1,878,234 research outputs found

    The State of Economics of Information Security

    Get PDF

    Information security as a component of the economic security of the state

    Get PDF
    Рассмотрены этапы развития информационной безопасности в мире, начиная с периода Второй мировой войны и закачивая условиями современности. Проанализировано текущее состояние Интернет-угроз, охарактеризованы наиболее уязвимые пользователи глобальной сети.Розглянуто етапи розвитку інформаційної безпеки в світі, починаючи з періоду Другої світової війни і закінчуючи умовами сучасності. Проаналізовано поточний стан Інтернет-загроз, охарактеризовані найбільш вразливі користувачі глобальної мережі.The stages of the development of information security in the world beginning with the period of the Second World War and uploading the conditions of the present are viewed. The current state of Internet threats is analyzed, the most vulnerable users of the global network are characterized

    Quantum cryptography with 3-state systems

    Full text link
    We consider quantum cryptographic schemes where the carriers of information are 3-state particles. One protocol uses four mutually unbiased bases and appears to provide better security than obtainable with 2-state carriers. Another possible method allows quantum states to belong to more than one basis. The security is not better, but many curious features arise.Comment: 11 pages Revte

    The Impact of Information Security Technologies Upon Society

    Get PDF
    This paper's aims are concerned with the effects of information security technologies upon society in general and civil society organisations in particular. Information security mechanisms have the potential to act as enablers or disablers for the work of civil society groups. Recent increased emphasis on national security issues by state actors, particularly 'anti-terrorism' initiatives, have resulted in legislative instruments that impinge upon the civil liberties of many citizens and have the potential to restrict the free flow of information vital for civil society actors. The nascent area of cyberactivism, or hactivism, is at risk of being labelled cyberterrorism, with the accompanying change of perception from a legitimate form of electronic civil disobedience to an abhorrent crime. Biometric technology can be an invasive intrusion into citizens' privacy. Internet censorship and surveillance is widespread and increasing. These implementations of information security technology are becoming more widely deployed with profound implications for the type of societies that will result

    Best Practices and the State of Information Security

    Get PDF
    The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today\u27s global marketplace

    Best Practices and the State of Information Security

    Get PDF
    The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today\u27s global marketplace
    corecore