Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security threats.

Zeitschriftenartikel zum Thema „Security threats“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security threats" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Der volle Inhalt der Quelle
Annotation:
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

A. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.

Der volle Inhalt der Quelle
Annotation:
This article considers threats to integration systems, as well as methods of prevention. Threat modeling involves identifying potential threats to a system, assessing the likelihood and impact of each threat, and developing strategies to prevent or mitigate those threats. For integration systems, there are many potential information security threats, including unauthorized access, malware, insider threats, DoS attacks, SQL injection, and data leakage. To ensure the security and integrity of enterprise integration systems, it is crucial for organizations to understand these threats and implemen
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Prayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.

Der volle Inhalt der Quelle
Annotation:
The transition and development of forms of threats to the security of an international state at this time cannot always be resolved by armed forces and not only like war, this form of threat is known as non-traditional threat terms that threaten human security. The global Covid-19 pandemic not only poses a threat to aspects of national security but also has a major impact on human security. This study uses the Copenhagen perspective as the main theory in research and is supported by the concept of non-traditional security and the concept of securitization. This research method is a qualitative
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Der volle Inhalt der Quelle
Annotation:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.

Der volle Inhalt der Quelle
Annotation:
Increasing technological complexity of cyber threats creates a major challenge between securing data privacy and maintaining potent cybersecurity practices. The paper examines privacy-protecting security methods in cybersecurity by detailing organizational approaches to defend private information throughout the cyber threat detection and mitigation process. Organizations need to establish the appropriate levels of data security because implementations that limit privacy too much threaten their security capabilities but weak protection measures create vulnerabilities to data breaches. The resea
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Der volle Inhalt der Quelle
Annotation:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.

Der volle Inhalt der Quelle
Annotation:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Der volle Inhalt der Quelle
Annotation:
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.

Der volle Inhalt der Quelle
Annotation:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Saptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.

Der volle Inhalt der Quelle
Annotation:
Boundary is an important part of the state's sovereignty and becomes a fortress of all kinds of threats. The threat about security of natural resources is one of non-military threat which affects Indonesia’s security. Betung Kerihun National Park adjoins to Malaysia in northern of Indonesia, so it can be vulnerable to threats. The purposes of this research are to analyze the threat of security toward management of Betung Kerihun National Park (TNBK), the efforts made to overcome the security threat, and the management of TNBK on the border of Indonesia and Malaysia. The research uses qualitati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Der volle Inhalt der Quelle
Annotation:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive ma
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Sliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.

Der volle Inhalt der Quelle
Annotation:
The article analyses texts of resolutions of the UN GA First Committee and highlights threats mentioned in these documents for the period 2014–2021. The main objective of this research is to study the essentiality of security threats contained in the resolutions texts of the UN GA for the period 2014– 2021, as well as to classify the identified threats. M ethods of document analysis, content analysis and classification are applied in this study. On the whole, 800 documents are analysed. The content analysis of the English-language resolutions texts of the UN GA First Committee make
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Ayub, Kamran, and Roushdy Alshawa. "Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare." Journal of Robotics and Automation Research 5, no. 3 (2024): 01–08. https://doi.org/10.33140/jrar.05.03.09.

Der volle Inhalt der Quelle
Annotation:
Wireless Body Area Networks (WBANs) are critical components of emerging smart healthcare solutions. Due to the intrinsic nature of wireless communication and the potentially sensitive medical data they carry, such networks are often very vulnerable to many types of security threats. As a result, the security of WBANs becomes a prime concern when they are considered for use in healthcare or medical applications. This text enumerates common security threats that a typical WBAN should prepare for. It also provides a set of enhancement mechanisms and techniques that could be implemented to augment
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Jaiswal, Shruti, Himani Bansal, Shiv Naresh Shivhare, and Gulshan Shrivastava. "A Novel IoT Framework for Identifying and Mitigating Security Threats." Scalable Computing: Practice and Experience 26, no. 5 (2025): 2165–83. https://doi.org/10.12694/scpe.v26i5.4909.

Der volle Inhalt der Quelle
Annotation:
The popularity of Internet of Things (IoT) devices has surged due to their applications in diverse areas such as e-Health, smart vehicles, and smart cities. However, the rapid deployment of these devices has led to an exponential increase in security attacks targeting IoT systems, making security a prime concern for the community. Securing IoT-based systems is challenging because the devices involved are often resource-constrained. Providing security to these systems requires a thorough understanding of their specific security needs, along with a systematic security engineering approach. Previ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Syed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.

Der volle Inhalt der Quelle
Annotation:
Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Pendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Der volle Inhalt der Quelle
Annotation:
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in tele
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Karpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.

Der volle Inhalt der Quelle
Annotation:
Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreov
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Albarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (2024): 10867. http://dx.doi.org/10.3390/app142310867.

Der volle Inhalt der Quelle
Annotation:
The Web of Things (WoT) represents a significant advancement on the Internet of Things (IoT), where web technologies are integrated to enhance device interoperability and accessibility. While this integration offers numerous benefits, it also introduces new and complex security challenges. This paper presents a critical analysis of WoT security, examining the ecosystem’s vulnerabilities and associated threats. Our contributions include an in-depth analysis of existing threat enumeration methodologies, highlighting misconceptions and inefficiencies that may weaken security measures. We further
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Beladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.

Der volle Inhalt der Quelle
Annotation:
Abstract:In today's rapidly evolving digital landscape, organizations face an increasing number of cyber threats that jeopardize their sensitive data, operations, and reputation. A Cyber Security Security Operations Center (SOC) Analyst plays a critical role in detecting, analyzing, and mitigating cyber threats in real-time. This role involves continuous monitoring of security alerts, incident response, threat intelligence analysis, and ensuring compliance with security policies and frameworks. SOC Analysts leverage advanced security tools such as SIEM (Security Information and Event Managemen
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Shaik Azeeza Farhana, Bommala Jagadeeswari, Chakka Pavani, Poornachand Anumolu, Naga Roop Kumar Ogirala, and Abdul Subhani. "Cyber security in the FinTech Sector: Securing Digital Transactions." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 06 (2025): 2265–67. https://doi.org/10.47392/irjaem.2025.0356.

Der volle Inhalt der Quelle
Annotation:
The FinTech industry has been growing at a tremendous pace, showing several outbursts of technological innovation, and is further reforming the financial world, equipping it with prolific digital financial services. However, their very nature exhumed a due share of cyber threats. This section discusses the overriding importance of cybersecurity in the FinTech industry, specifically pointing out the security of digital transactions. It outlines various types of cyber threats, including phishing, malware, ransomware, DDoS attacks, and insider threats, against FinTech companies, elaborating on th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Sri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.

Der volle Inhalt der Quelle
Annotation:
The threat of different cyber threats as well as the development of new sophisticated malware necessitates the use of modern security measures to protect endpoint devices. One of the key promising approaches for enhancing the endpoint protection is Applying Explainable Artificial Intelligence (XAI) that provides a comprehensible explanation for identifying potential threats. This undergoing researching paper aims to identify and discuss how or whether XAI can help conduct security threats at endpoints and how it can identify and mitigate complex cyber threats while at the same time simplifying
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Smirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Der volle Inhalt der Quelle
Annotation:
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Der volle Inhalt der Quelle
Annotation:
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model prov
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Batham, Diksha, Ghanshyam Prasad Dubey, Mohini Sharma, Shailendra Mourya, Ashish Singh, and Anushka Sharma. "Mobile Security – Light on Security Threats." International Journal of Emerging Technology and Advanced Engineering 14, no. 2 (2024): 25–34. https://doi.org/10.46338/ijetae0224_04.

Der volle Inhalt der Quelle
Annotation:
The smartphone has evolved into a little computer that can perform all of our daily tasks, including social media use, email correspondence, and banking. The use of smartphones is also increasing quickly. Because there are more and more connected biases in the network field every day, cyberattacks are also increasing. All connected device linked to the Internet has become the target of cyberattacks as new types of network attacks have emerged. Consequently, network data security cannot be disregarded. Not only is operating system and device usage directly related to mobile security, but intern
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Muliński, Tomasz. "ICT security in revenue administration - incidents, security incidents - detection, response, resolve." Studia Informatica. System and information technology 27, no. 2 (2023): 75–93. http://dx.doi.org/10.34739/si.2022.27.04.

Der volle Inhalt der Quelle
Annotation:
The article shows the author's approach to the methods of acquiring and analyzing reports and security incidents, categorizing their sources in relation to the literature describing ICT security threats, taking into account the legal regulations in force in the Polish public administration. Methods of verification and analysis of detected threats, methods of threat resolution were presented. Tools and procedures used to evaluate reported incidents and assess the threat level of reported incidents were discussed. The incidents and events identified in the period April 2018 - February 2022 were
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Tanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.

Der volle Inhalt der Quelle
Annotation:
In an increasingly digitized world, cybersecurity has emerged as a critical domain for ensuring the safety and integrity of information systems. This paper provides a comprehensive overview of the current state of cybersecurity, highlighting the evolving threat landscape, key challenges, and strategic defenses. Cyber threats have become more sophisticated and widespread, targeting both individuals and organizations. These threats include various forms of malware, phishing attacks, ransomware, and advanced persistent threats. As a result, the need for robust cybersecurity measures has never bee
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

صادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.

Der volle Inhalt der Quelle
Annotation:
After the Cold War, security policy has been changed dramatically. Currently, security no longer covers only war and army. For instance, at the time I am writing this paper, health security because of Corona virus is much riskier than atomic weapons, terrorists or any other army threats. Political systems are concerned to care about political, health, cyber, economic, food, water, environment, education and other security sectors. Kurdistan region has faced some interior and foreign security challenges. In theoretical framework, the research sheds some light on security situation in concept, c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Koper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.

Der volle Inhalt der Quelle
Annotation:
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must b
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Biehun, Anatolii, Olha Osypova, Maksym Plakhtii, and Oleksandr Urdenko. "The analysis of external and internal threats of electronic ticket functioning at entertainment events." Modeling and Information Systems in Economics, no. 101 (December 1, 2021): 20–31. https://doi.org/10.33111/mise.101.3.

Der volle Inhalt der Quelle
Annotation:
E-ticketing activities are fully inherent in both traditional business threats and e-commerce threats posed by e-business technologies and the widespread use of computer and telecommunications technology. Threats in the sale of electronic tickets arise at almost all stages of activity and affect the interests of both sellers and buyers. Therefore, the need for comprehensive measures to identify and monitor threats is obvious to companies engaged in the sale of electronic tickets. The solution to the problem of counteracting the security threats of enterprises engaged in the sale of electronic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Jaźwiński, Ireneusz. "Economic Security Threats. Determinants of State Functioning and Economic Policy." Przegląd Strategiczny, no. 16 (January 22, 2024): 77–88. http://dx.doi.org/10.14746/ps.2023.1.6.

Der volle Inhalt der Quelle
Annotation:
Threats to economic security affect national security. The aim of the article is to present the economic security threats taking into account selected determinants of state functioning and economic policy. In shaping economic security, it is important to properly consider threats to this security. Various research methods were used in the work, including the method of critical analysis of the literature as well as the method of analysis and synthesis. Considering the issues of economic security, it is also worth analyzing the threat to this security. In theory and practice, different aspects a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Aliyu Yauri, Bashir, and Joshua Abah. "Mitigating Security Threats in Virtualized Environments." International Journal of Scientific Engineering and Research 3, no. 5 (2015): 86–92. https://doi.org/10.70729/ijser15175.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Bari, Ahamed Basha Abdul. "Healthcare Facilities and Cyber Security Threats." Chettinad Health City Medical Journal 11, no. 04 (2022): 1. http://dx.doi.org/10.24321/2278.2044.202232.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Guchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.

Der volle Inhalt der Quelle
Annotation:
The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using mode
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Smalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.

Der volle Inhalt der Quelle
Annotation:
Over time, the issue of security has not lost its relevance, but on the contrary gained momentum because of the large-scale threats that have arisen and evolve. In today's world, there are threats that are beyond the control of a particular country and, for the sake of security, begin to pool their forces and resources. The author reveals the particularities of threats to European collective security in the 21st century. The article identifies threats based on doctrinal approaches. The threat is a set of factors and conditions that could potentially pose a danger to the state in the future. Th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Der volle Inhalt der Quelle
Annotation:
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specificall
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Dervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.

Der volle Inhalt der Quelle
Annotation:
Abstract In the process of designing and forming each system, it is necessary to identify potential vulnerabilities and threats to that system and to include appropriate countermeasures. The process that helps to find the problem in the first phase of design is called threat modeling. Threat modeling is based on the idea that every system has valuable resources that need to be protected. These resources have certain weak points that internal or external threats can use to harm them, while there are as well countermeasures used to mitigate them. Therefore, this paper analyses the security of a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Yarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Der volle Inhalt der Quelle
Annotation:
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 o
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Jenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.

Der volle Inhalt der Quelle
Annotation:
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Der volle Inhalt der Quelle
Annotation:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.

Der volle Inhalt der Quelle
Annotation:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.

Der volle Inhalt der Quelle
Annotation:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.

Der volle Inhalt der Quelle
Annotation:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Ihor, Ya. Kulyniak, H. Bondarenko Yuliia, and I. Zhygalo Ivan. "Theoretical aspects of the essence and relationship between the shadow economy and the financial and economic security of the state." Economic journal Odessa polytechnic university 1, no. 11 (2020): 29–39. https://doi.org/10.5281/zenodo.3975502.

Der volle Inhalt der Quelle
Annotation:
The article clarifies the essence of such concepts as "shadow economy", "economic security", "and financial security", "financial and economic security". The main reasons that cause the development of the shadow economy in Ukraine are highlighted. The main issues of the effective counteraction of external and internal threats in the sphere of financial and economic activity of entities are considered. As a result of the analysis and research, the components of the economic security of the state were given. The SWOT-analysis of the shadow economy of Ukrai
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Климов, Д. В. "External threats to enterprise security." Экономика и предпринимательство, no. 2(115) (May 6, 2020): 805–7. http://dx.doi.org/10.34925/eip.2020.115.2.161.

Der volle Inhalt der Quelle
Annotation:
В экономических отношениях предприятия выступают объектами экономических угроз. Экономическая угроза - это возможность потенциально причинить ущерб субъектам хозяйственной деятельности с внешней и внутренней среды. Угрозы существуют всегда и задача руководителей - предотвращать и избегать опасности, выходить из кризисных ситуаций с минимальными потерями. Уходя от наибольших угроз, все равно невозможно избавиться от всех угроз на предприятии. В список угроз постоянно входят новые звенья и перестают быть актуальными старые. Для того, чтобы избегать и правильно предотвращать угрозы, необходимо зн
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Gould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.

Der volle Inhalt der Quelle
Annotation:
This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security thr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Abhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1268–79. https://doi.org/10.32628/cseit241061171.

Der volle Inhalt der Quelle
Annotation:
Securing cloud-based financial platforms presents unique challenges in an era of increasing cyber threats and distributed architectures. This article introduces a novel framework integrating artificial intelligence with microservices security, specifically designed for insurance and annuity sector applications. The proposed solution leverages predictive analytics and machine learning algorithms to enhance threat detection and response capabilities within containerized environments, implemented using Kubernetes on AWS infrastructure. The article demonstrates significant improvements in threat d
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Shammugam, Inthrani, Ganthan Narayana Samy, Pritheega Magalingam, Nurazean Maarop, Sundresan Perumal, and Shanmugam6 Bharanidharan. "Information security threats encountered by Malaysian public sector data centers." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1820–29. https://doi.org/10.11591/ijeecs.v21.i3.pp1820-1829.

Der volle Inhalt der Quelle
Annotation:
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected throug
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Maher, Zulfikar Ahmed, Ali Ghulam, Muhammad Yaqoob Koondhar, Iftekhar Ahmed Mahar, and Mansoor Hyder. "Security Based SCURM Process (SUBSCRUM) For Secure Agile Development." VFAST Transactions on Software Engineering 12, no. 3 (2024): 138–46. http://dx.doi.org/10.21015/vtse.v12i3.1893.

Der volle Inhalt der Quelle
Annotation:
This study presents an integrated approach for the consideration of security during agile development. A security-based SCRUM process (SBSCRUM) is introduced by taking advantage of the security patterns presented by security experts which contains the solution for a security threat. In the proposed security based SCRUM process the SCRUM team will be responsible for identifying the expected security threats to the system, in which all the expected threats to the system are modelled using mis-use case diagrams and then these modelled threats are mitigated using the security patterns which provid
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Sri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13253288.

Der volle Inhalt der Quelle
Annotation:
The threat of different cyber threats as well as the development of new sophisticated malware necessitates the use of modern security measures to protect endpoint devices. One of the key promising approaches for enhancing the endpoint protection is Applying Explainable Artificial Intelligence (XAI) that provides a comprehensible explanation for identifying potential threats. This undergoing researching paper aims to identify and discuss how or whether XAI can help conduct security threats at endpoints and how it can identify and mitigate complex cyber threats while at the same time simplifying
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.

Der volle Inhalt der Quelle
Annotation:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!