby zarządzania kryzysowego. W tym celu opracowano model bezpieczeństwa ułatwiający pomiar bezpieczeństwa infrastruktury komunikacyjnej oraz wspierający rozwiązywanie problemów wynikających z heterogenicznych i rozproszonych rozwiązań. Zaproponowany model jest wspierany przez rozwiązanie Security Middleware Service and Framework, który jest odpowiedzialny za mierzenie, dokumentację oraz utrzymanie poziomu bezpieczeństwa usług oferowanych przez system SECRICOM.
Źródło:
Technical Sciences / University of Warmia and Mazury in Olsztyn; 2012, 15(1); 173-185
1505-4675
2083-4527
Pojawia się w:
Technical Sciences / University of Warmia and Mazury in Olsztyn
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Organizational security system as a determinant of enhancing security culture of GIS
Autorzy:
Stanik, Jerzy
Kiedrowicz, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/2191381.pdf
Data publikacji:
2021
Wydawca:
Stowarzyszenie SILGIS
Tematy:
safeguard system
risk
security culture model
security culture
system zabezpieczeń
ryzyko
model kultury bezpieczeństwa
kultura bezpieczeństwa
Opis:
The purpose of this paper is to propose a way to measure security culture as a determinant of organizational safeguards for sensitive resources in GIS-class systems. Based on a critical analysis of the results of the risk estimation of sensitive resources in GIS, a variant of the model and then the methodology for measuring security culture was proposed, its basic elements were described, and then the criteria that should be met by each organizational safeguard, considered in the measurement of security culture, were identified and established. Based on the developed model of security culture measurement, methods for measuring this phenomenon in GIS from the perspective of the organizational safeguard system are indicated. Attention was focused on theoretical aspects and elements of best practice that indicate the feasibility of developing and applying a security culture model to measure security performance of GIS.
Źródło:
GIS Odyssey Journal; 2021, 1, 1; 91--107
2720-2682
Pojawia się w:
GIS Odyssey Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Proposed model for data security protection of cadastral information in Poland
Propozycja modelu zabezpieczeń informacji katastralnej w Polsce
Autorzy:
Mika, M.
Powiązania:
https://bibliotekanauki.pl/articles/100472.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Rolniczy im. Hugona Kołłątaja w Krakowie
Tematy:
real estate cadastre
cadastral information
information protection
information security model
multi-purpose cadastre
kataster nieruchomości
informacja katastralna
ochrona informacji
model zabezpieczeń informacji
kataster wielozadaniowy
Opis:
The paper presents a proposal for the data security model to protect the cadastral information recorded in the databases of real estate in Poland. The model was developed for the implementation of multi-purpose cadastral tasks. The problem has been considered from the point of view of the smooth functioning of the real estate market. Reliability of the real estate market is guaranteed by the full, accurate, easily available and current cadastral data. The latter is an important piece of information about the area or land, essential for the implementation of most of the real estate management processes. The publication indicates obligatory and optional sources of cadastral information. The basis for the model of cadastral data security system is the compatibility of the assumptions between the said model and the applicable law. The model contains four types of disclosure status for cadastral data (confidential information, public information, incomplete public information, non-confidential information requiring a license). The status was adjusted to specified groups of users of the multipurpose cadastre. The aforementioned groups are based on the entities, acting within the real estate market in Poland. The security model presented herewith assumes a full transition to computer storage media, including the descriptive information and spatial databases, contained in the multi-purpose cadastre, as well as full interoperability of the data collected therein.
W publikacji przedstawiono propozycję modelu zabezpieczeń informacji katastralnej, rejestrowanej w bazach danych o nieruchomościach w Polsce. Model opracowano pod kątem realizacji zadań katastru wielozadaniowego. Problem ten rozpatrzono z punktu widzenia sprawnego funkcjonowania rynku nieruchomości. Gwarancją rzetelności rynku nieruchomości jest pełna, dokładna, łatwo osiągalna i aktualna informacja katastralna. Informacja ta stanowi istotny element informacji o terenie, niezbędny w realizacji większości procesów gospodarki nieruchomościami. W publikacji wskazano obligatoryjne oraz fakultatywne źródła informacji katastralnej. Podstawą opracowanego modelu zabezpieczeń systemu katastralnego jest zgodność założeń niniejszego modelu z obowiązującymi przepisami prawa. Model zawiera cztery rodzaje statusu jawności informacji katastralnej (informacje poufne, informacje jawne, informacje jawne niepełne, informacje jawne wymagające licencji). Status ten dostosowano do wyszczególnionych grup użytkowników katastru wielozadaniowego. Grupy te przyjęto w oparciu o podmioty występujące na rynku nieruchomości w Polsce. Prezentowany model zabezpieczeń zakłada pełne przejście na komputerowe nośniki danych, w zakresie informacji opisowej i przestrzennej, wszystkich baz danych wchodzących w skład katastru wielozadaniowego oraz pełną interoperacyjność gromadzonych w nich danych.
Źródło:
Geomatics, Landmanagement and Landscape; 2017, 1; 81-91
2300-1496
Pojawia się w:
Geomatics, Landmanagement and Landscape
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Strategies for Computer Networks Security
Autorzy:
Gapiński, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/916182.pdf
Data publikacji:
2014
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
network security
model
risk management
Opis:
IT security of computer networks plays an increasingly important role in business operations; but at the same time the importance of its systematic improvement not always is perceived, nor are implemented ameliorations due to incorrectly accepted models or strategies. Some models of the global computer network comprehensive protection, called trust framework, are discussed by the author of this article.
Źródło:
Kwartalnik Nauk o Przedsiębiorstwie; 2014, 32, 3
1896-656X
Pojawia się w:
Kwartalnik Nauk o Przedsiębiorstwie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Context Data Acquisition Using Adaptive Non-repudiation Model
Autorzy:
Tunia, M. A.
Powiązania:
https://bibliotekanauki.pl/articles/226533.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
non-repudiation
contextual security
adaptive security
non-repudiation model
Opis:
The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well as decision-making process of registering a given event, are context-aware. Non-repudiation is equipped with context-awareness by using widely utilized network tools. The aim of this paper is to present timing results for selected tools execution and to complete the evidence generation time. In some applications it is crucial to gather evidence data as fast as possible because of the rapidly changing network environment. For such situations, in case of prolonged execution time, an output from a tool might imprecisely describe the contextual situation from the time of the occurrence of an event.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 197-202
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity and cyber risk in integrated and management reports of key service operators
Autorzy:
Ferens, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1917428.pdf
Data publikacji:
2021-06-21
Wydawca:
Stowarzyszenie Księgowych w Polsce
Tematy:
cybersecurity
cyber risk
business model
IT security
Opis:
Purpose: The scope of interactive information processed and exchanged through cyberspace has grown exponentially. Therefore, there is a need to develop cybersecurity that protects this space against both internal and external threats, as well as to work out an appropriate reporting system on the cybersecurity model operating in the company. The aim of the paper is to identify and assess the disclosures on cybersecurity and cyber risk in the integrated and management reports of selected companies listed on the Warsaw Stock Exchange. Methodology: The study focused on the integrated and management reports of 17 selected companies identified as operators of so-called key services. The representative sample was chosen through purposive sampling. This process was preceded by a preliminary analysis of companies listed in the WIG 30 Index, drawing on the number of integrated reports prepared by the operators of key services. The research involved an analysis of the literature and legal regulations, as well as the structure and scope of information on cybersecurity reported by the surveyed companies, along with the deductive method. The results of the analysis showed that only some companies present information on existing cyber risks and cybersecurity, while information is scattered in different parts of the business reports and non-comparable due to the lack of a unified data structure. It was noted that the reports do not contain detailed information on the activities in the field of cybersecurity, which makes it impossible to perform a multifaceted and multisectoral assessment of the results reported by the entities. Originality: The paper builds on and thus complements the scientific achievements in the field of non-financial reporting, including the business model, by identifying the shortcomings related to reporting on how to protect companies against the risk related to cyber threats in the reports to date. The study also confirms the need to improve the content of business reports with quantitative and qualitative information in this regard
Źródło:
Zeszyty Teoretyczne Rachunkowości; 2021, 45(2); 31-50
1641-4381
2391-677X
Pojawia się w:
Zeszyty Teoretyczne Rachunkowości
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Description of Security Systems — a Few Reflections
Autorzy:
Wiśniewski, Bernard
Powiązania:
https://bibliotekanauki.pl/articles/1374981.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
security
system
systemic approach
model
modeling
methodology
Opis:
This article presents fundamental issues concerning the description of the security system of an organization understood as an entirety composed of people equipped with tools, machines and materials, which are connected with one another by a specific bond and between which there are relations connected to ensuring an undisturbed existence and creating opportunities for development. The description of security systems is a complex undertaking. It is a consequence of its complexity, which is primarily a result of the set of relations between organizational elements. They include: accumulation (expressed in the number of hierarchical levels, range (related to the number of subordinations and dependencies), spread (associated with the number of elements subordinate to a single superior at each organizational level), organizational cohesiveness (connected to the mutual structural and functional dependencies between organizational elements due to performed tasks), information links (reflecting the channels and network of information flow), as well as the division of powers (associated with the right to make decisions), and division of duties (related to the relationship between organizational elements). The complexity of the description of security systems is also determined by the activity of the organization’s security systems, which can be divided into: material (concerning the types of activities), temporal (related to the order of its conduct in a specific time), and spatial (connected to conducting activities in specific places). The description of security systems is only possible through the use of: appropriate methodological procedures and a systemic approach, as characterized within the constraints resulting from the expression formula. This paper also indirectly addresses the determinants of the description of security systems. These are: up-to-date knowledge, concreteness and reliability of the description and sufficient detail.
Źródło:
Internal Security; 2019, 11(1); 9-20
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Impact of climate variability on yield of maize and yam in Cross River State, Nigeria: An autoregressive distributed lag bound approach
Autorzy:
Edet, E. O.
Udoe, P. O.
Isong, I. A.
Abang, S. O.
Ovbiroro, F. O.
Powiązania:
https://bibliotekanauki.pl/articles/1031443.pdf
Data publikacji:
2021
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Sustainable development
error correction model
food security
yield
Opis:
The study examined the impact of climate variability on yield of maize and yam in Cross River State, Nigeria. The specific objectives of the study were to determine the long-run and short-run impact of climate variability factors on yields of maize and yam. Data were sourced from the Nigerian Meteorological Agency (NiMeT) and Cross River State Ministry of Agriculture spanning from 1990-2016. Data obtained were analyzed using inferential statistics. Precisely, the model was estimated by the Ordinary Least Squares (OLS) multiple regression technique, which is within the Autoregressive Distributed Lag Bound approach and error correction testing framework. Both model-1 (maize yield) and model-2 (yam yield) passed through the conditions of the diagnostics and stability test. The study revealed that climate variables had a significant impact on maize yield both in the long and short-run. Based on the findings, it was concluded that proactive measures should be put in place to aid crop farmers adapt to the prevailing and looming threats of climate variability for the purpose of attaining the State’s food security balance sheet. To sustain this drive, an institutional and infrastructural support system is advocated in order to meet one of the goals of sustainable development agenda of the United Nations. Policy recommendations on how to cushion the impact of climate variability on the prescribed crops have been appropriately cited.
Źródło:
World News of Natural Sciences; 2021, 36; 60-74
2543-5426
Pojawia się w:
World News of Natural Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features of protection of technical objects against negative exposure
Autorzy:
Korostil, J.
Powiązania:
https://bibliotekanauki.pl/articles/114248.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
attack
prognosis
security system
model
technical object
tools
Opis:
This paper presents research of different classes of attacks against complex technical objects. Attacks are differentiated into different classes on the basis of analysis of attack features which reflect the possible methods of attack interaction with the security system. The developed methods of formal description of attacks and defense methods on the level of their logical approximation allow describing tasks of withstanding attacks for defense tools with enough certainty. Thanks to the proposed interpretation of attack interaction with a defense object and defense tools, it has become possible to determine approaches to the extension of the defense system by adding new tools oriented towards withstanding new attacks.
Źródło:
Measurement Automation Monitoring; 2016, 62, 7; 234-237
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Impact of econometric modeling and perspectives of economic security of the cross-industry complex
Autorzy:
Liezina, Anastasiia
Lavruk, Alexandr
Matviienko, Halyna
Ivanets, Iryna
Tseluiko, Oleksii
Kuchai, Oksana
Powiązania:
https://bibliotekanauki.pl/articles/2201980.pdf
Data publikacji:
2023
Wydawca:
Centrum Badań i Innowacji Pro-Akademia
Tematy:
economic security
intersectoral complex
econometric model
forecasting
bezpieczeństwo ekonomiczne
model ekonometryczny
prognozowanie
Opis:
The paper presents a forecast of the economic security of the inter-industry complex through the construction of a simulation model. The authors considered the possibility of using an econometric model in predicting the level of economic security of the inter-industry complex. The goal was to form a definition of the "inter-industry complex", as well as to study the issues of conceptual and fundamental methods of econometric modeling and forecasting the development of regional industry markets in dynamics. A range of issues related to the main components of economic security in the inter-industry complex has been allocated for scientific work in order to analyze the impact of the components of economic security on the integral indicator. The paper uses a methodology for predicting the structural and spatial-temporal dynamics of interbranch complexes, which includes new and refined methods of modeling and forecasting. As a result, the authors proposed the definition of "inter-industry complex", "economic security in the inter-industry complex", as well as the general provisions of the methodology for econometric modeling and forecasting the level of economic security of the inter-industry complex. The paper presents a full-scale simulation model that allows you to set, evaluate and make a decision using large nonlinear data. This kind of system contains dynamic and retarded data, which makes it possible to apply econometric modeling in automatic calculation.
Źródło:
Acta Innovations; 2023, 47; 73--83
2300-5599
Pojawia się w:
Acta Innovations
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Decision-Making Supporting Models Concerning the Internal Security of the State
Autorzy:
Kovalchuk, Oleg
Kasianchuk, Mykhailo
Karpinski, Mikolaj
Shevchuk, Ruslan
Powiązania:
https://bibliotekanauki.pl/articles/27311918.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security of the state
decision-making
information and analytical support
internal security
model
Opis:
In the digital society, states’ information security has become one of the key elements of ensuring the competitiveness and sustainable development of the state, guaranteeing its integrity and security in general. An important component of state security is the internal security of the state, which must ensure the personal and public safety of its citizens. Modern Ukraine is building a new system of criminal justice, which requires a new information system for risk assessment and support for optimal decision-making. Today, applied research and the development of information and analytical software for the internal security of the state have acquired a special meaning. In the paper, there is built a set of models for providing operational information for decision-making in criminal justice. This is a cluster model for creating criminal profiles of convicts, and a scoring model for identifying individual characteristics of criminals that have the greatest impact on their propensity to reoffend. The obtained models can provide reliable support for decision-making in the field of criminal justice and become part of the information support system for the internal security of Ukraine in general.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 301--307
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Human factor aspects in information security management in the traditional IT and cloud computing models
Autorzy:
Kobis, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2099440.pdf
Data publikacji:
2021
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
information security
human factor
traditional IT model
cloud computing
Opis:
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.
Źródło:
Operations Research and Decisions; 2021, 31, 1; 61--76
2081-8858
2391-6060
Pojawia się w:
Operations Research and Decisions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The the effects of socio-economic factors on the food security status of rural households in the eastern Cape province: evidence from farming households
Autorzy:
Mnukwa, Minentle Lwando
Nontu, Yanga
Mdoda, Lelethu
Aliber, Machael
Powiązania:
https://bibliotekanauki.pl/articles/2141455.pdf
Data publikacji:
2022-07-06
Wydawca:
Uniwersytet Przyrodniczy w Poznaniu. Wydawnictwo Uczelniane
Tematy:
household-level
food security
dietary diversity
socioeconomic characteristics
logistic regression model
Opis:
Issues relating to food availability, accessibility, affordability, and utilization remain of paramount importance among rural households. In order to formulate or implement relevant food security programs in rural areas, it is essential to have a deep understanding of the food security status of rural households. This study sought to determine the prevalence of food insecurity among rural households in the Eastern Cape Province, as well as its key socioeconomic and demographic factors. A cross-sectional study was carried out on 240 households using questionnaires about food security. A convenience sampling method was used to collect data, along with a structured questionnaire. Descriptive statistics and binary logistic regression were used to analyze the data. The binary logistic regression model revealed that age of household head, education level of household head, access to credit, household income, and household size were all associated with food security status. Thus, this study recommends that the government at all levels (local, state, and federal) have an adequate budget allocated to increasing awareness of the benefits of participating in farming to improve the livelihood outcomes of households
Źródło:
Journal of Agribusiness and Rural Development; 2022, 64, 2; 141-151
1899-5241
Pojawia się w:
Journal of Agribusiness and Rural Development
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies