6 research outputs found

    PERCEPTION OF THE INCREASED RISK OF PHIS

    Get PDF
    Measures in connection with the COVID-19 crisis have forced a change in the processes taking place in individual organizations - whether in education, state administration or the commercial sphere. CEOs and full-time employees have been forced to ensure that the organization's goals are met in an ever-changing legislative environment, outside the standard work environment, with increased time pressure, in times of financial security concerns, and in times of heightened health or even life concerns. These factors have weakened concerns about one's own security - including the protection of one's own identity or the protection of the employer's assets in cyberspace. The presented research was attended by students, some of them, especially external students, are employees of the public or commercial sphere. The aim of the research was to find out whether students noticed an increased incidence of phishing attacks during the COVID-19 crisis, how they responded to this fact as individuals and how the organizations in which they are employed reacted. Based on the results of this survey, it can be estimated whether users with the development of Internet services are aware that they are an integral part of the cybersecurity system and, based on this fact, adjust their behavior in cyberspace

    Use of the BOINC system for distributed data collection in the “Internet of Things”

    No full text
    The BOINC software package allows the creation of massive computational systems for distributed computing. The system is designed to use heterogeneous computing devices that are differing in hardware architecture and operating systems. The variability and versatility of the BOINC system allows its use to create a distributed system for measurement and data collection. This is done through the standard HTTP and HTTPS web communication protocol that is used on the Internet in connected devices, so called “Internet of things”

    Parallelization of computational algorithms for optimization problems with high time consumption

    No full text
    The paper presents an analysis of the use of optimization algorithms in parallel solutions and distributed computing systems. The primary goal is to use evolutionary algorithms and their implementation into parallel calculations. Parallelization of computational algorithms is suitable for the following cases - computational models with a large number of design variables or cases where the objective function evaluation is time consuming (FE analysis). As the software platform for application of distributed optimization algorithms is using MATLAB and BOINC software package

    Inclusion of cyber security mechanisms in the development of the telematics system

    No full text
    The increase in demand for the transport of people and goods is leading to a rapid development of transport systems. Data protection must include the privacy and security of end users, service providers and application providers. In this document, we propose a new data protection framework based on privacy and security technologies. Privacy technology allows users and service providers to define a flexible data model. Security technology provides traditional features such as encryption, authentication, and denial. In addition, it provides a secure environment for secure execution, which is necessary to restrict access to data for specific purposes. The increase in the number of system components places high demands on the management of the entire system. Intelligent control systems used by computer architectures such as cloud computing, fog computing, SDN or NFV architecture. The safety of this system is essential for safe and efficient transport. They also use development systems from research projects that improve the individual functions of telematics systems. Necessary solution already in the development phase, where the requirements of cyber security must be implemented. This study examines the weaknesses of cyber security. Threats and attacks exploiting these vulnerabilities are identified and classified. The final part proposes and discusses the development guidelines and mitigation strategies to be used in the development of autonomous and unmanned systems

    Parallelization of computational algorithms for optimization problems with high time consumption

    No full text
    The paper presents an analysis of the use of optimization algorithms in parallel solutions and distributed computing systems. The primary goal is to use evolutionary algorithms and their implementation into parallel calculations. Parallelization of computational algorithms is suitable for the following cases - computational models with a large number of design variables or cases where the objective function evaluation is time consuming (FE analysis). As the software platform for application of distributed optimization algorithms is using MATLAB and BOINC software package

    Comparation of nonuniform and uniform Monte - Carlo Searching

    No full text
    Nonuniform Monte-Carlo method is often used for optimization and solution of function mapping. This method has some disadvantages. New genetic algorithm, based on uniform Monte-Carlo is proposed by authors reduce disadvantage of nonuniform Monte- Carlo method. Both of these methods are based on random number generation and therefore the solutions are approximate. Statistical evaluation of solutions is used for comparison
    corecore