Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Data Security" wg kryterium: Temat


Tytuł:
Raising public and private user awareness of the threats and risks related to cyberspace security
Autorzy:
Makuch, Anna
Powiązania:
https://bibliotekanauki.pl/articles/2158436.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state security
cyberspace
data security
Opis:
Modern cybersecurity efforts require the identification ofthe risks and threats associated with the cyberenvironment by consistently increasing public awareness of the dual nature of cyberspace and its use for the purposes of cooperation, and for the purposes of warfare and crime. Raising awareness today means involving both public and private users in cooperationfor the sake of both the common good and common interests involving standards for the use of virtual space.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 44-55
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data security based on neural networks
Autorzy:
Noaman, K.M.G.
Jalab, H.A.
Powiązania:
https://bibliotekanauki.pl/articles/1964155.pdf
Data publikacji:
2005
Wydawca:
Politechnika Gdańska
Tematy:
data security
cryptography
neural networks
Opis:
The paper is concerned with the study and design of a data security system based on neural networks. Data with different keys were taken as test data, encrypted, decrypted and compared with the original data. The results have confirmed its advantages over other techniques.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2005, 9, 4; 409-414
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
Autorzy:
Hłobaż, Artur
Powiązania:
https://bibliotekanauki.pl/articles/2055243.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
secure communication
data encryption
data security
secure transmission
secure data exchange method
SDEx method
end-to-end data security
Opis:
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 1; 57--62
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved Association Rule Mining-Based Data Sanitization for Privacy Preservation Model in Cloud
Autorzy:
Patil, Rajkumar
HimaBindu, Gottumukkala
Powiązania:
https://bibliotekanauki.pl/articles/2200962.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data security
improved apriori
modified data restoration
sanitization
Opis:
Data security in cloud services is achieved by imposing a broad range of privacy settings and restrictions. However, the different security techniques used fail to eliminate the hazard of serious data leakage, information loss and other vulnerabilities. Therefore, better security policy requirements are necessary to ensure acceptable data protection levels in the cloud. The two procedures presented in this paper are intended to build a new cloud data security method. Here, sensitive data stored in big datasets is protected from abuse via the data sanitization procedure relying on an improved apriori approach to clean the data. The main objective in this case is to generate a key using an optimization technique known as Corona-integrated Archimedes Optimization with Tent Map Estimation (CIAO-TME). Such a technique deals with both restoration and sanitization of data. The problem of optimizing the data preservation ratio (IPR), the hiding ratio (HR), and the degree of modification (DOM) is formulated and researched as well.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 51--59
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Distributed social network - data security
Autorzy:
Tunia, M. A.
Powiązania:
https://bibliotekanauki.pl/articles/106200.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
social network
data security
data repository
system architecture
interface
Opis:
The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can become. Users’ personal data can constitute significant value. One of the issues of social networking is storing and processing data by only one entity. Users cannot choose the most suitable security policy because there is only one provided for certain social network. Being part of it, means accepting the risk of unauthorized data distribution and data leakage because of application vulnerabilities. This paper presents new architecture of social network, which provides mechanisms for dividing data between more than one entity and combining independent data repositories in order to deliver one social network with clearly defined interfaces used to connect new data sources.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 113-122
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Issues of personal data management in organizations – GDPR compliance level analysis
Autorzy:
Kucęba, Robert
Chmielarz, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/432163.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
personal data
personal data protection
personal data security breaches
GDPR
Opis:
The paper presents the issues of information and personal data security management in organizations. The authors include in it an analysis of breaches to personal data security in organizations as a vital factor that conditions the necessity to improve the previously applied solutions in this area. Additionally, the paper contains analyses concerning the preparation level of organizations to ensure compliance with the General Data Protection Regulation (GDPR) which is coming into force. The paper constitutes a cognitive query in the scope of the subject matter defined in its title
Źródło:
Informatyka Ekonomiczna; 2018, 1(47); 58-71
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Attitudes of young consumers on the security of their data collected by smart devices in the age of the internet of things
Autorzy:
Kolny, Beata
Powiązania:
https://bibliotekanauki.pl/articles/11052270.pdf
Data publikacji:
2021-09-30
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Lotnictwa
Tematy:
Internet of Things
smart devices
data security
consumers
Opis:
The popularity of smart devices that collect and share data on user behaviour grows every year, and the number of such devices in households is forecast to rise steadily. Therefore, the purpose of this paper is to present the attitudes of young consumers regarding the security of their data collected by smart devices, interconnected via the existing Internet infrastructure or other network technologies within the Internet of Things (IoT) systems. The paper was written based on both secondary and primary sources of information. Secondary sources were used to define the discussed issues related to the Internet of Things and the security of data collected by smart devices. Primary sources, on the other hand, offered direct evidence of the attitudes of young consumers on the security of such data. Direct research was carried out using an online survey carried out in 2021 on a sample of 588 consumers aged 18–34 living in Poland. The results show that more than half of the respondents pay great attention to where the data collected by the devices used in their households is kept and whether such data is safe. In spite of such declarations, more than half of those surveyed have no knowledge about the level of the security of such data. The respondents agreed with the statement that consumers accepted the uncertainty related to the loss of control over their personal data collected by smart devices more quickly than the risk involved in becoming disconnected from them.
Źródło:
Marketing Instytucji Naukowych i Badawczych; 2021, 41, 3; 21-38
2353-8414
Pojawia się w:
Marketing Instytucji Naukowych i Badawczych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security mechanisms for data access in aspects of tools available in .net framework
Autorzy:
Michalska, A.
Poniszewska-Maranda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94847.pdf
Data publikacji:
2014
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
Security Mechanisms
data security
data access
mechanizmy zabezpieczające
bezpieczeństwo danych
dostęp do danych
Opis:
Software solutions are nowadays commonly used in business. More and more transactions are conducted on-line as well as more and more critical information is being kept on local or remote servers in huge databases. The purpose of presented paper is to analyze and propose the solutions used for the security of sensitive personal data and access to such data provided by the platform chosen for research with respect to the real-life needs of the developers and end-users. The main focus are put on the solutions provided by the .NET platform which next to Java is one of the most commonly used programming environments for both web page and desktop applications.
Źródło:
Information Systems in Management; 2014, 3, 3; 170-181
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zastosowanie klastra wysokiej dostępności w bezpieczeństwie relacyjnych baz danych
Application of high availability cluster for security of relational databases
Autorzy:
Berski, S.
Szatan, R.
Powiązania:
https://bibliotekanauki.pl/articles/103657.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
bezpieczeństwo danych
replikacja danych
bazy danych
data security
data replication
databases
Opis:
W pracy zaproponowano mechanizm zapewniania bezpieczeństwa danych poddanych zagrożeniom wynikającym z awarii systemu komputerowego lub sprzętu komputerowego. Przedstawione w pracy rozwiązanie polega na uruchomieniu klastra wysokiej dostępności dla bazy danych środków trwałych Instytutu Przeróbki Plastycznej i Inżynierii Bezpieczeństwa opartego o narzędzie do replikacji danych oraz narzędzie do kontroli dostępności poszczególnych węzłów klastra. W pracy zastosowano DRBD - narzędzie do replikacji urządzeń blokowych, które działa jako moduł jądra służący do mirrorowania systemów plików przez sieć [6]. DRBD umożliwia ochronę danych komputerowych poprzez zapis lustrzany w pamięciach dyskowych. Polega to na dublowaniu zapisu danych, w wyniku czego dwa urządzenia przechowują taką samą informację. Jako narzędzia kontroli dostępności poszczególnych węzłów klastra w pracy użyto z kolei systemu Heartbeat, który sprawdza operacje wejścia-wyjścia w celu zapewnienia spójności danych, a następnie przenosi zasoby na alternatywny węzeł [5].
In the work the security system of data subjected to risks arising from the failure of a computer system or computer equipment was presented. The analyzed solution is based on creation of high-availability cluster for database of fixed assets in Institute of Metal Forming and Safety Engineering. The proposed security system is based on DRBD software, replicated storage solution mirroring the content of hard disks, partitions, logical volumes etc. between hosts connected via Ethernet [6]. DRBD enables replication of selected services like MySQL server or http server to ensure mirroring of data managed by these servers. The Heartbeat service was used in the analyzed solution as a tool to control availability of the several nodes of the cluster to check the input– output operations and decides when to transfer the selected resources to satellite node [5].
Źródło:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa; 2016, T. 4; 49-57
2300-5343
Pojawia się w:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploration of a fragmented discourse. Privacy and data security in Süddeutsche Zeitung: 2007–2017
Autorzy:
Meissner, Florian
von Nordheim, Gerret
Powiązania:
https://bibliotekanauki.pl/articles/691344.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, digitization, privacy, data security, information security, surveillance, Snowden, risk communication, journalism.
Opis:
The goal of this exploratory case study is to identify different facets of news reporting on surveillance, privacy and data security, and more specifically, how risks in this context are portrayed. The theoretical foundation consists of two elements: 1) the concept of mediatized risk culture, and 2) the discursive arena model of risk communication, which provides the normative background for assessing news reporting. A text-mining approach (topic modeling) is applied to analyze relevant coverage of the German quality newspaper Süddeutsche Zeitung. The study yields a total of seven topics which belong to three categories: violation of privacy norms, power and law enforcement, and datafication. The results show that despite the de-mystification of digital technology after the Snowden leaks, coverage has recently become more affirmative and less focused on risk. We conclude that this may indicate a normalization of mass surveillance and data harvesting even in Germany, a society which traditionally values privacy. In order to add more context to our findings, however, further qualitative analyses were needed. The paper serves as a starting point for further research on media reporting of surveillance, privacy and data security.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Chmura obliczeniowa dla logistyki – projekt LOGICAL
Architecture of computing cloud – LOGICAL project
Autorzy:
Korczak, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/432039.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
cloud computing architecture
logistic services
cloud portal
data security
Opis:
This paper describes the organization of the local cloud computing environment at the University of Leipzig and Wrocław University of Economics, developed in the framework of the LOGICAL research project. In particular, the architecture of the main components of the cloud portal are described as well as their references to VMWare software. An example of logistics application – LogBase on Demand − is shortly presented.
Źródło:
Informatyka Ekonomiczna; 2014, 2(32); 95-105
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling of the User’s Identification Security System of on the 2FA Base
Autorzy:
Ussatova, Olga
Nyssanbayeva, Saule
Wójcik, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/1844625.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
two-factor authentication
data security
user identification
password generator
Opis:
The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 235-240
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improving Quality of Watermarked Medical Images Using Symmetric Dilated Convolution Neural Networks
Autorzy:
Pulgam, Namita D.
Shinde, Subhash K.
Powiązania:
https://bibliotekanauki.pl/articles/24200734.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data security
denoising
digital watermarking
image processing
medical imaging
Opis:
Rapid development of online medical technologies raises questions about the security of the patient’s medical data.When patient records are encrypted and labeled with a watermark, they may be exchanged securely online. In order to avoid geometrical attacks aiming to steal the information, image quality must be maintained and patient data must be appropriately extracted from the encoded image. To ensure that watermarked images are more resistant to attacks (e.g. additive noise or geometric attacks), different watermarking methods have been invented in the past. Additive noise causes visual distortion and render the potentially harmful diseases more difficult to diagnose and analyze. Consequently, denoising is an important pre-processing method for obtaining superior outcomes in terms of clarity and noise reduction and allows to improve the quality of damaged medical images. Therefore, various publications have been studied to understand the denoising methods used to improve image quality. The findings indicate that deep learning and neural networks have recently contributed considerably to the advancement of image processing techniques. Consequently, a system has been created that makes use of machine learning to enhance the quality of damaged images and to facilitate the process of identifying specific diseases. Images, damaged in the course of an assault, are denoised using the suggested technique relying on a symmetric dilated convolution neural network. This improves the system’s resilience and establishes a secure environment for the exchange of data while maintaining secrecy.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 2; 46--52
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Narzędzia i technologie ochrony danych
Tools and technologies data protection
Autorzy:
Staniewska, E.
Żywiołek, J.
Powiązania:
https://bibliotekanauki.pl/articles/103439.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
bezpieczeństwo danych
narzędzia ochrony danych
data security
information protection tools
Opis:
Informacja jako największe dobro każdej instytucji powinna podlegać ochronie przed niepowołanym dostępem, zniszczeniem lub nieautoryzowaną zmianą. W artykule przedstawiono wybrane aspekty bezpieczeństwa, a w szczególności typy zagrożeń oraz metody ochrony danych.
Information as the greatest good of each institution should be protected from unauthorized access, destruction, or unauthorized modification. The paper presents selected aspects of security, in particular the types of threats and methods of data protection.
Źródło:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa; 2013, T. 1; 307-317
2300-5343
Pojawia się w:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Security Properties of RC5 cipher’s Non Standard Modifications
Autorzy:
Kozakiewicz, A.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/122024.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
sieć komputerowa
kryptografia
bezpieczeństwo danych
computer network
cryptography
data security
Opis:
The RC5 algorithm is the cipher from the family of symmetric ciphers created by Ronald Rivest. Unlike other encryption algorithms, RC5 is designed this way, that a user or a security system architect can change some of its parameters. RC5 is a block cipher processing cipher-text blocks in the sequential rounds, where input of each round is the output of the previous one. In each round data is processed with usage of the key. The parameters of the cipher that can be changed are following: length of the key, length of the processed block and number of rounds. These parameters should be chosen based on the required level of security of communication. However there are such structures in RC5 that use of them is not entirely clear from the point of view for algorithm’s security. The aim of this paper is to examine how a cryptographic power of the cipher is affected by modifications to these structures. For this purpose will be used the well-known NIST tests.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2016, 21; 115-122
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analytic Method for Decision Support of Blockchain Technology Supplier Selection in Industry 4.0 Era
Autorzy:
Torbacki, Witold
Powiązania:
https://bibliotekanauki.pl/articles/2064746.pdf
Data publikacji:
2020
Wydawca:
STE GROUP
Tematy:
digital signature
data security
Industry 4.0
MCDA
blockchain technology
Opis:
The article presents the issues covering the modern methods of securing data in both manufacturing processes and companies within the concept of Industry 4.0. In this approach, research problems arose how to implement the right method of secure data sending in sales, manufacturing and distribution processes. It is a very important issue for manufacturing companies as well as how the process of sending electronic data should be safely conducted. While current researches concentrated on the method of blockchain secured electronic documents, there is almost no research concentrating on blockchain integrator selection criteria. The main purpose of this paper is to provide a decision assistance model based on multiple criteria decision analysis technique. Also, mutual relationships between parameters for the assessment of integrators are established. In the article, a Multi-Criteria Decision Analysis (MCDA) was used to assess these characteristics. The Decision Making Trial and Evaluation Laboratory (DEMATEL) technique was chosen for this assessment.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2020, 3, 1; 296--307
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
When perfect is not ideal, or mathematical methods for secret sharing
Autorzy:
Kulesza, Kamil
Nowosielski, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/748587.pdf
Data publikacji:
2006
Wydawca:
Polskie Towarzystwo Matematyczne
Tematy:
cryptography, secret sharing schemes, data security.
Kryptografia, Podział sekretu, Bezpieczeństwo informacji.
Opis:
Praca dotyczy rodziny protokołów kryptograficznych zwanych schematami podziału sekretu. W ramach pracy opisujemy szczegółowo podstawowe schematy podziału sekretu. Następnie prezentujemy uogólnione podejście do zagadnienia podziału sekretu oraz pokazujemy, jak teoria informacji może być wykorzystana do bardziej precyzyjnego opisu przedmiotu pracy. Podajemy też ogólny opis schematów podziału sekretu o rozszerzonych własnościach.
The paper is concerned with secret sharing schemes, a family of cryptographic protocols. First, we describe the basic schemes. Next, we present general secret sharing and the approach based on information theory. Finally, we outline extended capabilities of secret sharing schemes. An additional contribution of the paper is our effort to present unified terminology in Polish.
Źródło:
Mathematica Applicanda; 2006, 34, 48/07
1730-2668
2299-4009
Pojawia się w:
Mathematica Applicanda
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of big data in Industry 4.0 in mining industry in Serbia
Autorzy:
Tylečková, Eva
Noskievičová, Darja
Powiązania:
https://bibliotekanauki.pl/articles/88570.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
big data
Industry 4.0
data quality
data security
duże dane
jakość danych
ochrona danych
Opis:
The current age characterized by unstoppable progress and rapid development of new technologies and methods such as the Internet of Things, machine learning and artificial intelligence, brings new requirements for enterprise information systems. Information systems ought to be a consistent set of elements that provide a basis for information that could be used in context to obtain knowledge. To generate valid knowledge, information must be based on objective and actual data. Furthermore, due to Industry 4.0 trends such as digitalization and online process monitoring, the amount of data produced is constantly increasing – in this context the term Big Data is used. The aim of this article is to point out the role of Big Data within Industry 4.0. Nevertheless, Big Data could be used in a much wider range of business areas, not just in industry. The term Big Data encompasses issues related to the exponentially growing volume of produced data, their variety and velocity of their origin. These characteristics of Big Data are also associated with possible processing problems. The article also focuses on the issue of ensuring and monitoring the quality of data. Reliable information cannot be inferred from poor quality data and the knowledge gained from such information is inaccurate. The expected results do not appear in such a case and the ultimate consequence may be a loss of confidence in the information system used. On the contrary, it could be assumed that the acquisition, storage and use of Big Data in the future will become a key factor to maintaining competitiveness, business growth and further innovations. Thus, the organizations that will systematically use Big Data in their decision-making process and planning strategies will have a competitive advantage.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 166-173
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safety Mechanisms in Relational Database as Part of the IT System of the Enterprise
Autorzy:
Berski, Szymon
Bilau, Martyna
Powiązania:
https://bibliotekanauki.pl/articles/27315803.pdf
Data publikacji:
2019
Wydawca:
STE GROUP
Tematy:
enterprise database
MySQL
data replication
data security
baza danych przedsiębiorstwa
replikacja danych
ochrona danych
Opis:
The work examines the effectiveness of the replication mechanism of the X production company database. In order to extend the functionality of the computer database of the enterprise, a model of its resource flow was created and an intensional and extensional part was created for a test database based on real enterprise resources. The model has been simplified to 3-rd normal form. The implementation was done in the MySQL database system. Two different operating systems were selected for testing: Windows and Linux. The database management system (DBMS) is working under the GPL license. MySQL DBMS offers many security mechanisms, and to secure the database, system of users permissions to objects have been selected and also an encryption of access passwords for users and connections to servers was used. A replication engine based on the binary log and the model "main server and backup server" was used to create a copy of the enterprise data.
Źródło:
New Trends in Production Engineering; 2019, 2, 2; 12-23
2545-2843
Pojawia się w:
New Trends in Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tokenization as a data security technique
Autorzy:
Ogigau-Neamtiu, F.
Powiązania:
https://bibliotekanauki.pl/articles/119803.pdf
Data publikacji:
2016
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cloud computing
data security
encryption
obfuscation
chmura obliczeniowa
ochrona danych
szyfrowanie
zaciemnianie
Opis:
Nowadays, organisations, especially those which embrace the modern cloud computing technology, are facing the complex challenge of securing their data assets while providing modern IT services. Classical solutions for ensuring data security have consistent limitations in modern platforms due to factors like data sharing requirements, multi-tenancy, dynamic environment, high availability and reliability requirements, etc. One approach to address this problem is to implement encryption mechanisms which will provide the required security, but they depend on substantial investments in hardware and/or software and add supplementary complexity to those systems. This article analyses tokenization as an alternative strategy for ensuring data security in modern cloud computing systems by implementing mechanisms to hide sensitive data and restrict access to it. Tokenization systems are more easy to implement and can be used extensively for ensuring data security in IT systems.
Źródło:
Zeszyty Naukowe AON; 2016, 2(103); 124-135
0867-2245
Pojawia się w:
Zeszyty Naukowe AON
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Current threats to medical data security in family doctors’ practices
Autorzy:
Susło, Robert
Trnka, Jakub
Drobnik, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/552913.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Przyjaciół Medycyny Rodzinnej i Lekarzy Rodzinnych
Tematy:
forensic medicine
medical records
family medicine
data security
electronic medical records
hacker attack.
Źródło:
Family Medicine & Primary Care Review; 2017, 3; 313-318
1734-3402
Pojawia się w:
Family Medicine & Primary Care Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza możliwości obrony przed atakami SQL Injection
Analysis of protection capabilities against SQL Injection attacks
Autorzy:
Krawczyński, Bogdan
Marucha, Jarosław
Kozieł, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/98402.pdf
Data publikacji:
2018
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
wstrzykiwanie kodu SQL
bezpieczeństwo danych
podatność aplikacji
SQL Injection
data security
application vulnerability
Opis:
Publikacja dotyczy ataków SQL Injection, które stanowią jedno z głównych zagrożeń w cyberprzestrzeni. W oparciu o badania literaturowe dokonano klasyfikacji ataków SQL Injection. Celem pracy było przeprowadzenie analizy możliwości obrony przed atakami SQL Injection. Metodykę badawczą oparto na autorskiej aplikacji, zaimplementowanej w technologii JSP (JavaServer Pages) z wykorzystaniem serwera baz danych MySQL.
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Based on a literature studies, classification of the SQL Injection attacks was prepared. The purpose of the work was to analyse of protections effectiveness against SQL Injection attacks. Research method has been based on author application, which was implemented in JSP (JavaServer Pages) technology using MySQL database server.
Źródło:
Journal of Computer Sciences Institute; 2018, 7; 150-157
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Access to data and employee actions for information security
Autorzy:
Żywiołek, Justyna
Taranto di, Alberto
Powiązania:
https://bibliotekanauki.pl/articles/103953.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
mobile devices
data security
user safety
bezpieczeństwo informacji
urządzenia mobilne
bezpieczeństwo danych
bezpieczeństwo użytkownika
Opis:
Access to data is a nefralgic information security zone. On the one hand, we do everything to protect them against disclosure, and on the other hand, we need a new employee to provide data and information to be able to do their job. Managing access to data in the enterprise significantly affects the level of security in all areas of activity. The article presents the results of research in the field of security of policy objectives in a selected production company. The purpose of preliminary research is to analyze selected issues in the field of data access, control methods and employee responsibility. The article discusses the results of research on the access to information by employees. Lack of access to the data paralyzes their work, but their excess causes information chaos and makes it difficult to make a decision. The research results clearly indicate that access to data is treated as a priority, forgetting about access to computer software, mobile devices, which can also be the security of the company.
Źródło:
Quality Production Improvement - QPI; 2019, 1, 1; 42-46
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security of accounting records in the units of a municipal government
Autorzy:
Ćwiąkała-Małys, Anna
Durbajło-Mrowiec, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/1883432.pdf
Data publikacji:
2020
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
accounting
security of information
personal data security
accounting policy
rachunkowość
bezpieczeństwo informacji
bezpieczeństwo danych osobowych
polityka rachunkowości
Opis:
Purpose: The aim of this publication is to diagnose if and to what extent the changes in personal data security were transferred to security of information/ data in terms of accountancy in the units of local self-government. Units of local self-government exploit more and more IT, they process more information, including personal data, and the number of users of such systems is growing. When we additionally take into consideration common accessibility to the Internet, with a growing number of devices and mobile applications and a growing number of cyber-attacks, then the needs of self-government for better solutions in terms of information security should be growing. Hence, following the May Regulation of the European Union, in terms of securing personal data, should conduce to implementing additional, safer solutions. Financial data is a particularly comprehensive set of information that is transmitted in the area of accountancy of units, including units of local self-government. In the area of accountancy, there is a special regulation concerning the security of data systems, more precisely it is the Accounting Act. Design/methodology/approach: For the needs of this article, the researches were conducted in three average units of local self-government in the Lower Silesia Province. Interviews, observations and audits were also undertaken. In order to address this issue, interviews and audits were conducted in three units of local self-government of Lower Silesia Province. Findings: It was determined that none of the researched units has and plans to create a complex system of security that is adequate to the existing risks. Originality/value: The information security system in accounting was assessed, the area omitted in publications and practice.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2020, 145; 71-87
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies