security breach
Recently Published Documents


TOTAL DOCUMENTS

104
(FIVE YEARS 30)

H-INDEX

9
(FIVE YEARS 2)

Author(s):  
V.M. Antropov

First attempts to use technical guard means were triggered by the need to prevent property encroachment. The easiest way to detect and locate lawbreakers was to place various objects in their way that would signal of their movements. With the advance of electronic technology special security breach devices appeared, as well as security alarm systems. Wide use of technical means allows to remove or minimize the adverse impact of a man — the most unreliable and invincible link in any security system. Since its formation in 1952, the Extradepartmental Guards has been employing technical means for facility protection based on such elements of electronic technology as diodes and transistors, followed by automated systems of central surveillance. Starting from the 2000s, microtechnology and cellular-based radio-communication guard systems have been used by the Extradepartmental Guards for facility protection. Extradepartmental Guards units run by the internal affairs authorities in the Altai Territory have been employing technical means since the end of the 1950s. Back then, when their use was launched, only some major departments had central surveillance systems operating. Later on technical means started to be used in all departments. Their use significantly increases the reliability of property protection and helps to reduce the number of thefts from facilities guarded by Extradepartmental Guards.


2021 ◽  
pp. 182-186
Author(s):  
Мирослава Юріївна Якимчук

У статті розглянуто основні аспекти правового регулювання кіберзлочинності в націо- нальному праві через призму міжнародного. Проаналізовано визначення поняття «кіберз- лочинність», його історичний розвиток. Дослідження наукових студій дало змогу уточнити визначення поняття «міжнародна кіберзлочинність», яке ми будемо розуміти як протиправну поведінку міжнародного значення, яка здійснена за допомогою комп’ютерної техніки задля несанкціонованого отримання інформації. У статті згадано і проаналізовано резонансний приклад кібератаки, якого названо вірусом «Petya». У сучасному світі країни розробляють нові методи боротьби з такими злочинами, зокрема зазначено, що США сформувала так звані «NIST Cyber security Framework» – стандарти з безпеки, які дозволяють виявляти, реагувати і навіть запобігати кіберзлочинам; Каліфорнія випустила Акт про повідомлення щодо порушення правил безпеки «Notice of Security Breach Act», згідно з яким компанії мають право вільно вибрати для себе спосіб забезпечення приватності своїх систем; Євро- пейський Союз прийняв Директиву щодо мережевої та інформаційної безпеки «NIS Directive on security of network and information systems», що визначив важливе значення надійності й безпеки мережевих та інформаційних систем для економічної та суспільної діяльності; Україна створила підрозділ «CERT-UA», який у межах своїх повноважень проводить аналіз та накопичення даних про кіберінциденти, веде державний їх реєстр. Узагальнюючи все проаналізоване вище, ми зробили висновки, що в сучасному світі існує багато видів кіберз- лочинів: комп’ютерне шпигування, поширювання комп’ютерних вірусів, інтернет-шахрай- ство, дефейс, кібертероризм тощо – ці злочини можуть мати більш масштабний об’єм і загро- жувати міждержавній безпеці. У статті згадано і виокремлено умовні групи злочинів проти приватності, цілісності інформаційних даних, за Конвенцією про кіберзлочинність. Аналіз наукової літератури дав можливість констатувати, що кіберзлочинність дійсно є актуальною проблемою сучасності, проте світове співтовариство спрямувало свої сили на її розв’язання через прийняття відповідних документів.


2021 ◽  
Author(s):  
Lindsay Sterle ◽  
Suman Bhunia
Keyword(s):  

Author(s):  
Abhishek Arote ◽  
Umakant Mandawkar

IT Security is a major concern of the internet as almost all communication takes place over the internet today. The purpose of penetration testing is to ensure that the system and network do not have a security breach that could allow unauthorized access to the system and network. A possible and appropriate way to prevent system and network hacking is penetration testing. The document outlines some basic concepts of penetration testing, evaluating existing tools and exploits, and using the Metasploit framework for penetration testing and running exploits within the framework and tools.


2021 ◽  
Author(s):  
Hung‐Chung Su ◽  
M. Johnny Rungtusanatham ◽  
Kevin Linderman

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Suparak Janjarasjit ◽  
Siew H. Chan

Purpose The purpose of this study is to examine whether users’ perceived moral affect explains the effect of perceived intensity of emotional distress on responsibility judgment of a perpetrator and company, respectively, in an ill and good intention breach. Design/methodology/approach Participants completed a questionnaire containing items measuring their perceived intensity of emotional distress, perceived moral affect and responsibility judgment of a perpetrator and company, respectively. Findings The results support the mediating hypothesis on responsibility judgment of a perpetrator regardless of intention. The mediating hypothesis is also supported in an ill intention breach in responsibility judgment of a company. However, the mediating effect is not observed in a good intention breach when users assess a company’s responsibility. Originality/value The findings support the notion that users use the consequentialism approach when assessing a perpetrator’s responsibility because they focus on the victims’ emotional distress and discount a perpetrator’s intent, resulting in similar mediating effect of perceived moral affect in an ill and good intention breach. The results also indicate that perceived moral affect increases the negative effect of perceived intensity of emotional distress on responsibility judgment of a company, suggesting that users may exhibit empathetic feelings toward a company and perceive it as a victim of an ill intention breach. The lack of mediating effect in responsibility judgment of a company in a good intention breach may be attributed to the diminished effect of a perpetrator’s feelings of regret, sorrow, guilt and shame for causing emotional distress to the victims.


Author(s):  
Tawei Wang ◽  
Yen-Yao Wang ◽  
Ju-Chun Yen

This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of information transfer exhibits consistent patterns across time and with different types of information security breaches. Finally, the effect does not depend on whether the firms are IT intensive. Implications, limitations, and future research are discussed.


2021 ◽  
Vol 20 (2) ◽  
pp. 5-15
Author(s):  
Adam Malatinský ◽  
◽  
Luděk Lukáš

The article deals with proactive ways of fire protection of soft target objects. The first chapter deals with the general characteristics and description of a soft target object. The next chapter focuses on the characteristics and description of a proactive security breach model. The article then characterizes the analysis of fire protection measures. The subsequent chapter deals with proactive methods of fire protection, where the operation of activities in fire protection is divided into several phases. The final chapter focuses on the design and application of specific proactive methods of providing fire protection for a soft target object. Specifically, it is a shopping centre building, where several types of proactive activities are proposed to improve the effectiveness of minimizing the risk of threats in fire protection.


Sign in / Sign up

Export Citation Format

Share Document