Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
Two mainstream topics have been widely discussed over the past few years: ways to reduce the human impact on nature and the way that the industrial revolution 4.0 changes industries. The aim of this research topic is to analyse the positive and negative factors of big data implementation in the sector of cryptocurrency (as part of the industrial revolution 4.0) and in the sector of municipal waste management. The analysis reveals the differences and similarities between the cryptocurrency and municipal waste management sectors in the context of big data. The findings are significant for the estimation of the technological development of digitalized and non-digitalized sectors.
Bitcoin, Cryptocurrencies and Blockchain technologies are widely discussed nowadays. The Bitcoin market value is discussed in top magazines, the names of people who earned money from cryptocurrencies are on the Richest People list. The Blockchain technology is said to be a one of disruption pioneers on the one hand, and cryptocurrency is said to be an illegal phenomenon on the other hand. The Fourth Industrial Revolution, which is based on digitalized industry is changing the power centres. Will cryptocurrency disrupt the financial sector? Or perhaps it will disrupt the retail market or global monetary policy. Disruptive technologies together with the Internet, Mobile Internet and Internet of Things are changing our world. While society has gained simple and reachable comfort for a cheaper price on the one hand, many people have lost their jobs on the other. Consequently, the authors presuppose discussion about the phenomenon of cryptocurrency through the context of social phenomena and legal regulation: divulge definitions, principles, relating to the topic; identify possible tendencies according to legal regulation and its practical realization.
In view of the changes taking place in society, social progress and the achievements of science and technology, the protection of fundamental rights must be strengthened. The aim of the article is to analyse the principles and peculiarities of safe management of the personal data in social networks. In this scientific article, methods of document analysis, scientific literature review, case study and generalization are used. Consumers themselves decide how much and what kind of information to publicize on the Facebook social network. In order to use the third-party applications, users at the time of authorization must confirm that they agree to give access to their personal data otherwise the service will not be provided. Personal data of the Facebook user comprise his/her public profile including user's photo, age, gender, and other public information; a list of friends; e-mail mail; time zone records; birthday; photos; hobbies, etc. Which personal data will be requested from the user depends on the third-party application. Analysis of the legal protection of personal data in the internet social networks reveals that it is limited to the international and European Union legal regulation on protection of the personal data in the online social networks. Users who make publicly available a large amount of personal information on the Facebook social network should decide on the issue if they want to share that information with third parties for the use of their services (applications). This article presents a model for user and third party application interaction, and an analysis of risks and recommendations to ensure the security of personal data of the user.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.