Search Results

You are looking at 1 - 10 of 24 items for :

  • "cybersecurity" x
  • Refine by Access: All Content x
Clear All

Trustworthy cybersecurity cooperation of Visegrád countries

A visegrádi országok megbízható kiberbiztonsági együttműködése

Scientia et Securitas
Authors:
Huu Phuoc Dai Nguyen
and
Zoltán Rajnai

References 1 Berzsenyi, D. (2015) New dimension of V4. http://visegradplus.org/analyse/new-dimension-v4-defense-cooperation-comparative-analysis-cybersecurity

Open access

Kiberbiztonsági kompetencia hálózatok Európában – K+F+I lehetőségek a következő évtizedben

Cybersecurity Competence Network in Europe – R&D&I Opportunities in the Next Decade

Scientia et Securitas
Author:
Csaba Krasznay

Four EU pilot projects launched to prepare the European Cybersecurity Competence Network Európai Bizottság 2019 https://ec.europa.eu/digital-single-market/en/news/four-eu-pilot-projects-launched-prepare-european-cybersecurity

Open access

Az információbiztonság időszerű kérdései a magyarországi kkv-k körében

Current issues of information security among SMEs in Hungary

Scientia et Securitas
Authors:
Adrienn Kiss
and
Csaba Kollár

Összefoglalás.

A tanulmány célja az információbiztonság vizsgálata a magyarországi kis- és középvállalkozások (kkv-k) körében. Tanulmányunk aktualitását az adja, hogy az Európai Unió Bizottsága által évente kiadott Digitális Gazdaság és Társadalom Indexe szerint a magyarországi kkv-kat alacsony adat- és információbiztonsági szint jellemzi. Kutatásunk során egyaránt alkalmaztunk kvalitatív és kvantitatív módszereket. Az előbbinél dokumentumelemzéssel megvizsgáltuk, hogy a hazai szakirodalom milyen fontosabb információbiztonsági kihívásokat azonosít, illetve interjúk segítségével feltérképeztük a kkv-k információbiztonsági gyakorlatait és kihívásait, az utóbbinál pedig egy online, nagymintás kérdőív révén vizsgáltuk a szektor vezetőinek információbiztonsággal kapcsolatos véleményét, fejlettségét.

Summary.

The aim of the study is to examine information security among small and medium-sized enterprises (SMEs) in Hungary. The relevance of our study is that, according to the Digital Economy and Society Index published annually by the Commission of the European Union, Hungarian SMEs are characterised by a low level of data and information security. In our research, we used both qualitative and quantitative methods. In the former, we conducted a document analysis to identify the main information security challenges identified in the domestic literature and mapped the information security practices and challenges of SMEs through interviews, while in the latter, we used an online, large-scale questionnaire to investigate the views and development of the sector’s managers on information security. The findings of our study are based on the responses of 150 SME managers and 31 IT professionals working in the sector. We divided our questionnaire into six sections: demographics, business profile, device usage, digital habits, information security awareness survey based on the international HAIS-Q, information security awareness in daily practice. In the present research we deviated somewhat from the international model, firstly because we had to adapt the model to the domestic requirements and our research objectives, and secondly because this model was only a part of our questionnaire. During the research we have clearly identified the need to develop and implement practice-oriented training programmes that can help managers and IT professionals in the domestic SME sector to develop their information security awareness and even to make the transition to Industry 4.0. Based on the responses to the interview questions, it can be concluded that, overall, SME managers and their organisations are increasingly starting to build cybersecurity solutions and information security measures around their organisation. There is still a need to develop and share information security good practices that can reach SMEs, as there is a need for training and exchange of experiences, but not all companies are fully committed to the issue, so the actual need for action and organisation is ultimately lagging behind. A small proportion of the organisations surveyed have been victims of a cybersecurity incident and a good proportion of SME managers believe that until an incident has happened to an employee or the organisation, they will not learn from it. Basically, there is a growing demand for increased security and the use of security tools and education in information security, but this is evolving as a slow process and not as fast as the world around us is changing, so it is questionable when an information security explosion will occur that may radically change the tools and attitudes of organisations.

Open access

Kiberbiztonság a koronavírus idején – a COVID–19 nemzetbiztonsági aspektusai

Cyber Security in the Time of the Coronavirus – National Security Aspects of COVID-19

Scientia et Securitas
Authors:
Tamás Palicz
,
Balázs Bencsik
, and
Miklós Szócska

Telehealth Cybersecurity Risks. https://securityscorecard.com/resources/healthcare-industry-telehealth-cybersecurity-risks-report [Letöltve: 2021. 04. 24.] 30

Open access
Orvosi Hetilap
Authors:
Tamás Palicz
,
Tibor Sas
,
József Tisóczki
,
Balázs Bencsik
, and
Tamás Joó

for Cybersecurity Careers and Studies (Official website of of the Department of Homeland Security). Explore terms: a glossary of common cybersecurity terminology. Available from: https

Open access

Kiberbiztonság a járműiparban

Automotive Cybersecurity

Scientia et Securitas
Author:
László Palkovics

SAE Vehicle Electrical System Security Committee SAE J3061-Cybersecurity Guidebook for Cyber-Physical Automotive Systems. SAE-Society of Automotive

Open access
Scientia et Securitas
Authors:
Péter Ekler
and
Dániel Pásztor

Összefoglalás. A mesterséges intelligencia az elmúlt években hatalmas fejlődésen ment keresztül, melynek köszönhetően ma már rengeteg különböző szakterületen megtalálható valamilyen formában, rengeteg kutatás szerves részévé vált. Ez leginkább az egyre inkább fejlődő tanulóalgoritmusoknak, illetve a Big Data környezetnek köszönhető, mely óriási mennyiségű tanítóadatot képes szolgáltatni.

A cikk célja, hogy összefoglalja a technológia jelenlegi állapotát. Ismertetésre kerül a mesterséges intelligencia történelme, az alkalmazási területek egy nagyobb része, melyek központi eleme a mesterséges intelligencia. Ezek mellett rámutat a mesterséges intelligencia különböző biztonsági réseire, illetve a kiberbiztonság területén való felhasználhatóságra. A cikk a jelenlegi mesterséges intelligencia alkalmazások egy szeletét mutatja be, melyek jól illusztrálják a széles felhasználási területet.

Summary. In the past years artificial intelligence has seen several improvements, which drove its usage to grow in various different areas and became the focus of many researches. This can be attributed to improvements made in the learning algorithms and Big Data techniques, which can provide tremendous amount of training.

The goal of this paper is to summarize the current state of artificial intelligence. We present its history, introduce the terminology used, and show technological areas using artificial intelligence as a core part of their applications. The paper also introduces the security concerns related to artificial intelligence solutions but also highlights how the technology can be used to enhance security in different applications. Finally, we present future opportunities and possible improvements. The paper shows some general artificial intelligence applications that demonstrate the wide range usage of the technology.

Many applications are built around artificial intelligence technologies and there are many services that a developer can use to achieve intelligent behavior. The foundation of different approaches is a well-designed learning algorithm, while the key to every learning algorithm is the quality of the data set that is used during the learning phase. There are applications that focus on image processing like face detection or other gesture detection to identify a person. Other solutions compare signatures while others are for object or plate number detection (for example the automatic parking system of an office building). Artificial intelligence and accurate data handling can be also used for anomaly detection in a real time system. For example, there are ongoing researches for anomaly detection at the ZalaZone autonomous car test field based on the collected sensor data. There are also more general applications like user profiling and automatic content recommendation by using behavior analysis techniques.

However, the artificial intelligence technology also has security risks needed to be eliminated before applying an application publicly. One concern is the generation of fake contents. These must be detected with other algorithms that focus on small but noticeable differences. It is also essential to protect the data which is used by the learning algorithm and protect the logic flow of the solution. Network security can help to protect these applications.

Artificial intelligence can also help strengthen the security of a solution as it is able to detect network anomalies and signs of a security issue. Therefore, the technology is widely used in IT security to prevent different type of attacks.

As different BigData technologies, computational power, and storage capacity increase over time, there is space for improved artificial intelligence solution that can learn from large and real time data sets. The advancements in sensors can also help to give more precise data for different solutions. Finally, advanced natural language processing can help with communication between humans and computer based solutions.

Open access

A nagy nyelvi modellek felsőoktatásra, valamint kis- és középvállalkozásokra gyakorolt hatásának értékelése adatvédelmi szempontból

Assessing the impact of large language models on higher education and SMEs from a data protection perspective

Scientia et Securitas
Author:
István Sabjanics

. (2022) Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime (A kiberbiztonsági tudatosság

Open access

Az önvezető autózás kihívásai és biztonsági kérdései a digitális államban

Challenges and safety, security questions of autonomous vehicles in the digital state

Scientia et Securitas
Authors:
Máté Zöldy
,
Zsolt Szalay
, and
Árpád Török

Cybersecurity International and Comparative Law Review 2019 19 2 76 96 Pinchon N

Open access

An assessment of cyber volunteer groups in interstate conflicts and their impact on public policies

Az önkéntes kibercsoportok értékelése az államközi konfliktusokban és hatásuk a közpolitikákra

Scientia et Securitas
Authors:
Botond Feledy
and
Csaba Virág

. https://ddosecrets.com/wiki/Category:Russia (Last edited: 21 November 2021) [Downloaded: 5 May 2022]. 10 FREE Cybersecurity & Humanitarian Services for the Ukraine War

Open access