Reference:
Nikitin P.V., Gorokhova R.I..
Analysis of modern intelligent methods for protecting critical information infrastructure
// Security Issues.
2024. № 3.
P. 14-38.
DOI: 10.7256/2409-7543.2024.3.69980 EDN: EXGKAV URL: https://en.nbpublish.com/library_read_article.php?id=69980
Read the article
First Peer Review:
Second Peer Review:
Third Peer Review:
|
EDN: EXGKAV
|
Abstract:
Critical information infrastructure (CII), including the financial sector, plays a key role in ensuring the sustainable functioning of economic systems and the financial stability of States. However, the growing digitalization of the financial industry and the introduction of innovative technologies are opening up new attack vectors for attackers. Modern cyber attacks are becoming more sophisticated, and traditional defenses are proving ineffective against new, previously unknown threats. There is an urgent need for more flexible and intelligent cybersecurity systems. Thus, the subject of the study is modern intelligent methods and technologies for protecting critical information infrastructure (CII) from cyber attacks. The object of the research is methods and means of ensuring the protection of critical information infrastructure using artificial intelligence and machine learning technologies. The methodological basis of this study is a comprehensive analysis of the scientific literature on the use of intelligent methods and technologies to protect critical information infrastructure. During the review and critical analysis of relevant scientific publications, key problems and unresolved tasks requiring further scientific research and practical developments in this subject area were identified. This methodological approach allowed us to form a holistic view of the current state and prospects for the development of intelligent cybersecurity tools for critical financial systems, as well as to identify priority areas for further research. The main directions of scientific novelty of this research are: 1. A detailed review of promising approaches based on artificial intelligence and machine learning technologies to ensure effective protection of CII organizations from modern complex cyber attacks. 2. Identification and analysis of a number of key scientific and technical problems that need to be solved to increase reliability, interpretability and trust in intelligent cybersecurity systems, including issues of robustness to attacks, active online learning, federated and differential private data processing. 3. Identification of promising areas for further research and development in the field of application of specialized methods of secure and trusted AI to protect critical financial infrastructure. Thus, this research makes a significant contribution to the development of scientific and methodological apparatus and practical solutions for the use of intelligent methods to ensure cybersecurity.
Keywords:
DDoS attacks, intelligent methods, neural networks, cyber attacks, cybersecurity, deep learning, machine learning, information security, artificial intelligence, Critical information infrastructure
Reference:
Nikolaev N.V., Il'in V.V., Nekrasov M.I..
Topical issues of countering modern autonomous unmanned aerial vehicles and FPV drones
// Security Issues.
2024. № 1.
P. 40-60.
DOI: 10.25136/2409-7543.2024.1.68860 EDN: TNFGJG URL: https://en.nbpublish.com/library_read_article.php?id=68860
Abstract:
The high level of development of unmanned aviation has predetermined the possibility of its use to solve a wide range of tasks. At the same time, it should be noted that achievements in this area are not always used for peaceful purposes. The results of the analysis of the practice of using unmanned aerial vehicles (UAVs) in modern military conflicts and information about terrorist acts with their use allow us to conclude that the most difficult targets resistant to various methods of influence are modern autonomous UAVs and FPV drones with explosive devices. Therefore, the search for effective ways to counteract them seems to be an urgent area of research. The aim of the work is to develop the means for effective counteraction to modern autonomous UAVs and FPV drones by electromagnetic, laser and mechanical ways. The methods of system analysis are used in the work. The article notes the increasing level of threats associated with the mass use of autonomous UAVs and FPV drones, presents the results of the "revision" and critical analysis of the main methods of countering modern UAVs, reflecting their characteristics, advantages and disadvantages. Based on the results obtained, a comparative analysis of methods of countering autonomous UAVs and FPV drones was carried out. It is concluded that the most effective of them are the methods of electromagnetic, laser and mechanical action. The required parameters for the effective application of these types of impacts on modern autonomous UAVs and FPV drones are presented. The results of the research can be used as initial data for the creation of new and improvement of existing means of countering UAVs as part of physical protection systems (SFZ). The scientific novelty of the work consists in the development of a scientific and methodological apparatus for substantiating the SFZ of objects in terms of taking into account the functioning features and vulnerabilities of modern autonomous UAVs and FPV drones, as well as determining ways to improve systems to counter them based on the use of electromagnetic, laser and mechanical means.
Keywords:
UAV, autonomous UAV, FPV drones, UAV counteraction methods, electromagnetic impact, laser impact, mechanical impact, unmanned aerial vehicle, physical protection systems, Security threats
Reference:
Camara A..
The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems
// Security Issues.
2024. № 1.
P. 61-70.
DOI: 10.25136/2409-7543.2024.1.69882 EDN: TMESCK URL: https://en.nbpublish.com/library_read_article.php?id=69882
Abstract:
The research delves into the influence of machine learning and artificial intelligence advancements on cybersecurity within software-oriented systems. The author thoroughly examines the modeling of cognitive-information technologies and their ramifications on data analysis, training processes, and decision-making within these systems. Special emphasis is placed on identifying cybersecurity threats faced by artificial intelligence systems, such as susceptibility to cyberattacks. The study proposes adaptive defense components, including behavioral biometrics analysis, automated incident response, user and entity behavior analytics (UEBA), and vulnerability management, to address these threats. These components are underscored in the development of cybersecurity strategies in the contemporary digital environment, crucial for protecting sensitive data and infrastructure. Methodologically, the research involves analyzing existing cybersecurity threats and their impact on artificial intelligence systems, employing data analytics and modeling techniques tailored to information technologies. It also evaluates contemporary methods of adaptive cybersecurity. Key findings of the study not only identify cybersecurity threats to artificial intelligence systems but also propose adaptive defense components for effective mitigation. The research innovatively examines the influence of cognitive information technologies on cybersecurity strategies, offering novel approaches to safeguard data and infrastructure in the modern digital landscape. Additionally, the study highlights examples such as Natural Language Processing (NLP), image and video recognition, predictive analytics, and virtual assistants, which are integral to understanding the breadth of applications of artificial intelligence in cybersecurity. The author significantly contributes through a systematic analysis of diverse threats, culminating in comprehensive recommendations for cybersecurity. Furthermore, the study identifies future prospects for cybersecurity amidst evolving cyber threats, paving the way for further research and development in the field and enhancing understanding and ensuring security in the digital realm.
Keywords:
Computer Security, Vulnerabilities, Machine Learning, Artificial Intelligence, Adaptive Defense Systems, Threat Detection, Cybersecurity, Cognitive-Information Technologies, Threat Analysis, Behavioral Biometrics
Reference:
Perelygin I..
Analysis of software products and the study of automation of processes in the field of monitoring purchases and goods.
// Security Issues.
2024. № 1.
P. 71-87.
DOI: 10.25136/2409-7543.2024.1.69887 EDN: VLWPDM URL: https://en.nbpublish.com/library_read_article.php?id=69887
Abstract:
The subject of this report is a comparative analysis of software products and a study of business processes in the field of optimization of purchases and monitoring of goods. Within the framework of this study, the following tasks were set: the study of existing software solutions for optimizing procurement processes, the analysis of their functionality and effectiveness, as well as the study of business processes of companies in the field of monitoring goods. As a result of this research, an analysis of various software products was carried out, their advantages and disadvantages were identified, as well as current business processes were analyzed and opportunities and potential for optimization were identified. The obtained results and conclusions can be used to develop recommendations for improving procurement processes and monitoring of goods in organizations. In this study, a comparative analysis of software solutions for automating procurement processes is carried out. The research methodology included an analysis of the functionality, effectiveness and cost of the programs, as well as the study of user feedback and industry experts. The results made it possible to identify the main advantages and disadvantages of each software considered. The study of the main characteristics and functionality of procurement management systems represents a significant contribution to the field of information technology and business process management. An analysis of the comparative characteristics of ERM systems, their integration capabilities and compliance with business needs allows us to identify key factors for successful automation of procurement processes. This study not only expands scientific understanding in the field of procurement automation, but also provides practical recommendations for choosing the optimal procurement management system. The conclusions of the work emphasize the importance of customizing the software to the unique needs of the organization in order to achieve optimal efficiency and effectiveness in procurement management. The comparison table of the disadvantages of ERM systems presented in the final part by key parameters allows you to highlight the main advantages and disadvantages of each software product, which is an important step in choosing the most appropriate solution for a particular business. Thus, this study not only contributes to the development of scientific knowledge in the field of procurement management, but also provides valuable practical recommendations for the business community, helping to increase the efficiency and effectiveness of procurement processes in a modern business environment.
Keywords:
flexibility, adaptation, modularity, ERM-system, optimization, integration, business-process, monitoring, procurements, automatization
Reference:
Il'in V.V., Nikolaev N.V., Nekrasov M.I., Sokolov A.M..
An Approach to Evaluating the Effectiveness of Systems for Countering Robotic Complexes at Important Facilities
// Security Issues.
2023. № 4.
P. 15-26.
DOI: 10.25136/2409-7543.2023.4.39479 EDN: WKOLMA URL: https://en.nbpublish.com/library_read_article.php?id=39479
Abstract:
The subject of the study is a scientific and methodological apparatus for evaluating the effectiveness of systems for countering robotic complexes. The object of research is a scientific and methodological apparatus for analyzing systems for countering robotic complexes at important facilities. The aim of the work is to develop a scientific and methodological apparatus for evaluating the effectiveness of systems for countering robotic complexes at important facilities in the direction of taking into account their structure, spatial configuration, as well as the synergetic effect of the joint use of heterogeneous technical means as part of the system. In order to achieve the research goal, the general logical-probabilistic modeling method and the tools of modern geoinformation systems are comprehensively applied in the work. The article proposes a new approach to evaluating the effectiveness of spatially distributed multi-bridge systems for countering robotic complexes. The results obtained can be used by interested organizations to evaluate the effectiveness of variants of such systems and identify their vulnerabilities. The scientific novelty consists in the development of an approach to assessing the effectiveness of spatially distributed multi-border systems for countering robotic complexes, taking into account their structure, spatial configuration, as well as the synergetic effect of the joint use of heterogeneous technical means of countering robotic complexes through the integrated use of new logical-probabilistic models and modern geoinformation technologies. The results obtained in the article indicate that the goal of the work has been achieved.
Keywords:
protection of important sites, logical-probabilistic method, the model of the counteraction system, modeling of protection systems, performance indicator, physical protection systems, modeling of security systems, security systems, countering robotic complexes, Robotic complexes
Reference:
Es'kov A.V., Tsimbal V.N..
Development of the “Safe city” software and hardware complex on the example of the municipality city of Krasnodar
// Security Issues.
2023. № 3.
P. 21-36.
DOI: 10.25136/2409-7543.2023.3.40920 EDN: YYYUWM URL: https://en.nbpublish.com/library_read_article.php?id=40920
Abstract:
The safety of the human environment is a fairly relevant area of research at the present time. Existing technologies make it possible to prevent threats to society and an individual in megacities, as well as to minimize potential negative factors from their manifestation, and should be implemented actively and in a timely manner. The relevance of the study is due to the fact that a city with a population of more than a million people should have at its disposal a modern and efficient mechanism for managing it, which allows making decisions in the shortest possible time and quickly enough in the field of ensuring public safety and comfortable life. Such a mechanism is the "Safe City" system. However, despite the widespread introduction of such systems in most cities, they require constant qualitative improvement: the addition of new functions and the results of scientific achievements. The work is devoted to the study of the effectiveness of the application of the hardware-software complex (HSC) "Safe City" on the example of the municipality of the city of Krasnodar, as well as proposals for its improvement. In particular, the addition of additional functionality and individual technical and software solutions (biometric technologies, recognition of actions of people, objects and subject, neural network technologies, etc.), which will improve the quality of its work, in order to ensure the safety of the life of a modern city, responding to threats to public safety and eliminating their consequences (illegal acts, emergencies accidents, natural phenomena). The scientific novelty consists in a comprehensive study of the effectiveness of the application of the HSC "Safe City" in the city of Krasnodar and the formulation of proposals for its improvement. The scientific value of the work lies in the fact that the presented proposals can be used in practice when improving the "Safe City" system to achieve a decent standard of living for citizens in a modern city, its security and safety.
Keywords:
automatic photo fixation, artificial intelligence, biometrics, law and order, integrated security, crime prevention, public security, safe city, information technology, CCTV
Reference:
Sadekov R.R..
Actual aspects of the application of psychophysiological research methods using a polygraph in the implementation of state protection measures against participants in criminal proceedings
// Security Issues.
2023. № 2.
P. 82-94.
DOI: 10.25136/2409-7543.2023.2.40544 EDN: MYPAFZ URL: https://en.nbpublish.com/library_read_article.php?id=40544
Abstract:
The author in his work examines in detail the actual aspects of the use of a polygraph and other psychophysiological methods in the implementation of state protection measures against participants in criminal proceedings, taking into account Russian and foreign experience. The main problematic issues related to the use of polygraph technologies, including their advantages and possible disadvantages, are studied, and the legal aspects of the use of a polygraph by specialists are also considered, taking into account the specifics of their work in criminal proceedings of the Russian Federation. Recommendations for optimizing the use of a polygraph in the investigation of criminal cases are proposed, taking into account modern requirements for methods and fundamentals of legislation in this area, the main conclusions of the study conducted by the author are recommendations that were formulated based on the analysis of the regulatory legal framework, technologies of polygraph specialists in criminal proceedings, judicial practice, scientific opinions of practitioners and researchers in the field of application of polygraph technologies in the investigation of crimes by law enforcement agencies of various states. The author draws attention to the fact that in modern conditions there are increasing requirements for the level of training of specialists. The state attaches special importance to the quality, level, skill and professional interpretation of the results obtained during the use of the polygraph. The study highlights the fact that if authorized persons decide to conduct a polygraph examination in the framework of criminal proceedings, the procedure must be carried out in strict accordance with the legislation of the Russian Federation, in compliance with methodological and procedural requirements in this area.
Keywords:
investigation of crimes, preparation, law, judicial authorities, proof, investigative actions, expert, criminal proceedings, researches, polygraph
Reference:
Degterev A.K..
The frequency of severe droughts in Crimea and their relationship with El Niño
// Security Issues.
2023. № 2.
P. 35-44.
DOI: 10.25136/2409-7543.2023.2.40861 EDN: ESLAFE URL: https://en.nbpublish.com/library_read_article.php?id=40861
Abstract:
In this paper the author discusses such an urgent problem for the environmental safety of the Black Sea region as drought. The frequency of droughts lasting more than three decades in the period from April to August inclusive is considered on the basis of data on monthly precipitation and mean monthly temperatures shown from 1950 to 1999. There were seven two-month droughts and one three-month drought. The frequency of droughts in separate months is calculated. The change over the years of the maximum value of the El Niño index per episode from 1950 to 2023 is analyzed. The connection of two-month droughts with this parameter is noted. Based on the results of the study conducted in this paper, the author comes to conclusions about the regularities in the manifestation of severe droughts in the Black Sea region. In particular, it was concluded that in recent decades, strong manifestations of El Niño recur no more often than after 15 years. This makes it possible to predict episodes with an index value of more than 2.6 not earlier than 2030. It is especially noted that so far the main danger in Crimea is two-month droughts. During the considered 50 years of drought lasting more than six decades in a row in the period from April to August, there were 8 times.
Keywords:
environmental safety, Black Sea Region, two-month droughts, sea water temperature, air temperature, El Niño index, Crimea, growing season, precipitation, frequency of droughts
Reference:
Sirazhudinov S.M..
Organization of High-Quality and Safe Data Transmission in Communication Systems and Radio Access of Marine Robotic Complexes
// Security Issues.
2023. № 1.
P. 32-41.
DOI: 10.25136/2409-7543.2023.1.39686 EDN: FJFBXD URL: https://en.nbpublish.com/library_read_article.php?id=39686
Abstract:
To date, the issue of developing marine robotic systems for solving various professional tasks of military and civilian purposes is being updated. However, the key aspect of using these systems is the provision of communication, which includes many features and difficulties. The main purpose of the current article is to analyze the trends and prospects for the development of communication systems at marine robotic complexes. The author attempts to make a comprehensive analysis and systematization of knowledge concerning the technical aspects of the organization of communication on marine robotic complexes. The scientific significance of the work lies in the possibility of using the obtained materials as a theoretical basis for further scientific research aimed at developing more efficient communication systems. As a result of the work, the main aspects and solutions for the formation of high-quality and safe data transmission in communication systems and radio access of marine robotic complexes are considered. The scientific novelty of the work lies in the proposal of a solution for the organization of technical data protection in communication systems of marine robotic complexes. The author examines the schematic diagrams of the organization of radio communications and possible ways of integrating information security systems. The scientific value of the work consists in the possibility of using the presented materials for the subsequent implementation of the presented ideas in practice. The main result of the work is the formation of a scientific and theoretical base in the aspects of the formation of data protection in cellular mobile networks on the example of marine robotic complexes. As a solution, it is proposed to use the channel reservation method based on the use of the AnCom RM/E modem. The paper presents the theoretical and algorithmic aspects of the integration of this solution in mobile cellular networks.
Keywords:
Multi-agent system, Communication channel, Diagnostics, Reliability of communication, Channel reservation, Robotics complex, Radio access, Mobile communications, Information security, Data transmission
Reference:
Larionova S.L..
Organization of Work to Combat Fraud in a Financial Institution
// Security Issues.
2022. № 4.
P. 15-26.
DOI: 10.25136/2409-7543.2022.4.38920 EDN: CLHLDR URL: https://en.nbpublish.com/library_read_article.php?id=38920
Abstract:
The object of the research is the technology of remote banking and remote provision of financial services, the subject of the research of the article is methods and means of countering fraud. The author examines in detail the main reasons for successful fraudulent transactions, analyzes the main tools of counteraction, determines the indicators of the analysis of the effectiveness of counteraction, suggests ways to solve the problem. The article discusses in detail the algorithms of fraud analysis and determines the optimal model for analyzing fraudulent transactions. Particular attention is paid to the analysis of the reasons for the growth of fraudulent transactions in the field of remote provision of financial services. The author defines the directions for improving the anti-fraud system, including proposals for finalizing the legislation of the payment sphere. The article also describes the main fraud schemes and current threats that contribute to the commission of fraudulent transactions. The main conclusions of the study are: 1. The only direction of countering fraudulent transactions in the financial sector is a fraud analysis system based on risk assessment of the client and his operations based on artificial intelligence models, indicators of fraudulent transactions and rules for their use, as well as risk-oriented authentication of the client and his operations. 2. Fraud analysis allows you to effectively protect the client not only from the actions of an attacker, but also from your own actions committed under the influence of social engineering methods. 3. Financial organizations do not use their rights to prevent fraudulent transactions that are committed by clients of a financial organization under the influence of social engineering methods. A special contribution of the author is proposals regarding the improvement of legislation in order to counter fraud. The scientific novelty of this work lies in the development and justification of an optimal anti-fraud system, taking into account existing fraud schemes, indicators of the effectiveness of anti-fraud.
Keywords:
countering social engineering, indicators of the effectiveness of fraud analysis, fraud schemes, fraud threats, risk-based authentication, artificial intelligence models, fraudulent transactions, anti-fraud systems, fraud monitoring, counteraction to cyber fraud
Reference:
Galkin A., Pankov V.Y., Fedorov Y.V..
Temperature Change in the Chambers of Underground Structures when operating Diesel Units
// Security Issues.
2022. № 4.
P. 27-33.
DOI: 10.25136/2409-7543.2022.4.38938 EDN: DUMHVO URL: https://en.nbpublish.com/library_read_article.php?id=38938
Abstract:
The thermal regime of underground cryolithozone structures for various purposes, both related and not related to mining production, is an important factor determining their reliable and safe operation. In this regard, the forecast of the thermal regime in mine workings is a mandatory and important element in the justification of design solutions for the construction and reconstruction of underground structures in the areas of distribution of continuous and island permafrost. One of the main sources of heat generation in the workings is the work of diesel equipment, which is widely used, both in the development of mineral deposits by the underground method, and to ensure technological processes in underground structures of non-mining profile. The purpose of the research was to quantitatively assess the effect of diesel installations on the thermal regime in the underground structures of the cryolithozone. The results of numerical calculations are presented in the form of 2D and 3D graphs, which allow you to visually assess the effect of diesel equipment on the increment of air temperature in the underground structure, depending on the time of year and the efficiency of the diesel installation. It is shown, in particular, that in the most probable range of changes in the efficiency of a diesel installation, the air temperature can vary from 3.2 to 6.3 °C, depending on the standard values of the ventilation air flow. It is established that the temperature increment does not depend on the number of simultaneously operating diesel units and is determined only by the specific standard air flow (m3 / s per 1 kW of installation power).
Keywords:
power, calculation, permafrost, temperature, diesel installation, thermal regime, underground structure, efficiency, ventilation, safety
Reference:
Glushchenko V.V..
Neurotechnologies in Geopolitics, Management, Economics during the Global crisis and hybrid Wars (Part 2)
// Security Issues.
2022. № 3.
P. 1-18.
DOI: 10.25136/2409-7543.2022.3.38195 URL: https://en.nbpublish.com/library_read_article.php?id=38195
Abstract:
The subject of the article is methodological aspects of the application of neurotechnologies in management, economics and geopolitics during the global crisis and hybrid wars; the object of the work is neurotechnologies in the conditions of the 9th technological order; the purpose of the article is to reduce the geopolitical risk in international relations during the 9th technological order, the development of the 9th technological order. The relevance of the article is related to the geopolitical crisis and the intensification of the use of neurotechnologies in the process of geopolitical competition during the transition of the world to a new world order; it is important to take into account that the development of neurotechnologies is one of the main directions of technological development in the formation of the 9th technological order. The scientific novelty of the work is determined by the synthesis of the methodology of managing geopolitical risks in the conditions of the global crisis, based on the development and practical application of neurotechnologies in the period of the 9th technological order. To achieve this goal, the following tasks are solved: the concept and features of geopolitical risk are introduced; the influence of geopolitical risk on the sustainability of the development of the 9th technological order is investigated; methodological provisions of neurogeopolitics are formed, changes in world orders in their connection with technological patterns (orders) is studied; the evolution of military methods in geopolitics is described in the process of changing technological patterns; the concept of managing the geopolitical risk of the state is formed. Scientific methods are: historical analysis; neurotechnology; geopolitics; political science; methodology and philosophy of science, a systematic approach; heuristic methods; the method of constructing scenarios
Keywords:
war, management, the science, neurotechnologies, risk, geopolitics, competition, crisis, effectiveness, the tool
Reference:
Glushchenko V.V..
Neurotechnologies in Geopolitics, Management, Economics during the Global crisis and hybrid Wars (Part 1)
// Security Issues.
2022. № 2.
P. 24-40.
DOI: 10.25136/2409-7543.2022.2.38194 URL: https://en.nbpublish.com/library_read_article.php?id=38194
Abstract:
The subject of the article is methodological aspects of the application of neurotechnologies in management, economics and geopolitics in the conditions of the 9th technological order; the object of the work is neurotechnologies in the conditions of the 9th technological order; the purpose of the article is to reduce the geopolitical risk in international relations during the development of the 9th technological order. The relevance of the article is determined by the development of the global crisis and the possibility of using neurotechnologies in the process of geopolitical competition, the aggravation of the geopolitical crisis, the development of the methodology of hybrid wars gives additional relevance to the article; neurotechnologies can act as a structural element of hybrid wars; neurotechnologies can influence the psycho-physical state of the population and decision makers. The scientific novelty of the work is determined by the synthesis of management methodology geopolitical risks in the context of the global crisis, based on the development and practical application of neurotechnologies in the period of the 9th technological order. To achieve this goal, the following tasks are solved: the concept and features of geopolitical risk are introduced; the influence of geopolitical risk on the sustainability of the development of the 9th technological order is investigated; methodological provisions of neurogeopolitics are formed, changes in world orders in their connection with technological patterns (orders) are studied; the evolution of military methods in geopolitics in the process of changing technological patterns is described; the concept of managing the geopolitical risk of the state is formed. Scientific methods are: historical analysis; neurotechnology; geopolitics; political science; methodology and philosophy of science, a systematic approach; heuristic methods; method of constructing scenarios.
Keywords:
risk, competition, war, world order, neurotechnologies, geopolitics, crisis, the science, Economy, management
Reference:
Nikolaev N.V., Il'in V.V., Sokolov A.M., Matskevich E.E..
Application of terahertz (sub-terahertz) inspection systems in the integrated security systems
// Security Issues.
2021. № 4.
P. 39-49.
DOI: 10.25136/2409-7543.2021.4.36822 URL: https://en.nbpublish.com/library_read_article.php?id=36822
Abstract:
The subject of this research is methods of application of terahertz (sub-terahertz) inspection systems for detecting concealed carry weapon, makeshift explosive devices made of nonstandard materials and other prohibited substances. The object of this research is the detection of concealed carry weapon, makeshift explosive devices made of nonstandard materials and other prohibited substances. The authors examine the application of terahertz (sub-terahertz) inspection systems of compact and portal (stationary) types in the integrated security systems. Special attention is given to the options of using these complexes for expanding the capabilities of the subsystems of video monitoring and detection of sabotage and terrorist means. The conclusion is made on the need to develop the tactics for application of the existing systems of personal security screening, the operation of which is based on radio camera imaging in terahertz (sub-terahertz) frequency range. The authors’ special contribution lies in formulation of recommendations that contain the options of using terahertz (sub-terahertz) inspection systems of various types for detecting concealed carry weapon, makeshift explosive devices made of nonstandard materials and other prohibited substances. The acquire results would help to improve the efficiency of organizing the onsite pass control. The scientific novelty consists in fact that the authors are first within the framework of development of the tactic of using terahertz (sub-terahertz) inspection system to develop proposals of implementation of such means as part of the integrated security systems for detecting concealed carry weapon, makeshift explosive devise made of nonstandard materials and other prohibited substances that differ in carrying out the inspection procedures.
Keywords:
application options of the complexes, classification of complexes, terahertz frequency ranges, inspection complex, personal inspection, detection of offbeat materials, physical protection system, video control, inspection procedure, access control
Reference:
Loginov I.V., Sosunov V.G..
Formation of the approach towards development of lifecycle model for the integrated security systems
// Security Issues.
2021. № 4.
P. 50-60.
DOI: 10.25136/2409-7543.2021.4.37121 URL: https://en.nbpublish.com/library_read_article.php?id=37121
Abstract:
The subject of this research is the integrated security systems and the processes of their continuous improvement during the lifecycle. The goal lies in examination of the problem of systematization of lifecycle processes of the integrated security systems and formalization of their lifecycle model, taking into consideration the available practices of building security systems. The effectiveness of complex system support processes is first and foremost determined by the accurate identification of management goals and objectives, which requires an the lifecycle model adequate to the controlled object. Since the integrated security system has the characteristics of both, capital construction (engineering networks) and technical system (integration platform), the question of improvement of the lifecycle model is relevant. The main research results are as follows: substantiation of the problem of systematization of lifecycle models of the integrated security systems; analysis of the approaches towards their standardization, and substantiation of lifecycle model of the integrated security systems based on the system accounting of conducted operations. The novelty of the proposed model lies in the improvement of reference models of the integrated security systems by taking into account the entirety of reconfiguration and modernization operations. Description is given to the problem of systematization of lifecycle processes of the integrated security systems, which occurs due to the possibility of their classification as different groups of the complex systems. The offered lifecycle model of the integrated security systems through systematization of regulatory requirements is an attempt to acquire a non-contradictory list of measures in creation and operation of the integrated security systems. The results of this research can be used in practical activity of the employees of onsite security service in the context of development of the integrated security system. The implementation of the offered lifecycle model of the integrated security system in the processes of their development would allow systematizing the structure of processes, arranging the functions and activity of the departments on the continuous logistic support of the integrated security systems, and ensuring their consistent improvement.
Keywords:
risk reduction, requirement standardization, modernization, system analysis, lifecycle, integrated physical protection system, stage, modelling, process, phase
Reference:
Antushevich A.A., Minakova P.S., Zyazya A.V., Poddubnyi A.M..
The assessment of energy capacity of the municipal solid waste landfill
// Security Issues.
2021. № 1.
P. 36-45.
DOI: 10.25136/2409-7543.2021.1.34738 URL: https://en.nbpublish.com/library_read_article.php?id=34738
Abstract:
This article examines the energy capacity of the municipal solid waste landfill in the town of Partizansk, Primorsky Krai. The landfill was launched in 1975. The landfill has a monsoon-type climate with warm, humid summers and cold winters with little amount of snow. The services are provided to 45,646 people. The morphological composition of municipal solid waste (MSW) stored on the landfill consist of recyclable paper, glass, polymers, textiles, ferrous and nonferrous metal, food waste, etc. The authors provide a brief characteristics to the landfill; examine biogas yield, component composition of landfill gas, and average composition of biogas; determine specific density of biogas per year. The article calculates the maximum single and gross emissions of pollutants, average specific values of harmful emissions, annual and maximum single amount of landfill gas. Assessment is given to the theoretical energy value of municipal solid waste landfill. The energy capacity of municipal solid waste landfill and its economic efficiency are indicated. In the course of technical calculations, the number of nonrenewable energy resources (coal, oil, natural gas), which can be saved if replace energy carriers with landfill gas is determined. The analysis of using MSW as the renewable secondary energy resources demonstrates the growing role of this source in energy saving and capacity for reducing environmental pollution due to collection and disposal of biogas.
Keywords:
energy resources, energy potential, maximum one-time emissions, pollutant, landfill gas, municipal solid waste, environment, landfill, potential assessment, biogas
Reference:
Bashkova E.P., Dzengelevskii A.E..
Research of the possibility of application of the means of efficient client data management in a credit organization for the purpose of fulfilling regulatory requirements
// Security Issues.
2020. № 3.
P. 19-29.
DOI: 10.25136/2409-7543.2020.3.33090 URL: https://en.nbpublish.com/library_read_article.php?id=33090
Abstract:
This article is dedicated to the problem of effective use by credit organization of the own client data due to their heterogeneity. The object of this research is the client data of a credit organization. The subject is the possibility of application of the means of efficient client data management in a credit organization for the purpose of fulfilling regulatory requirements The main goal of this work consists in the analysis and formulation of recommendations with regards to modification of client data model, as well as improvement of quality of client data by means of data management based on the DAMA-DMBOK body of knowledge in the context of the key areas of data management. The article reviews the key areas of data management and the methods of application of rules and recommendations of each of them to the data management process of the credit organization. The relevance of this article is substantiated by legislative requirements pertaining to monitoring of services provided for private and legal entities from the sanctioned territory. The scientific novelty consists in application of data management knowledge to the relevant issue on the need for automatic determination of territorial affiliation of the client in order to comply with the requirements of normative legal acts. The research methods are content analysis, structural analysis, and modeling. The main conclusions consist in recommendations for modification client data model of the bank, namely methods and principles for expanding the data model using standardized data parameters, which significantly improves the quality of data. The implementation of such recommendations would allow a financial organization to reduce the risks associated with payment of fines and revoke of licenses due to noncompliance with the regulatory requirements.
Keywords:
Sanctions, Geographical spread, Data model, DAMA wheel, Data quality, Data Quality Management, Data governance, Banking company, Effective use of data, Data management areas
Reference:
Shumov V..
Analysis of the function of victory based on experience of strategic operations of the Great Patriotic War
// Security Issues.
2020. № 3.
P. 30-39.
DOI: 10.25136/2409-7543.2020.3.33092 URL: https://en.nbpublish.com/library_read_article.php?id=33092
Abstract:
The object of research is the combat and military operations. The subject is the dynamic models of combat operations and functions of victory in the conflict. The first combat model was developed by M. P. Osipov in 1915 based on the analysis of military battles for the hundred-year period. He was first to formulate the principles of combat operations modelling. In recent decades, the economists also joined the analysis of conflicts (contests and auctions). The goal of this work lies in analysis and unification of the two indicated approaches, and provision military leadership with quantitative grounds for decision-making in preparing to the combat operations. Leaning on the statistical analysis of offensive and defensive strategic operations during the Great Patriotic War (forces and means of the parties by the beginning of operation and its outcome), the author verifies the original expansion of conflict model – the function of victory in combat operations and assesses the parameters of the form of model. The scientific novelty of consists in establishing a close connection and dependence between the two approaches to combat operations modeling: based on dynamics of the averages (classical approach) and modeling with the use of conflict functions (econometric approach). The advanced function of victory in combat operations is easy to use and complies with the provisions of military science and the theory of combat potentials.
Keywords:
scale parameter, parameter estimation, mathematical model, conflict function, Contest Functions, quadratic battle model, Osipov battle model, battle, combat, strategic operation
Reference:
Tikhanychev O.V..
Autonomous robotics: on the problem of control over modifiable algorithms
// Security Issues.
2020. № 2.
P. 36-47.
DOI: 10.25136/2409-7543.2020.2.31937 URL: https://en.nbpublish.com/library_read_article.php?id=31937
Abstract:
The subject of this research is the application of autonomous robotic systems of various designation. The object of this research is the algorithmic problems emerging in this area, namely the problem of control over security of algorithms. The study is carried out on the basis of implementation of robotics in military sphere. The analysis of peculiarities of the modern military operations demonstrates that one of the aspects of revolution in military science is the battlefield robotics. However, its realization generates certain issues in legal sphere, related to algorithmic support of the autonomous system. The manifestations of such problem consist in critical use errors, divided by the experts into the errors of first and second grade. The main cause of these errors is the software functionality of the autonomous robotic system. If the consequences for conventional armament are predictable, and the responsibility for their results is determined, the situation in case of implementation of military robots requires solution. Application of the general scientific methods of analysis and synthesis allow examining the main aspects of current state and prospects of the problem of algorithmization with regards to implementation of autonomous systems. The article synthesizes articulation of the scientific tasks aimed at solution of the problem of division of responsibility between the developers and users of similar system in terms of development and testing of the algorithms of their implementation.
Keywords:
modifiable algorithms, artificial Intelligence, algorithm control, lethal autonomous robotics, robotics battlefield, algorithmic support, legal problems of robotics, problems of robotics, developer responsibility, user responsibility
Reference:
Sivakova T.V., Baluta V.I., Karandeev A.A..
Integral approach towards assessment of antiterrorism security of the objects
// Security Issues.
2019. № 6.
P. 1-14.
DOI: 10.25136/2409-7543.2019.6.31053 URL: https://en.nbpublish.com/library_read_article.php?id=31053
Abstract:
The decreasing relevance of the problem of terrorism threats, as well as the expansion of possibilities and areas of manifestation of the activity of terrorists, require attention on improving the quality of counter-terrorism, including the immediate organization of the system for physical protection of the objects. Efficiency assessment is one of the elements in designing such systems. For the most part, the modern methods of conducting such assessment are quite sizeable and labor-consuming; the numerical value of output parameters, as all else being equal, differ significantly and cannot be collocated with the level of admissible risk of a particular object. This article offers a simplified approach towards efficiency assessments of security systems by means of territorial zoning based on small amount of input parameters. The scientific novelty of the presented methodological approach consists in unary (as a counterbalance to vector) assessment of security indicator, which allows using this approach for creation of instruments of automatic optimization of deployment of equipment for detecting unauthorized intrusion and countermeasures to unauthorized exposure (including strike munitions) for ensuring maximal protection of the target object.
Keywords:
physical protection system, conflict interaction, detection tools, zoning, object security, integral approach, anti-terrorist security, intruder, terrain model, means of protection
Reference:
Mitin A.Y..
Armed Confrontation Modeling. Experience of the Foreign States
// Security Issues.
2019. № 2.
P. 1-9.
DOI: 10.25136/2409-7543.2019.2.28626 URL: https://en.nbpublish.com/library_read_article.php?id=28626
Abstract:
The article is devoted to the development of the simulation modeling of military actions based on the USA army experience. In his research Mitin has discovered that various kinds of modeling have been used to gain practical experience in managing military subdivisions since ancient times. With the developing mathematics and computers, simulation and modeling have reached a new level. The researcher demonstrates that at the present time simulation is actively used by the USA as part of their armed military training. The USA uses standartized solutions which ensures compatibility of all systems at all levels of management. In his article Minin discovers the problem from the point of view of systems evolutionary approach by studying and generalising accumulated experience in the use of simulation systems by the USA army. The experience analyzed can be used to develop Russian information technologies to support the management of military forces during armed confrontation including that to defeat attack of critically important facilities and to substantiate relevant solutions.
Keywords:
Automation, War game, Simulation systems, Model of the battle, The virtual battlefield, Armed confrontation, simulation modeling, Information technology, Combat action, Security
Reference:
Shumov V.V., Malitsky K.T..
Evaluating the Levels of Security and Socio-Political Tension in Russia's Regions
// Security Issues.
2019. № 2.
P. 10-23.
DOI: 10.25136/2409-7543.2019.2.29430 URL: https://en.nbpublish.com/library_read_article.php?id=29430
Abstract:
Today there is a growing threat to Russia's national security both from the side of certain states and blocks (sanctions, trade wars, NATO placing their forces close to Russian borders, etc.) and traditional threats such as illegal migraton from other countries, cross-border crime, etc.). Slow pace of economic growth, social stratification and other factors have a negative influence on the society and make it necessary to study the levels of security and socio-political tension in Russia's regions. Thus, the object of the research is the social, ethnic and economic processes in different regions that influence the security and socio-political tension therein. The subject of the research is the model of security and index of socio-political tension in regions. To analyze security processes, the researchers have used systems approach, complex approach, historical approach, regional statistics and social research methods (rating and indexes) as well as mathematical methods to evaluate parameters of the model. The modeling results complete views of specialists in the theory and practice of security. The researchers also compare the results to research data in related areas (mathematical models of tension in regions, life quality rating, human development index). It is recommended to apply the research results in the sphere of management and government to create scenarios of socio-political development, to timely discover threats to national security and substantiate measures aimed at ensuring national, state, social and other kinds of security.
Keywords:
indicator, level of socio-economic development, socio-political tensions, region of Russia, situation, security, mathematical model, national security, the index of the region, statistics
Reference:
Tsezar D.A., Shumov V.V..
The Model and Mechanism of Resource Allocation for Combating Acts of Violence in Maritime Space
// Security Issues.
2019. № 1.
P. 18-27.
DOI: 10.25136/2409-7543.2019.1.25995 URL: https://en.nbpublish.com/library_read_article.php?id=25995
Abstract:
The subject of the research is the management of resource allocation for combating acts of violence in maritime space. Counteraction of acts of violence in the maritime space of 'international shipping community', quite a new term on the political and economic arena, is performed taking into account the factors typical for aggressive social environment, battle principles and psychological qualities of the parties. The present research is based on the analysis of approaches to prevention of force acts using the models of battle, conflict technology and game theory. The authors also focus on the search for the most optimal resource allocation. The theoretical and methodological basis of the research includes laws and principles of the military science, statistical, formal law and mathematical forecasting methods, discourse analysis and systems approach. The results of the research is the proof of efficiency of implementing battle and game models by military units as part of their service activities aimed at prevention and repression of acts of vilence as well as the algorithm of managing the resource allocation as part of counteraction to acts of violence in martime space.
Keywords:
game theory, mathemetical methods, mathematical model, security, act of violence, robbery at sea, piracy, maritime terrorism, resource allocation, maritime space
Reference:
Belov P..
Methodological Aspects of Health and Environment
// Security Issues.
2019. № 1.
P. 28-39.
DOI: 10.25136/2409-7543.2019.1.28712 URL: https://en.nbpublish.com/library_read_article.php?id=28712
Abstract:
The article is devoted to the framework of concepts and terms and tools of systems research as well as improvement of health and environment which is today well known as 'technogenic safety'. The subject matter of the research is a complicated system which the author called 'environmental manufacturing' and includes industrial facilities and transportation infrastructre, i.e. those man-machine systems that continuously exchange energy, substance and information with atmosphere, hydrosphere and lithosphere as well as peoples, animals and plants inhabiting them. To describe the foresaid aspects of health and environment, the author has followed the deductive axiomatical method and used energy-entropic concept and classification of real dangers. To describe the contents and basic terms, principles and the best methods of researching and ensuring health and environment, the author has used the systems approach and logical conslusion. Conceptual and methodological results of the research include the following: a) energy-entrophic concept and basic classification of real dangers; b)object, subject and basic principles of health and environment; c) the basic research methods of the systemic organization and improvement; d) the structure, target, goals and basic indicators of the system are not only original but also constructive because they correspond to the nature of things.
Keywords:
indicator, damage, risk, danger, subject, object, method, conception, criteria, system
Reference:
Belozerov V.V..
About the Cognitive Model of Managing Safety of Heavily Trafficked Facilities (the Results of Investigation of the Fire that Happened at Turgenevsky Shopping Center in Cherkessk)
// Security Issues.
2018. № 5.
P. 35-62.
DOI: 10.25136/2409-7543.2018.5.27485 URL: https://en.nbpublish.com/library_read_article.php?id=27485
Abstract:
In his article Belozerov presents the results of a comprehensive expert audit of the fire that happened at Turgenevsky Shopping Center in Cherkessk and resulted in over 1.5 billion roubles of damage. The researcher underlines that the safety levels of heavily trafficked facilities (HTFs) are set in the design and checked by the state or non-state expertise that issues a construction permission. In the course of construction, functioning and modernization of HTFs the observance of safety requirements is controlled by different supervisory agencies (architectural, fire-protection, energy agencies, etc.) and this is the very point when the safety level is often reduced significantly. Thus, Belozerov offers the concept of cognitive synergetic system of HTF safety management under the aegis of Russia's Prosecution Office. The results of analyzing violations of safety requirements committed by both HTF heads and supervisory agencies demonstrate that the main causes of such violations are, firstly, the variety of supervisory agencies and the absence of interaction between them; secondly, a great number of contradictory requirements, guidelines and rules regarding the matter, and the fact that regional governments try to set forth individual regulations and mandatory requirements in addition to standard Technical Regulations.
Keywords:
synergetic, norms and rules, technical regulations, laws, supervisory authorities, management, safety, an object with mass stay of people, cognitive model, public prosecutor's supervision
Reference:
Shumov V..
Network Structures for the Integration and Disintegration of Political Actors (on the Example of EU Countries)
// Security Issues.
2018. № 3.
P. 56-77.
DOI: 10.25136/2409-7543.2018.3.26263 URL: https://en.nbpublish.com/library_read_article.php?id=26263
Abstract:
Insufficient economic growth rates, security problems, the expected exit of the UK from the EU prompt further research into the analysis of the processes of integration and disintegration of supra- and interstate entities. The paper presents a security model of the state, consisting of two components - development functions and conservation functions. The development function in the form of a three-factor power production function takes into account the population size of the country, its area, urbanization, gross domestic product per capita and natural population growth. The conservation function operates with variables such as: the share of the state-forming ethnos from the population of the country, the parameters of attraction and ethnic heterogeneity. The verification of the security model was carried out using the example of the EU countries. A model for the security of supra- and interstate political entities (unions) is developed, taking into account the degree of integration between individual countries (the share of state functions transferred to the Union). For the EU countries, an assessment of the heterogeneity parameter relative to the allied country, Germany, has been carried out. Shumov analyzes the network structure model that includes the geographic graph (combination of axes (states) and ridges (boundaries between states)) and sociopolitical graph (arcs are interpeted as the presence of sociopolitical connections). The author offers his definition of admissible coalitions and explains the rule of formation of socio-political network structures: political actors select coalition with the maximum security function. Shumov provides examples of formation of optimal coalitions. Using the network structure model, the author carries out an analysis of the processes of integration and disintegration in the European Union. As the European Union integration develops, disintegratoin processes are expected to reinforce in multinational states, or the states will have to leave the Union.
Keywords:
selection rule, coalition, socio-political graph, ethnic heterogeneity parameter, conservation function, development function, security model, integration, disintegration, national security
Reference:
Kuzmenko A.O..
Maritime Space Surveillance System That is Based on Ranking of Information Sources
// Security Issues.
2018. № 2.
P. 1-12.
DOI: 10.25136/2409-7543.2018.2.25744 URL: https://en.nbpublish.com/library_read_article.php?id=25744
Abstract:
Development of a maritime space surveillance system require from state authorities to make a reasonable choice of sources of information. The subject of this research is the surveillance system structure that allows to observe sea vessels. Providing that there is a great number of approaches to control over sea vessels that are based on both complex information systems and individual technical means, when selecting sources of information it is necessary to take into account functions that are to be performed by systems or means to observe and control over sea vessels. In particular, to select sources of information it is necessary to consider the performance of control functions by surveillance system elements. The research methodology is based on theoretical and empirical methods, in particular, structured fnctional approach, methods of analysis, synthesis, induction, comparison, literature analysis and performance analysis. In this research the author offers his own method of ranking information sources for maritime space surveillance. The method offered by the author has certain benefits compared to existing ones, in particular, the method allows to take into account not only technical parameters of information sources but also efficiency of control over maritime space of the Russian Federation. The method also allows to compare information sources with different structures and principles of operation as well as heterogenous incomparable technical features. The method also enables to consider the state of a surveillance system being used in which a ranked information source may be imbedded.
Keywords:
the security of Maritime space, optimization task, vessel, source of information, ranking, monitoring, surveillance system, marine spatial planning, technical means of observation, the effectiveness of the implementation
Reference:
Kharitonov V.V., Seregin S.F..
Ergonomic shortcomings of cabins as flight safety risk factors
// Security Issues.
2017. № 5.
P. 1-11.
DOI: 10.25136/2409-7543.2017.5.21604 URL: https://en.nbpublish.com/library_read_article.php?id=21604
Abstract:
The research subject is the problem of ensuring optimal conditions of interaction of people and aviation equipment in the interests of safe exploitation. This problem has recently aggravated. The need to eliminate ergonomic shortcomings of cabins and scrutinous ergonomic engineering of cabins for the purpose of increasing the number of aircrew errors caused by ergonomic shortcomings of cabins, has determined the need to study ergonomic aspects of evolution of cabins of front-line aircrafts with a focus on the shortcomings of early stages of life limits of cabins of modern and advanced aircrafts. The research methodology combines the methods of system analysis, aviation ergonomics, aviation equipment testing and designing, historiography and source study. The authors conclude that with the complication of aviation equipment and the ways of using it, the information display system becomes more important for a pilot, and the variants of glass cockpits of advanced aviation equipment have unacceptably large number of shortcomings, determined by insufficient engineering of the concept of cabins arrangement at the early stages of the life limit of aviation equipment.
Keywords:
flight safety risk, pilot reliability , aviation accidence, aviation incidents, aviation accident, safe aircraft operation, pilot error , ergonomic aircraft engineering, flight safety, aircraft operation
Reference:
Ermakov S.V., Bondarev V.A..
Dangerous, extreme and emergency situations in ship navigation
// Security Issues.
2017. № 4.
P. 13-22.
DOI: 10.25136/2409-7543.2017.4.23569 URL: https://en.nbpublish.com/library_read_article.php?id=23569
Abstract:
The research subject is the terminology, which is used to describe the situations in ship navigation, which can be harmful for life and health of people, property (cargo and ship) and environment. The research object is theory and methodology of the risk of emergency situations in ship navigation. The authors consider dangerous, extreme and emergency situations, their definitions, features and interrelation. The study is based on legal and commonly used definitions and those acquired in the process of studying. The research methodology is based on terminological system analysis, which is applied to each definition and the whole conceptual framework (terminological system). The authors detect commonness, difference and correlation of notions defining the situations, which occur in the process of ship navigation and are characterized by the presence of danger. In other words, the authors systematize the terminology. The most common term is dangerous situation, which is only determined by the presence of danger. An additional feature of extreme situation is a human factor. The level of extremality of the situation is determined by the probability of an accident and emergency situation. The research results supplement the theory and methodology of emergency situations risk management in ship navigation. They can be used for generalization of effective procedures of management on the basis of prognostication and minimization of human factor in ship navigation safety.
Keywords:
correlations, features, emergency, extreme situation, dangerous situation, navigational situation, analysis, terminology, system, ship navigation
Reference:
Monakhova M., Putintsev G., Mazurok D., Porfirev A..
Algorithm of localization of a corporate information and telecommunication network’s area with abnormal behavior
// Security Issues.
2017. № 2.
P. 13-24.
DOI: 10.7256/2409-7543.2017.2.21868 URL: https://en.nbpublish.com/library_read_article.php?id=21868
Abstract:
The research object is an information and telecommunication network. The research subject is the algorithms of detection and identification of information safety incidents of information and telecommunication networks of modern companies. The purpose of the study is to develop algorithms of detection of information safety incidents in corporate information and telecommunication networks. The authors describe the method based on the comparison of the reference configurations of information and telecommunication networks with the factual ones. Unauthorized change of configurations and external interference in the work of a corporate information and telecommunication network cause the instability of work of its elements, and threaten information safety. The authors use the theory of graphs and the methods of discrete mathematics and mathematical statistics. The article contains the algorithm of identification of a corporate and telecommunication network’s area with abnormal behavior, and the example of its program realization, and raises the problem of importance of timely and reasoned localization of a corporate information and telecommunication network’s area with probable information safety incidents. The scientific novelty of the study consists in the development of the model of an information safety incident and the algorithm of localization of a corporate information and telecommunication network’s area with abnormal behavior. The authors formulate the algorithm of localization, which helps reduce the time of an information safety incident detection by approximately 15% and identification – from 5 to 10%.
Keywords:
experimental facility, detection algorithm, abnormal behaviour, IS incidents, corporate Information-Telecommunications Network, information safety, localization of a network's segment, graph model, reference values, equipment CITN
Reference:
Gribanova-Podkina M..
Construction of a model of threats to information security of an information system using the object-oriented design methodology
// Security Issues.
2017. № 2.
P. 25-34.
DOI: 10.7256/2409-7543.2017.2.22065 URL: https://en.nbpublish.com/library_read_article.php?id=22065
Abstract:
The research object is the project of the system of information security of an information system, which includes the development of the model of threats, and the related issues of the current state of an information system assessment and recommendations about the improvement of information protection. The paper considers the approach to the construction of the model of threats based on the use of the object-oriented design model. Such approach involves active use of UML-diagrams when describing the conceptual model of threats to information security, the ways of these threats realization, and threats realization and protection scenarios. Within this approach, using the UML language and Enterprise Architect tool, the author develops and describes the object-oriented model of threats to information security for a distributed information system. This model can be embedded into the documents of information security of an information system. The developed models of threats and scenarios will help information analysts and information security specialists to interact more effectively to protect information systems against information security threats.
Keywords:
UML, object-oriented design, protection scenario, threat scenario, threats model, information security threat, ways of threat realization, security module, protection contour, object-oriented model
Reference:
Shumov V..
Sovereign development indexes of the largest countries
// Security Issues.
2017. № 1.
P. 10-21.
DOI: 10.7256/2409-7543.2017.1.21624 URL: https://en.nbpublish.com/library_read_article.php?id=21624
Abstract:
The research object is the characteristics and factors of development of societies and states. The research subject is the creation of the model and indexes of sovereign development of the key states. The article demonstrates the model that takes into account the following indexes: population size, territory size, and social technologies. Instead of the difficult-to-calculate and difficult-to-evaluate innovation index, the author offers the social technologies index consisting of three indicators: urbanization, GDP per capita, and population size growth rates. The author applies the natural-science approach and mathematical modeling. The author enumerates the key 20 countries in the descending order of the sovereign development index: China, the USA, India, Russia, Brazil, Canada, Indonesia, Mexico, Australia, DR Congo, Nigeria, Argentina, Iran, Pakistan, Algeria, Saudi Arabia, Ethiopia, Egypt, the Republic of South Africa, Turkey. The scientific novelty of the study consists in the application of publicly available statistical data for the calculation of the sovereign development indexes of countries covering long periods of time.
Keywords:
social technologies, defense potential, security, sovereign development function, development, rating, index, population, model, parameter estimation
Reference:
Chirov D.S., Hripunov S.P..
Intelligent methods of tactical situations recognition in the context of autonomous use of military robotic systems
// Security Issues.
2017. № 1.
P. 22-34.
DOI: 10.7256/2409-7543.2017.1.21643 URL: https://en.nbpublish.com/library_read_article.php?id=21643
Abstract:
The paper considers the problems of tactical situations recognition in the context of autonomous use of military robotic systems. In the opinion of most Russian and foreign experts, arming of troops with autonomous military robotic systems, equipped with reconnaissance assets and weapons, can significantly increase the effectiveness of conduct of operations and reduce depletion of ranks. The absence of an effective mechanism of tactical situations recognition in the context of the environment that is hard to formalize is one of the key deterrents to the creation of autonomous military systems. The authors suggest applying logical and linguistic methods and their neural network realizations, particularly, the multilayer perceptron, to solve the mentioned task. The modeling results demonstrate that the use of neural network realization of logical and linguistic methods of recognition, based on the multilayer perceptron, allows using such methods in the on-board computer intelligence of a military robotic system for the recognition of tactical situations. The use of the multilayer perceptron helps significantly speed up the process of the new knowledge processing, since in order to create the new system of tactical situations recognition it is necessary to merely correct the learning sample and retrain the multilayer perceptron; it takes less time than the formation of a new logical samples group by a group of experts.
Keywords:
linguistic variable, fuzzy model, logical-linguistic methods, tactical situation, autonomy, unmanned aerial vehicle, robotic system, pattern recognition, artificial neural network, multilayer perceptron
Reference:
Shumov V..
Analysis of integration and disintegration processes in the European Union
// Security Issues.
2016. № 6.
P. 60-76.
DOI: 10.7256/2409-7543.2016.6.21499 URL: https://en.nbpublish.com/library_read_article.php?id=21499
Abstract:
The insufficient economic growth, the security problems and the UK expected leaving of the EU incline to the continuation of the analysis of integration and disintegration processes in the European Union. The research subject is the assessment of the security level of the European Union. Through the dichotomy of the values of development and preservation, the author defines the function of the security of the state and the union of states. Based on the statistical data, the author assesses the security of the Union according to several scenarios. To analyze integration and disintegration processes in the EU, the author uses the system approach, historical and statistical data and mathematic modeling. On the base of the assessment of Russia’s security over the past 200 years, the author assumes that the decrease of the value of the preservation function below 0,5 – 0,6 creates the prerequisites for the possible dissolution or transformation of the state. The author formulates the formal tasks of the search for the optimal composition and structure of the European Union and gives the examples of the calculation of the rational composition of its member-states.
Keywords:
safety function, development function, preservation function, disintegration, integration, security, ethnic diversities, scenarios, European Union, security of Russia
Reference:
Sobolev V.E..
Military cybernetic systems with the high-frequency perception of information
// Security Issues.
2016. № 6.
P. 1-6.
DOI: 10.7256/2409-7543.2016.6.21467 URL: https://en.nbpublish.com/library_read_article.php?id=21467
Abstract:
The article considers the physical principles, underlying the perception of visual information by the human sensory system, in relation to the problem of the speed of perception and interpretation of this information by the brain. The author shows that the physiological peculiarities of the human sensory system restrict the ability of a person to observe the high-speed physical processes. The author notes the dependence between the frequency of interpretation of external information by the brain and the subjective perception of time by the person. The article shows that the intensification of the frequency of processing the incoming information leads to the actual slowdown of all observed processes. The author considers the examples of the subjective perception of the passing of time by a person. This problem is considered from the position of physics and the information theory. The article considers the philosophical aspect of this problem in the context of the constructivist concept and the problem of the observer’s role in quantum mechanics. The author demonstrates the potential possibility to create military cybernetic systems able to perform the high-frequency perception and interpretation of visual and other types of external information. The article shows that the advantage of such cybernetic systems over a human will be especially significant in observing high-speed physical processes and detecting attacks of high-speed weapons.
Keywords:
information theory, relativity of reality, relativity theory, sensory system, constructivism, multidimensional time, time, cybernetic systems, cybernetics, time dilation
Reference:
Novak K.V., Vinokurova Y.S..
The method used to study the potential effectiveness of external skeletons as parts of tactical gear of military personnel
// Security Issues.
2016. № 5.
P. 1-10.
DOI: 10.7256/2409-7543.2016.5.20159 URL: https://en.nbpublish.com/library_read_article.php?id=20159
Abstract:
The quantitative description of external skeletons’ features doesn’t provide the unambiguous understanding of effectiveness of their use. The preliminary assessment of their effectiveness can be carried out on the base of operations research method (mathematical modeling of bilateral military operations). For this purpose, the modeling research, used to study the potential effectiveness of external skeletons, has been developed; it is based on analytical description of the process of bilateral military operations with the help of Lanchester-Osipov equations, in which the results of interaction between the fighting units on each stage are considered not as random, but as equal to their average. The research methodology includes the operations research method, mathematical modeling, system analysis, military cybernetics, the reliability theory and human factors engineering. The authors develop the mathematical support for the modeling research complex, used to study the potential effectiveness of external skeletons, based on Lanchester-Osipov equations. The results of mathematical modeling prove the necessity to develop external skeletons, designed for military use, in order to improve the effectiveness of military operations of armored infantry units.
Keywords:
operations research, modeling complex, tactical engagement simulation, Lanchester-Osipov equations, Lanchester laws, effectiveness of external skeletons, tactical gear, external skeleton, effectiveness of military operations, effectiveness of professional activity
Reference:
Dement'ev V.E..
Justification of the conceptual framework of a protocol-based protection of information and telecommunications network
// Security Issues.
2016. № 3.
P. 19-29.
DOI: 10.7256/2409-7543.2016.3.19378 URL: https://en.nbpublish.com/library_read_article.php?id=19378
Abstract:
The paper proposes a conceptual framework forming the grounds of the protocol-based protection of the information and telecommunications network. The purpose of this article is to develop theoretical foundations of the protocol-based protection. Based on a review of the existing descriptions of vulnerabilities and approaches to assessing the security of information and telecommunications networks and the known types of threats the author identifies their contradictions and shortcomings. The author proposes the classification and the definition of the concept of a protocol-based impact, gives some examples of such impacts and the main definitions revealing the essence of this concept. Analysis is the main research method. The author considers the shortcomings of the definitions of the existing normative documents. The scientific novelty lies in the fact that the study considers the new class of vulnerabilities and the related threats to the information and telecommunications network. The proposed definitions help describe the technological peculiarities and the existing features which will hereafter allow dividing its protection into the information and the technological ones. The results of the study can be used for the further development of theoretical foundations of the protocol-based protection of the information and telecommunications network.
Keywords:
protocol-based protection provision , protocol-based security index, protocol vulnerability, packet modification, improvement of tours, technological traffic, remote shutdown, protocol-based threat, protocol-based security, protocol-based impact
Reference:
Petrov V.E., Abasov M.M..
The program of psychological prevention of interpersonal conflicts on public transport
// Security Issues.
2016. № 1.
P. 1-8.
DOI: 10.7256/2409-7543.2016.1.17558 URL: https://en.nbpublish.com/library_read_article.php?id=17558
Abstract:
The paper is devoted to the possibilities of and approaches to the psychological prevention of interpersonal conflicts on public transport. The authors pay special attention to the need for the improvement of passenger service quality, decrease of the number of complaints about transport services, and provision for the fail-safety of public transportation. Among the methods of “driver-passenger” relations development the authors offer to improve the psychological work with public transport drivers. The authors develop and test the program of psychological prevention of interpersonal conflicts on public transport consisting of four two-hours’ long lessons. The lessons should be held in the form of seminars-trainings combining the discussion of topical issues of driver-passengers interaction, and training activities containing the typical problem situations which drivers encounter during their work. The psychological prevention program efficiency has been assessed during the experiment with the control and experimental groups. The validity of the results has been verified with the help of a “Student’s” t-test. Thus, the psychological prevention allows the drivers to acquire new experience, to form the skills of conflict-free communication in problem situations, to develop the skills of behavior control. The authors suppose that it will improve the quality of passenger service in the sphere of public transportation and enhance the road safety.
Keywords:
public transport, driver, passenger, State Traffic Inspectorate, drivers' culture, interpersonal conflict, psychological prevention, seminar-training, self-reflection, prevention program
Reference:
Shumov V..
National security model and the analysis of global processes of integration and disintegration
// Security Issues.
2015. № 1.
P. 29-97.
DOI: 10.7256/2409-7543.2015.1.14812 URL: https://en.nbpublish.com/library_read_article.php?id=14812
Abstract:
The article is devoted to national security and the related processes of integration and disintegration of states and political alliances. The author develops the security model defined through the dichotomy of values of development and preservation, cooperation and competition. For the purpose of the model assessment and verification the author uses historical, statistical and analytical data characterizing the security of states and alliances of states and regions: the population size and structure, socio-economic characteristics, innovation index, etc. The author uses the methods of mathematical modeling, mathematical statistics, historical data about the development of states since 1500, and the systems and natural scientific approaches. The security model gives the opportunity to solve several practical tasks: 1. To assess security of China, Russia and the USA for the period from 1500 till 2009. The author shows that social transformations in the society and the state take place when the preservation rate decreases below 0,5 – 0,6. 2. To calculate the security of the European Union according to three scenarios: creation of a commonwealth, a federation or a unitary state. The author supposes that recently the EU has reached its growth limits (and even exceeded them). Its sustainable existence is provided by means of translation of the part of military and political sovereignty to the EU by the USA and the passivity of other geopolitical actors. 3. To calculate the security of the Eastern European Union (unification of 9 states around Russia). With any form of unification the Union will be a sustainable construction. This assessment does not contradict the historical development of Russia.
Keywords:
parameters estimation, systems approach, mathematical model, disintegration and decay, integration of states, social technologies, demography, national security, prediction, union-building
Reference:
Shchuplenkov O.V..
Methodological aspects of national security of Russia.
// Security Issues.
2014. № 2.
P. 60-110.
DOI: 10.7256/2306-0417.2014.2.11662 URL: https://en.nbpublish.com/library_read_article.php?id=11662
Abstract:
The article is devoted to the analysis of methodology of the national security problem in Russia. The specific features of the modern system of international relations is manifested via internationalization, globalization, growing tempo of global transformation processes, making it more and more complicated, contradictory and conflict-generating. Activation of terrorism, the wish of a number of states to produce nuclear weapons and carriers, formation of new power centers, competition for the access to natural resources, competition between the social models, consequences of the global crisis make one worry for the fate of the strategic sustainability. It is undoubted that there are positive changes, since the national security strategy is closely connected to the National development concept till 2020 and it is closer to reality, than previous documents of 1997 and 2000. The modern wars and armed conflicts may be caused by the following factors: economic (such as uneven development, fight for the raw resources and markets for capital), political (such as political instability in various regions), military and technical (presence of new types of weapons, its quality and quantity markers), spiritual and religious (such as religious extremism, Islamic fundamentalism, social and psychological personal ambitions). The above-mentioned parameters make the issues of military threat and military danger more topical, and require more comprehensive evaluation.
Keywords:
national security, national interests, national security concept, national security strategy, threat, danger, power, national priorities, person, crimes of international character
Reference:
Vladimirova T.V..
On an unified approach towards understanding information security guarantees.
// Security Issues.
2014. № 2.
P. 111-127.
DOI: 10.7256/2306-0417.2014.2.11811 URL: https://en.nbpublish.com/library_read_article.php?id=11811
Abstract:
Various approaches and study directions in the sphere of information security guarantees may be viewed through an unified methodological approach in the terms of social philosophical theory. Such an operation shall facilitate the further development of understanding of the social nature of the term. We related information security guarantees to the understanding and administration of certain modern social practices, allowing to keep the information streams adequate to the world around both for the individuals and for the social systems, therefore, allowing for sustainability and comprehensive character of the situation for both an individual and a system in the situation of growing deviation/innovation as variative communications expressed by the growing intensity of information streams. Theoretical and methodological bases for the studies include sociological theories of A. Giddens, M. Castells, J. Urry. The author used the works of the Russian scientists in the sphere of information security guarantees. It is noted that information security guarantees are formed with the social practices and social structures. The said approach allows to develop the understanding of social aspects of information security, to see the specific features of security guarantee practices, to reveal the contradiction between the local structures and stream and network character of the information threats. It is noted that the high intensity of communication of mobility practices is possible in the sphere of security guarantees thanks to security privatization.
Keywords:
information security guarantees, social and philosophical approach, practices and structures, speed and mobility, new practice mobilities, security privatization, local structure, networks and streams, security guarantee structures, specific features of security practices
Reference:
Vladimirova T.V..
On the value of new mobilities for security.
// Security Issues.
2014. № 1.
P. 9-23.
DOI: 10.7256/2306-0417.2014.1.11164 URL: https://en.nbpublish.com/library_read_article.php?id=11164
Abstract:
The article concerns new social mobilities within the framework of information security guarantees as practices. A social subject guaranteeing information security, is the subject, who on one hand provides protection of information and protection from information, and on the other hand he develops orientation in the outer information environment, since his resources should be renewed in the conditions of mobile social environment. At the same time renewing information resources of a subject takes place with growing intensity according to the growth of intensity of information streams, which, in turns leads to more and more outdated information. In such a condition mobility practices may be interpreted as security practices. Theoretical and methodological basis for the studies includes social, philosophical and sociological theories. In particular, the ideas of mobility sociology by John Urry, the theory of object-centered sociality of Karin Knorr Cetina. The new mobility practices, which now form network and stream morphology of the social world are viewed by the author as general practices of information security guarantees. The idea of their organization is partially revealed through the term of channels, tunnels and streams (J. Urry). The author notes that the new mobilities need to be understood and used as practices of information security guarantees for national forces in the condition of growth of streams and networks. The substantial aspect of the new mobilities is high intensity of communications, as expressed by the speed and variety of interactions. It is noted that a characteristic features of new mobilities is objectivation of relations or the appearance of the object-centered sociality (K. Knorr Cetina).
Keywords:
new mobility practices, information security guarantees, high intensity of communications, object-centered sociality, channels, tunnels, streams, networks, growth of information outdate, security sociology
Reference:
Shumov V..
The systemic approach to boundary security modelling.
// Security Issues.
2013. № 5.
P. 39-66.
DOI: 10.7256/2306-0417.2013.5.10043 URL: https://en.nbpublish.com/library_read_article.php?id=10043
Abstract:
The boundary security is analyzed within boundary studies, its object of study is boundary processes, boundary systems, and boundary influences. This article includes evaluation of approaches towards boundary security modeling from the standpoints of systemic analysis, system science, operation studies. The article contains three parts. Part one is devoted to the structure of boundary studies, and its main characteristics, such as norms and principles of boundary activities, functions of boundaries, boundary policy and boundary means, threats in boundary areas, types of boundary influences, etc. In the second part it is shown that complicated boundary processes may be modelled with the use of hierarchy and chains of models. The author studies 13 modelling levels starting from the physical and geographic level and finishing with the goal-setting level. The modeling chains are based upon general and specialized cycles of activity and administration. The last part provides for modeling methods in the sphere of boundary security. Rephrasing William Ashby, one may state that real process models of boundary security guarantees should be no less varied than the variety of real administrative situations. Due to this fact, the model should be multi-level and they should correspond with universal and special cycles of administration and activities.
Keywords:
boundary security, boundary studies, boundary metrics, limology, security theory, modeling levels, administration cycles, matrix of models, boundary policy, structure of boundary studies
Reference:
Panenkov A.A..
Criminological approaches towards the problems of fighting terrorism and its financing, specific features of prosecutor control. Some propositions on optimization of fighting terrorism and its financing based upon scientific studies.
// Security Issues.
2013. № 3.
P. 17-135.
DOI: 10.7256/2306-0417.2013.3.8754 URL: https://en.nbpublish.com/library_read_article.php?id=8754
Abstract:
In this article the author based upon the scientific studies of 2010-2012 discusses the criminological study methods and approaches towards fighting terrorism and its financing, specific features of prosecutor control. He makes some propositions on optimization of fighting terrorism and its financing based on international experience. It is noted that it is important to be disillusioned in respect to fast solutions of the problems regarding fighting terrorism and its financing in Russia. It is important that the political leaders of the Russian Federation use criminological approaches to fighting terrorism. The studies held in July 2012 show that it was not impossible to block foreign sources and channels of financing terrorism in the Republic of Ingushetia. Blocking both internal and external sources of financing is currently a key goal and problem for all of the law-enforcment bodies and special services in Russia.
Keywords:
fight, financing, terrorism, prosecutor, supervision, uncovering, investigation, crime, criminology, optimization
Reference:
Pogodina I.V., Fraimovich D.Y., Mishchenko Z.V..
The multilevel approach to definition of optimum indicators of regional security based on economic-mathematical modeling
// Security Issues.
2012. № 1.
P. 55-80.
DOI: 10.7256/2306-0417.2012.1.77 URL: https://en.nbpublish.com/library_read_article.php?id=77
Abstract:
Substantial differentiation of regional development, non-uniformity of domestic innovative territory, unsatisfactory criminal situation and bureaucratic thresholds substantially limit implementation of a modernization of the state. Therefore, an adequate estimation of functioning social and economic systems is necessary for the solution of the specified problems from a standpoint of use of their internal and external capabilities. The offered technique for defining an integrated indicator allows to make multilevel calculation of potential of constituent subjects of Russian Federation, and then on the basis of mathematical processing of the results to form the model characterizing a complex parity of de-facto and optimal regional security.
Keywords:
security, region, evaluation, indicator, integral, social and economic system, parameters, modrenization