11,976 results on '"Security service"'
Search Results
2. ASM: Augmented Security Module for Commercial IoT Devices
- Author
-
Heeseung Son, Beom Seok Kim, Jinsung Cho, and Ben Lee
- Subjects
augmented security module ,HSM ,IoT security ,security framework ,security service ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The rapid expansion of the Internet of Things (IoT) has led to increased concerns regarding the security of IoT systems. Attacks targeting IoT devices, such as code injection and code reuse, have become more sophisticated, compromising device control and functionality. Existing security schemes, designed primarily for the ×86 architecture, are not well-suited for resource-constrained IoT devices. While numerous studies aim to strengthen IoT device security, practical implementation faces challenges due to time-to-market requirements and manufacturing costs. To address these issues, this paper proposes an Augmented Security Module (ASM) that provides essential security services for IoT devices within the same network, requiring minimal device modifications. The ASM includes Hardware Security Modules (HSMs) like Trusted Platform Module (TPM) and Secure Element (SE) to ensure data integrity and execute requested security services. By adding ASM Agents, which perform minimal operations to request security services, IoT devices can easily access the provided security services. The proposed ASM enables flexible adaptation to evolving security requirements at a low cost, meeting practical manufacturing and time-to-market demands. To validate the effectiveness of the proposed ASM, four representative scenarios are presented and analyzed, demonstrating its ability to enhance IoT device security and prevent attacks. The proposed ASM contributes to the widespread adoption of secure IoT systems by ensuring the security of IoT devices within the network.
- Published
- 2024
- Full Text
- View/download PDF
3. Gospodarka jako zakładnik polityki. Analiza działań Służby Bezpieczeństwa wobec podmiotów gospodarczych z wykorzystaniem metod wspomaganych komputerowo.
- Author
-
WILCZYŃSKI, Zbigniew and WERNER, Wiktor
- Abstract
Copyright of Historia i Polityka is the property of Nicolaus Copernicus University in Torun and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
4. Security SFC Path Selection Using Deep Reinforcement Learning
- Author
-
Deng, Shuangxing, Li, Man, Guo, Qi, Zhou, Huachun, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, You, Ilsun, editor, Kim, Hwankuk, editor, and Angin, Pelin, editor
- Published
- 2023
- Full Text
- View/download PDF
5. Policing Politically Motivated Activities 1850–1920
- Author
-
Joyce, Peter, Laverick, Wendy, Joyce, Peter, and Laverick, Wendy
- Published
- 2023
- Full Text
- View/download PDF
6. Consequences and threats of international terrorism for Ukraine
- Author
-
Tetiana Borko and Andrejs Vilks
- Subjects
crime ,blackmail ,economy ,security service ,extremism ,society ,International relations ,JZ2-6530 - Abstract
Terrorism is one of the greatest threats to the existence of the world order in the 21st century. Its main features are suddenness, a large number of civilian casualties and a low probability of learning about a possible attack. The purpose of the study is to identify terrorist threats to Ukraine and the possible consequences of this criminal activity. The research was conducted using methods such as comparison, induction, deduction and the analytical hierarchical process. The study identified that terrorist attacks cause many deaths of citizens of a particular country, undermine trust in the official authorities and disrupt economic processes. The main source of the terrorist threat to Ukraine is the russian federation, and after the start of the full-scale invasion on 24 February 2022, the probability of new terrorist attacks in Ukraine has increased significantly. A basic analysis of the activity of terrorist groups on the territory of Ukraine was conducted, and the main consequences of terrorist activity in the political and social sphere in this country were identified. The biggest threat to Ukraine is the loss of independence and sovereignty due to russia's criminal actions, which could result in panic in society and undermine economic processes. The results of the study can be used as a foundation for identifying the main terrorist threats on the territory of Ukraine and developing a state plan for countering possible terrorist attacks. This research can be used as a foundation for comparing the activities of terrorist organisations in other countries against the background of Ukraine
- Published
- 2023
- Full Text
- View/download PDF
7. Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files)
- Author
-
Julia Mazurkiewicz-Sułkowska
- Subjects
language of security services ,security service ,language of denunciations ,imperceptivity ,evidentiality ,epistemic modality ,Ethnology. Social and cultural anthropology ,GN301-674 ,Slavic languages. Baltic languages. Albanian languages ,PG1-9665 - Abstract
Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files) The analysis of the language of the security service employees in the Polish People’s Republic and the People’s Republic of Bulgaria, made on the basis of the CHS “Bolek” and the CHS “Sabina” files, showed that there is a certain feature that appears extremely often in the examined files, even though its occurrence in administrative and legal texts should be pretty sporadic. It is a very high frequency of using forms that express the veracity reserve. This shows how much the authors of the notes wanted to emphasise their own reserve to the truthfulness of the content provided by the confidential human sources (CHS). Wyrażanie rezerwy prawdziwościowej w aktach tajnych służb Polskiej Rzeczypospolitej Ludowej i Ludowej Republiki Bułgarii (na przykładzie akt TW Bolka i TW Sabiny) Analiza języka służb bezpieczeństwa Polskiej Republiki Ludowej i Ludowej Republiki Bułgarii przeprowadzona na podstawie tzw. teczek TW Bolek i TW Sabina wykazała, że istnieje pewna cecha, która pojawia się w obydwu dokumentach niezwykle często, mimo że w tekstach administracyjnych i prawnych jej występowanie powinno być sporadyczne. Tą cechą jest duża częstotliwość występowania form wyrażających rezerwę prawdziwościową. Pokazuje to, jak bardzo autorzy notatek chcieli podkreślić swoją rezerwę co do prawdziwości treści przekazywanych przez poufne źródła osobowe.
- Published
- 2024
- Full Text
- View/download PDF
8. Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning.
- Author
-
Shuangxing Deng, Man Li, and Huachun Zhou
- Subjects
DEEP reinforcement learning ,TRAFFIC monitoring ,SOFTWARE-defined networking - Abstract
Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue. Our contribution is threefold. First, we propose a secure SFC path selection framework. The framework can accept the feedback results of traffic and security service functions in SFC, and dynamically select the optimal path for SFC based on the feedback results. It also realizes the automatic deployment of paths, forming a complete closed loop. Second, we expand the protocol of SFC to realize the security SFC with branching path, which improve flexibility of security SFC. Third, we propose a deep reinforcement learning-based dynamic path selection method for security SFC. It infers the optimal branching path by analyzing feedback from the security SFC. We have experimented with Distributed Denial of Service (DDoS) attack detection modules as security service functions. Experimental results show that our proposed method can dynamically select the optimal branching path for a security SFC based on traffic features and the state of the SFC. And it improves the accuracy of the overall malicious traffic detection of the security SFC and significantly reduces the latency and overall load of the SFC. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Risky Hitchhiking, and Other Stories about the Theatre of the Eighth Day.
- Author
-
Tyszka, Juliusz
- Subjects
- *
IDEOLOGY , *CENSORSHIP , *PHILOLOGY , *MOTION pictures - Abstract
Teatr Ósmego Dnia (the Theatre of the Eighth Day), established in Poznań in 1964, was a part of Polish student theatre. Between 1976 and 1981, it became one of the most important companies in the history of the Polish theatre, producing several masterpieces. It also became a legendary grouping of democratic, anti-communist opposition. The persecution it was subjected to was caused by censorship, the secret police, and the administration at all levels. However, the members of the group managed to overcome everyday fear, face the totalitarian authorities openly, and create unforgettable artistic works. Four of them, who belonged to the group from the early 1970s, still maintain the ethical principles and artistic strategies adopted at that time, and thus now clash with the ideology of the current ruling administration, which is the right-wing Law and Justice Party. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. DZIAŁALNOŚĆ STANISŁAWA JANA ROSTWOROWSKIEGO W CHRZEŚ CIJAŃSKIM STOWARZYSZENIU SPOŁECZNYM W LATACH 1957–1974.
- Author
-
ORZEŁEK, ARIEL
- Published
- 2023
- Full Text
- View/download PDF
11. Expressing Veracity Reserve in the Secret Service Records of the Polish People's Republic and the People's Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files).
- Author
-
Mazurkiewicz-Sułkowska, Julia
- Subjects
- *
LANGUAGE services , *POLISH language , *DECEPTION - Abstract
The analysis of the language of the security service employees in the Polish People's Republic and the People's Republic of Bulgaria, made on the basis of the CHS "Bolek" and the CHS "Sabina" files, showed that there is a certain feature that appears extremely often in the examined files, even though its occurrence in administrative and legal texts should be pretty sporadic. It is a very high frequency of using forms that express the veracity reserve. This shows how much the authors of the notes wanted to emphasise their own reserve to the truthfulness of the content provided by the confidential human sources (CHS). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base.
- Author
-
Guo, Qi, Li, Man, Wang, Weilin, and Liu, Ying
- Subjects
- *
KNOWLEDGE base , *DENIAL of service attacks , *QUALITY function deployment , *INFORMATION technology security , *COMPUTER network security , *SECURITY management , *BOTNETS - Abstract
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by security services have become urgent problems to be solved. This paper combines the reasoning ability of the malicious behavior knowledge base to realize the dynamic deployment of the service function chain and dynamic configuration of the security service function. The method feeds back the information generated by the security service to the knowledge base. After the analysis of the knowledge base, the service function chain path and the security service configuration policies are generated, and these policies will be dynamically distributed to the security service function. Finally, security services can be dynamically arranged for different network traffic, realizing the coordinated use of various security services and improving the overall detection rate of the network. The experimental results show that by arranging the paths under the UDP and the TCP, the overall detection rate of the network can reach 99% and 88%, respectively, indicating that it has a good overall detection performance for multiple distributed denial of service (DDoS) attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
- Author
-
JINGLIN ZOU, DEBIAO HE, ZEADALLY, SHERALI, KUMAR, NEERAJ, HUAQUN WANG, and CHOO, KIM-KWANG RAYMOND
- Subjects
- *
BLOCKCHAINS , *CLOUD computing , *COMPUTER systems , *DISTRIBUTED databases , *DATA protection , *DATA integrity - Abstract
Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Comparedwith conventional service architectures, cloud computing introduces newsecurity challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications
- Author
-
Taurshia, Antony, Jaspher W. Kathrine, G., Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Anbar, Mohammed, editor, Abdullah, Nibras, editor, and Manickam, Selvakumar, editor
- Published
- 2021
- Full Text
- View/download PDF
15. Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment
- Author
-
Milosavljević Bogoljub
- Subjects
collecting of information ,principle of obligingness and willingness ,denial of information ,police interview ,communal militia ,police ,security service ,discretionary power ,Law - Abstract
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at the same time the authorities of communal militia are based on obligingness of giving information. The person who does not provide requested information to communal policeman is warned by fine, which is unconditional (there is no legal reason for denial of information). The very request for giving information is exclusively based on resonable presumption of the communal policeman which is based on his discretionary power. In this paper the author also points out to certain lack of solutions in the legal provisions of the Law on Police which determine the authorities of the police to collect information, as well the authorities to invite persons for police interview in order to request information which is differently set up in regard to the Law on Criminal Procedure. In the conclusion it is emphasised that regulations of the Law on Communal Militia and the Law on Police give broader discretionary power to police officers what is not in accordance with the rule of law. Also, the punishment for denial of giving information to communal militia is not in accordance with the Constitution and with fundamental human rights, as well analised examples show the obvious weakness of legal process and consitutional control of law.
- Published
- 2022
- Full Text
- View/download PDF
16. Problems of building consolidated corporation strategies for corporate information security management in the EMEA region
- Author
-
Serhii Lubenets, Igor Harchenko, and Ljudmyla Novikova
- Subjects
information technologies ,information security ,information security management ,management strategies ,consolidated management strategy ,it service ,security service ,International relations ,JZ2-6530 - Abstract
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of corporate IT services and security in different international companies in different industries and countries, are considered. specialists, experts and analysts. The subject of research in the article is the issue of optimal interaction of IT and security services in ensuring a high level of corporate information security in the EMEA region. The goal is to analyze the issues related to the construction and implementation of consolidated strategies for IT and security management in order to eliminate inconsistencies and increase the efficiency of the relevant services to ensure effective information security of organizations on the example of the EMEA region. Objectives: processing and analysis of the results of an online survey on the interaction of IT and security services of companies and organizations in various industries in different countries and regions of the world, including the EMEA region; research of problems and advantages of building a consolidated strategy of IT management and information security in the EMEA region; development of recommendations for solving existing problems in the development and construction of corporate strategies for effective IT management and information security. The general scientific method of systems analysis is used to determine the features of interaction between IT services and security of companies and organizations of different industries in different regions of the world, as well as to study the problems and benefits of a unified consolidated IT management strategy and information security. The following results were obtained: based on quantitative and qualitative assessment, as well as analysis of the results of the survey of IT and security specialists and experts in the EMEA region, the participation of companies in the development and implementation of information security strategies was determined; the main tasks of IT and security services in the organization of their joint work and coordination of actions among themselves are defined; the main obstacles in the organization of joint work of IT services and security services of companies are investigated, among which significant are tensions and conflicts between employees of services, global and regional shortage of qualified personnel, technical difficulties. Conclusions: it is established that the consolidated strategy of IT management and information security based on advances in security and technology can help solve the main problems of effective interaction of relevant company services; developed a number of recommendations to address existing problems of building corporate strategies for effective IT management and information security, designed to help eliminate inconsistencies and improve the efficiency of relevant services to ensure effective information security of organizations in the EMEA in various organizations and companies, regardless of their field of activity.
- Published
- 2021
- Full Text
- View/download PDF
17. 'A new and disturbing form of subversion': Militant Tendency, MI5 and the threat of Trotskyism in Britain, 1937-1987.
- Author
-
Kassimeris, George and Price, Oliver
- Subjects
- *
INTERNAL security , *COLD War, 1945-1991 , *CITY councils , *COMMUNIST parties - Abstract
This article examines how the rise of Militant Tendency transformed MI5's perception of Trotskyism's ability to pose a threat to the British state. Militant's emergence in the 1970s as an entryist organisation within the Labour Party and its subsequent influence on Liverpool City Council in the early 1980s led security officials to consider it as an equal if not greater subversive threat than the Communist Party of Great Britain (CPGB). Drawing on newly released files, the article adds to the understanding of counter-subversive investigations in Cold War Britain and assesses how, between the late 1970s and early 1980s, Militant became the first and, so far, only Trotskyist group to be considered by MI5 a significant subversive threat to British internal security. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files)
- Author
-
Mazurkiewicz-Sułkowska, Julia and Mazurkiewicz-Sułkowska, Julia
- Abstract
Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files) The analysis of the language of the security service employees in the Polish People’s Republic and the People’s Republic of Bulgaria, made on the basis of the CHS “Bolek” and the CHS “Sabina” files, showed that there is a certain feature that appears extremely often in the examined files, even though its occurrence in administrative and legal texts should be pretty sporadic. It is a very high frequency of using forms that express the veracity reserve. This shows how much the authors of the notes wanted to emphasise their own reserve to the truthfulness of the content provided by the confidential human sources (CHS). Wyrażanie rezerwy prawdziwościowej w aktach tajnych służb Polskiej Rzeczypospolitej Ludowej i Ludowej Republiki Bułgarii (na przykładzie akt TW Bolka i TW Sabiny) Analiza języka służb bezpieczeństwa Polskiej Republiki Ludowej i Ludowej Republiki Bułgarii przeprowadzona na podstawie tzw. teczek TW Bolek i TW Sabina wykazała, że istnieje pewna cecha, która pojawia się w obydwu dokumentach niezwykle często, mimo że w tekstach administracyjnych i prawnych jej występowanie powinno być sporadyczne. Tą cechą jest duża częstotliwość występowania form wyrażających rezerwę prawdziwościową. Pokazuje to, jak bardzo autorzy notatek chcieli podkreślić swoją rezerwę co do prawdziwości treści przekazywanych przez poufne źródła osobowe.
- Published
- 2024
19. USKRAĆIVANJE OBAVEŠTENJA SLUŽBENIM LICIMA KOMUNALNE MILICIJE, POLICIJE I SLUŽBI BEZBEDNOSTI: IZMEĐU KAŽNJIVOSTI I NEKAŽNJIVOSTI.
- Author
-
Milosavljević, Bogoljub
- Abstract
Copyright of Legal Records / Pravni Zapisi is the property of Union University Law School, Belgrade and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
20. „Rozmowa braci” – kulisy nagrania rozmowy Stanisława i Lecha Wałęsów i jej wykorzystania przez władze PRL.
- Author
-
MAJCHRZAK, GRZEGORZ
- Abstract
On 29th September 1982 Stanisław Wałęsa visited his brother Lech Wałęsa (the leader od NSZZ Solidarność) who was interneed in Arłamów. The excuse of this visit was Lech’s birthday, but the real aim was the recording of a short interview for the western media. It was very top secret. Both brothers were celebrating Lech’s 39th birthday, drinking alcohol and having a dispute. It was registered by the SB officers; what is more, it was the beginning of one of the loudest actions in the 1980s against “Solidarność” and its leader – Lech Wałęsa. The conversation itself, initially its “transcripts” and then the edited recording was used several times. The circle of recipients was also gradually expanded. For the first time, the transcript of the interview was used even before the leader of “Solidarność” was released from internment. He was introduced to the priest Alojzy Orszulik who at that time was visiting Wałęsa as the representative of the Polish Episcopate. At last on 27th September 1983, the prepared material was emitted on TVP at prime-time. It was titled Pieniądze. The entire operation did not bring the expected results – it was not possible to compromise Lech Wałęsa. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
- Author
-
M. N. Vlasenko, L. M. Kunbutayev, and S. V. Potekhetsky
- Subjects
acceptable risk ,competencies ,economic security ,enterprise ,entrepreneurship ,management ,organization ,professional training ,risk management ,risks ,security service ,threats ,training ,Sociology (General) ,HM401-1281 ,Economics as a science ,HB71-74 - Abstract
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and economic stability in the conditions of market uncertainty. It has been established that the introduction of cyclic methods of the systematic development of professional competencies of specialists of economic security must be implemented based on the results of the preliminary assessment of the internal and external environment of the enterprise, the main threats and risks posed by them. The main stages of organizing and conducting cyclical professional training have been developed, the factors contributing to the adaptation of the training system to the specifics of the enterprise have been identified, the content, essence, procedure for conducting educational and methodological activities have been described. The main restrictions and priorities in the organization and conduct of educational and methodological activities aimed at ensuring the required level of economic security of production facilities have been ascertained. The list of current and prospective tasks that need to be solved during the implementation of training activities has been defined.
- Published
- 2020
- Full Text
- View/download PDF
22. Technical requirements framework of hospital information systems: design and evaluation
- Author
-
Mehrdad Farzandipour, Zahra Meidani, Ehsan Nabovati, Monireh Sadeqi Jabali, and Razieh Dehghan Banadaki
- Subjects
Technical requirements ,Hospital information system ,Communication service ,System architecture ,Security service ,System response time ,Computer applications to medicine. Medical informatics ,R858-859.7 - Abstract
Abstract Background Implementing the health information system (HIS) is more complex and costly than implementing other information systems. The present study was conducted to design and evaluate technical requirements for the HIS. Methods The present study was conducted in 2016 by determining technical requirements for the HIS using the Delphi technique and then evaluating this system using a checklist based on the approved requirements. Results The first part of the study designed a 73-item final list of technical requirements for the HIS in four domains, i.e. communication service, system architecture, security service and system response time. The evaluation results obtained in the second part showed that communication service was met in 63.8% of the HIS programs, system architecture in 65.5%, security service in 72.4% and system response time in 76.3%. Conclusions A technical evaluation tool was designed and used to select and evaluate the HIS. The evaluation results suggested the study HIS was poorer in terms of communication service and system architecture than in the other two dimensions.
- Published
- 2020
- Full Text
- View/download PDF
23. Selection of Candidates for Positions in Higher Education Institution from the Standpoint of Their Potential Loyalty to Employer
- Author
-
A. R. Alaverdov and T. P. Alaverdova
- Subjects
human security of university ,recruitment procedure ,staff loyalty staff ,selection of candidates ,negative personality traits ,dangerous psychological types ,security service ,personnel management ,Education - Abstract
The article focuses on the personal characteristics of candidates for employment in higher education institutions. The presence of a number of features in a candidate, with high probability, determines their potential disloyalty to any employer in the system of higher education. The authors explore the personal qualities, psychological types, habits and inclinations of lecturers, as well as other employees of University, which can provoke various threats to its reputation, information and property security. The article makes the case for using special HR-technologies as a necessary element of the recruitment procedure in modern University. HR-technologies such as stress interview questions, 16PF Questionnaire, Questionnaire of K. Leonhard - S. Shmishek, Eysenck Personality Questionnaire, State-Trait Anxiety Inventory, Buss-Durkey Inventory and others make it possible to identify the above negative qualities and, thus, to prevent most of possible threats to the personnel security of higher education institution. The article formulates the practice-oriented recommendations on the solution ofthe considered problem.
- Published
- 2020
- Full Text
- View/download PDF
24. PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction
- Author
-
Marwa A. Elsayed and Mohammad Zulkernine
- Subjects
Anomaly detection ,deep learning ,graph analytics ,security service ,log analysis ,security analytics ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum. Such applications have remarkable benefits for big data processing, making it easy, fast, scalable, and cost-effective; albeit, they pose many security risks. Security breaches causing anomalous activities due to malicious, vulnerable, or misconfigured analytic applications are considered the top security risks to big “sensitive” data. The risk is further expanded from the coupling of data analytics with the Cloud. Towards maintaining secure and trustworthy applications, effective anomaly detection and prediction become crucial tasks to be offered by Cloud providers. This paper presents, PredictDeep, a novel security analytics framework for anomaly detection and prediction. The proposed framework leverages log data collected from monitoring systems with graph analytics and deep learning techniques to add intelligence for detecting and predicting known and unknown patterns of security anomalies. It represents the collected data and transforms them into a graph model. The graph model captures the analytical activities as well as their interrelation. In this sense, such a model provides informed insight of the monitored application, understanding its behavior, and revealing anomalous patterns. Different from existing traditional rule-based machine learning and statistics-based approaches, our solution takes the benefits of incorporating not only available node attributes but also graph structure and context information to extract rich features that boost the anomaly classification and prediction. We leverage graph embeddings to represent the nodes and relationships in the graph model as feature vectors to learn and predict anomalies in an inductive way utilizing recent advanced deep graph neural network techniques. This design augments our solution with robustness and computational efficiency. Extensive experiments are conducted over an open-source Hadoop log dataset. The evaluation results demonstrate that PredictDeep is a viable solution and very effective.
- Published
- 2020
- Full Text
- View/download PDF
25. The Basics of Manageability and Projecting of Management Structures in the System of Economic Security of Enterprise
- Author
-
Bogdanov Roman I.
- Subjects
economic security of enterprise ,system ,management structure ,security service ,projecting ,Business ,HF5001-6182 - Abstract
The article set up a problem of the need to combine the ideology of approaches to ensuring the economic security of enterprise with its properties as a management object, which should become the basis of projecting management structures in the system of economic security of enterprise. The theoretical base for this is to define the principles of economic security manageability as a subject of management in the economic security system of enterprise. The results of theoretical study define that the concept of «management structure» explains an aggregate of elements, the internal structure of which is more important than contensive characteristics. The management structure is an invariant kind of a control structure element that is responsible for the implementation of managerial functions in a particular process. The basic management structure of the enterprise’s economic security system is the economic security service, which implements an aggregate of security functions. The service acts as an object for determining the principles of economic security management and an object for organizational projecting. The direction of solving the scientific problem is to define the fundamental properties and signs of manageability of the economic security of enterprise in the appropriate security system, which becomes an ontological and axiological basis for projecting management structures in this system. The structure of management in the economic security system of enterprise is characterized by many difficult-to-formalize qualities (powers of employees, their responsibility, relationships between them, etc.). Projecting an economic security service is recommended according to the principle of functional distribution of interrelations to ensure economic security, the nature of which within the service is determined by the specifics of the operation of the enterprise. A promising direction of research is projecting the management structures in the economic security system of enterprise, taking into account the formation of institutional relations between of the security service and the external environment.
- Published
- 2020
- Full Text
- View/download PDF
26. A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
- Author
-
Qi Guo, Man Li, Weilin Wang, and Ying Liu
- Subjects
malicious behavior knowledge base ,service function chain ,security service ,attack detection ,Chemical technology ,TP1-1185 - Abstract
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by security services have become urgent problems to be solved. This paper combines the reasoning ability of the malicious behavior knowledge base to realize the dynamic deployment of the service function chain and dynamic configuration of the security service function. The method feeds back the information generated by the security service to the knowledge base. After the analysis of the knowledge base, the service function chain path and the security service configuration policies are generated, and these policies will be dynamically distributed to the security service function. Finally, security services can be dynamically arranged for different network traffic, realizing the coordinated use of various security services and improving the overall detection rate of the network. The experimental results show that by arranging the paths under the UDP and the TCP, the overall detection rate of the network can reach 99% and 88%, respectively, indicating that it has a good overall detection performance for multiple distributed denial of service (DDoS) attacks.
- Published
- 2022
- Full Text
- View/download PDF
27. Security service in the central Asian routes of the Great Silk road
- Author
-
Mavlanov, Uktam
- Published
- 2018
28. Протиборство спецслужб закордонних центрів ОУН із КДБ (1960-ті - початок 1990-х рр.)
- Author
-
АНТОНЮК, Ярослав and ТРОФИМОВИЧ, Володимир
- Subjects
OLYMPIC Games ,PROTEST movements ,SPORTS competitions ,UNPUBLISHED materials ,UKRAINIANS ,PUBLIC demonstrations ,DIASPORA - Abstract
The aim of the study is to cover the confrontation between the special units of foreign centers of the OUN and the KGB in the 1960s - early 1990s. The methodological basis of the study was the principles of scientific objectivity and historicism. The following general historical methods are used: historical-comparative, retrospective, problematic, structural. The scientific novelty of the obtained results is determined by the fact that, having introduced into scientific circulation a significant number of unpublished archival documents and materials stored in the Sectoral State Archive of Security Service of Ukraine, we discovered the activities of the special services of the OUN foreign centers which were aimed at resisting the provocations organized by state security bodies of UkrSSR and their support for the dissident movement in the republic in that period of time. Summary. Beginning in the 1960-s, the activities of the Security services of the OUN foreign units took place in close cooperation, primarily with the Regional Communications Office, the Ukrainian Youth Union, and the Anti-Bolshevik Bloc of Nations. During the period under review, the foreign OUN units faced the intensification of provocations organized by the state security bodies of the Ukrainian SSR, the purpose of which was to demoralize and split the diaspora. In an attempt to counter ideological sabotage, the esbists not only published a rebuttal in their press by thoroughly investigating each provocation and informing other OUN centers abroad about the results, but also carried out ideological subversive operations against the Soviet regime. Various international events, sports competitions, first of all, the Olympic Games became a convenient platform for the latter. The complex and lengthy KGB operational games caused significant damage to the OUN foreign centers. At the same time, the SB conducted their own operational games, relying on the support of the Ukrainian diaspora. Most OUN centers moved away from their radical slogans and focused on supporting dissidents in the UkrSSR, who were provided with various assistance. In the late 1980-s, the special services of the OUN foreign centers concentrated their efforts on supporting the mass protest movement in the republic. After Ukraine gained its independence, their leaders finally legalized their activity and further engaged in literary, scientific and social activities. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. IMPACT OF THE ECONOMIC FACTOR TO VERIFY THE ALARM IN TERMS OF ECOLOGY IN THE SELECTED REGION.
- Author
-
Boroš, Martin and Zvaková, Zuzana
- Subjects
- *
ECONOMIC impact , *ENERGY consumption , *EMPLOYEE services , *RESTRAINING orders , *ALARMS - Abstract
Alarm systems are designed to protect life, health and property. These systems have been used more and more frequently in recent years, and together with them, protection through the connection of the building and a monitoring center are also used. The purpose of the connection is additional protection in order to verify the indicated alarm by the employees of the security service. This verification must be performed for each indicated for which the owner is not in the building. According to the Act of the Slovak Republic No. 473/2005 Coll. it must be checked by the required number of staff who may use more than one means of transport. The aim of the paper will be, based on the real situation, to express the economic and ecological difference in the use of cars and motorcycles to move from the workplace of the security service to the protected object. The real situation will take place in a selected region, specifically the city of Zilina, where we have a monitoring center within the scientific equipment of the University of Zilina. The building of the Faculty of Security Engineering, which is remote from the monitoring center and can be reached by several routes, will be considered a protected object. All possible routes will be examined to determine the fuel consumption of a passenger car and motorcycle. Determining the consumption of fuel needed to move between the objects is necessary to express the financial aspect, i.e. which method is more advantageous for society. But also, the ecological factor, as we will be able to express the value of generated emissions for individual routes. Subsequently, we will determine the best route from an economic as well as an ecological point of view. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
30. Standardization – ensuring quality and efficiency
- Author
-
von Faber, Eberhard, Behnsen, Wolfgang, von Faber, Eberhard, and Behnsen, Wolfgang
- Published
- 2017
- Full Text
- View/download PDF
31. Securities Services: Settlement, Custody and Financing
- Author
-
Robert-Nicoud, Marc, Francioni, Reto, editor, and Schwartz, Robert A., editor
- Published
- 2017
- Full Text
- View/download PDF
32. ACTIVITY OF SECURITY SERVICE OF THE PEOPLE'S REPUBLIC OF POLAND AGAINST THE POLISH PEASANT PARTY IN FRANCE IN YEARS 1948-1966.
- Author
-
INDRASZCZYK, ARKADIUSZ
- Subjects
SURVEILLANCE detection ,EMIGRATION & immigration ,SECURITIES ,POLITICIANS - Abstract
Copyright of Studia Polonijne is the property of Towarzystwo Naukowe Katolickiego Uniwersytetu Lubelskiego Jana Pawla II and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
33. Sekret tajnej policji. Funkcjonariusze Służby Bezpieczeństwa wobec religii i Kościoła.
- Author
-
DĄBEK, KRZYSZTOF
- Abstract
Copyright of Societas / Communitas is the property of University of Warsaw and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
34. The 'Premature Anti-fascists'? International Brigade Veterans' Participation in the British War Effort, 1939–45.
- Author
-
Raeburn, Fraser
- Subjects
- *
SPANISH Civil War, 1936-1939 , *FASCISM , *DISCRIMINATION (Sociology) , *VETERANS - Abstract
After fighting in the International Brigades during the Spanish Civil War of 1936–9, hundreds of Britons returned home to an uncertain future. While the anti-fascist left saw them as heroes, their Communist Party links met with official suspicion, complicated further by the advent of war in September 1939. Popular and scholarly narratives alike have concurred that International Brigade veterans were barred en masse from the armed forces, despite their experience and demonstrable hatred for fascism. This article complicates these narratives, exploring the extent and causes of discrimination, and placing these within the context of wartime anti-communist policy. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. Technical requirements framework of hospital information systems: design and evaluation.
- Author
-
Farzandipour, Mehrdad, Meidani, Zahra, Nabovati, Ehsan, Sadeqi Jabali, Monireh, and Dehghan Banadaki, Razieh
- Subjects
- *
INFORMATION design , *INFORMATION storage & retrieval systems , *HOSPITALS , *DELPHI method , *RESEARCH , *RESEARCH methodology , *EVALUATION research , *MEDICAL cooperation , *COMPARATIVE studies ,HOSPITAL information systems - Abstract
Background: Implementing the health information system (HIS) is more complex and costly than implementing other information systems. The present study was conducted to design and evaluate technical requirements for the HIS.Methods: The present study was conducted in 2016 by determining technical requirements for the HIS using the Delphi technique and then evaluating this system using a checklist based on the approved requirements.Results: The first part of the study designed a 73-item final list of technical requirements for the HIS in four domains, i.e. communication service, system architecture, security service and system response time. The evaluation results obtained in the second part showed that communication service was met in 63.8% of the HIS programs, system architecture in 65.5%, security service in 72.4% and system response time in 76.3%.Conclusions: A technical evaluation tool was designed and used to select and evaluate the HIS. The evaluation results suggested the study HIS was poorer in terms of communication service and system architecture than in the other two dimensions. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
36. "The Cat's Paw of Dictatorship": Police Intelligence and Self-Rule in the Gold Coast, 1948–1952.
- Author
-
Arnold, Chase
- Subjects
- *
FOOT , *COASTS , *DICTATORSHIP , *POLICE , *POLITICAL party leadership - Abstract
In 1948, British authorities in the Gold Coast implemented a series of security reforms aimed at resisting future disruptions resulting from growing discontent with colonial rule. These reforms included the formation of a police intelligence organization, developed in collaboration with the British Security Service. This expansion of the colonial state into intelligence work preceded its first steps toward self-rule, inadvertently making this intelligence program an unintended participant in the process of decolonization. This article examines the foundations of that intelligence network and how it resisted the political exigencies required by the Gold Coast's entry into diarchy. It explains how British officials arrived at the conclusion that a West African colony required a modern, intelligence-gathering apparatus under the oversight of the British Security Service and how that security system was used to challenge the realization of an independent Ghanaian state under the leadership of Kwame Nkrumah. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. Model zmiany cywilnych służb specjalnych w Polsce w latach 1989-1990. Powstanie Urzędu Ochrony Państwa.
- Author
-
Krzysztofiński, Mariusz
- Subjects
CIVIL service ,SPECIAL functions ,DICTATORSHIP ,OFFICES ,INTELLIGENCE service - Abstract
Copyright of Przeglad Sejmowy is the property of Kancelaria Sejmu and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
38. Ogólnopolskie Forum Literackie w 1979 roku jako przykład infiltracji środowisk literackich w PRL.
- Author
-
GROSS, RADOSŁAW
- Abstract
Copyright of Annales Universitatis Mariae Curie-Skłodowska, Sectio F: Historia is the property of Maria Curie-Sklodowska University in Lublin and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
39. Surveillance of the Sandomierz diocese clergy in the light of a document of the Kielce Voivodeship Police Headquarters of 6 October 1961.
- Author
-
Piotr Tylec
- Subjects
Security Service ,Sandomierz diocese ,surveillance of the clergy ,repression of the Curch ,History (General) and history of Europe ,Fine Arts - Abstract
This source edition presents a document created by the officers of the Security Service at the Voivodeship Police Headquarters in Kielce in October 1961, containing information on the clergy of the Sandomierz diocese. It was kept as part of a case file entitled “Wisła” (surveillance of the diocesan curia and the seminary in Sandomierz). The document is a typical example of “counter-intelligence features of a case.” In addition, it contains a directional operational plan of undertakings”. An analysis of the source allows us to determine the scale of surveillance to which the priests of the diocese were subjected. The present edition of the document contains a number of footnotes, which explain the more difficult formulations used by security officers, briefly approximate the figures of the priests named in it and elaborate on the state/Church relations in the Polish People’s Republic.
- Published
- 2017
- Full Text
- View/download PDF
40. Terrorism
- Author
-
Bjørgo, Tore and Bjørgo, Tore
- Published
- 2016
- Full Text
- View/download PDF
41. International Efforts to Regulate the Activities of Private Military and Security Companies and Their Personnel
- Author
-
Janaby, Mohamad Ghazi and Janaby, Mohamad Ghazi
- Published
- 2016
- Full Text
- View/download PDF
42. General Conclusion
- Author
-
Janaby, Mohamad Ghazi and Janaby, Mohamad Ghazi
- Published
- 2016
- Full Text
- View/download PDF
43. Introduction
- Author
-
Janaby, Mohamad Ghazi and Janaby, Mohamad Ghazi
- Published
- 2016
- Full Text
- View/download PDF
44. The UK State, Protest and Terrorism
- Author
-
Joyce, Peter and Joyce, Peter
- Published
- 2016
- Full Text
- View/download PDF
45. НОРМАТИВНО-ПРАВОВЕ РЕГУЛЮВАННЯ ДІЯЛЬНОСТІ СЛУЖБИ ЗАБЕЗПЕЧЕННЯ ПАЛЬНО-МАСТИЛЬНИМИ МАТЕРІАЛАМИ: АНАЛІЗ ПРОБЛЕМНИХ ПИТАНЬ ТА ПРОПОЗИЦІЇ ЩОДО ЇХ ВИРІШЕННЯ
- Subjects
нормативно-правове регулювання ,rear support ,тилове забезпечення ,security service ,служба забезпечення ,regulatory and legal regulation ,посадові обов’язки ,job responsibilities ,fuel and lubricants ,пально-мастильні матеріали - Abstract
The article is devoted to the analysis of the state of regulatory and legal regulation of the activity of the fuel and lubricant supply service of the State Border Guard Service of Ukraine. The official duties of the officials of the fuel and lubricant supply service are determined by the Statutes of the Armed Forces of Ukraine, the order of the Administration of the State Border Guard Service of Ukraine dated June 24, 2008 No. 544 "On the approval of the Guidelines on the provision of fuel to the bodies of the State Border Guard Service of Ukraine", as well as the order of the Administration of the State Border Guard Service of Ukraine of the Border Service of Ukraine dated December 21, 2020 No. 134 "On the approval of the Advisor on military (ship) management of the State Border Service of Ukraine." The review of the regulatory legal support of the fuel and lubricant supply service of the State Border Guard Service of Ukraine made it possible to establish that the duties of the officials of the fuel and lubricant supply service include tasks related to: monitoring the quality and proper use of fuel, planning the necessary efficiency measures and feasibility of using and saving fuel; organization of maintenance, improvement and operation of fuel warehouses, filling stations and other subordinate fuel service facilities in accordance with current regulatory documents; ensuring proper use, maintenance and storage of technical means; organization and maintenance of accounting and reporting on fuel service; collection, delivery and proper use of spent oil products, etc. The procedure for performing these tasks must be regulated by relevant departmental acts. At the same time, the governing documents of the State Border Service of Ukraine and the Ministry of Internal Affairs of Ukraine do not define the procedure for performing the specified tasks. According to the authors, it is the task that regulates the order and conditions of storage of fuel and lubricant materials, special liquids at fuel warehouses and filling stations; tasks of fuel quality control; maintenance of technical means of the fuel and lubricant supply service are fundamentally important for the high-quality organization of the activities of state border protection units and must be regulated for the high-quality performance of official duties by officials of the State Border Service of Ukraine, who are assigned the tasks of organizing and managing the military (ship) economy., У статті проаналізовано стан нормативно-правового регулювання діяльності служби забезпечення пально-мастильними матеріалами Державної прикордонної служби України. У обов’язках посадових ос іб служби визначені завдання: щодо контролю за якістю і належним використанням пального; планування заходів з ефективності й доцільності використання та економії пального; утримання, удосконалення та експлуатації складів пального, пунктів заправлення та інших об’єктів служби пального; належного використання, обслуговування та зберігання технічних засобів; організації, обліку і звітності у службі; збирання, здавання і належного використання відпрацьованих нафтопродуктів тощо. Але керівними документами Державної прикордонної служби України та Міністерства внутрішніх справ України не визначений порядок виконання зазначених завдань. На думку авторів, саме завдання, що регламентують порядок та умови зберігання пально-мастильних матеріалів, спеціальних рідин на складах пального та пунктах заправлення; завдання контролю якості пального; обслуговування технічних засобів служби забезпечення пально-мастильних матеріалів принципово важливі для організації діяльності підрозділів охорони державного кордону та повинні бути врегульовані.
- Published
- 2023
46. Towards the Dynamic Provision of Virtualized Security Services
- Author
-
Basile, Cataldo, Pitscheider, Christian, Risso, Fulvio, Valenza, Fulvio, Vallini, Marco, Diniz Junqueira Barbosa, Simone, Series editor, Chen, Phoebe, Series editor, Filipe, Joaquim, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Cleary, Frances, editor, and Felici, Massimo, editor
- Published
- 2015
- Full Text
- View/download PDF
47. Concluding Remarks
- Author
-
Bureš, Oldřich and Bureš, Oldřich
- Published
- 2015
- Full Text
- View/download PDF
48. Limits and Opportunities of Further Privatization of Security
- Author
-
Bureš, Oldřich and Bureš, Oldřich
- Published
- 2015
- Full Text
- View/download PDF
49. Transforming Politics
- Author
-
Bureš, Oldřich and Bureš, Oldřich
- Published
- 2015
- Full Text
- View/download PDF
50. Private Security Assemblage(s) and Powers of Private Security Companies
- Author
-
Bureš, Oldřich and Bureš, Oldřich
- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.