Now showing 1 - 2 of 2
  • Publication
    Security Protocols Analysis in Relation to Information Structures Protection
    The concept of information warfare encompasses the use of information and communication technologies to gain an advantage over a potential opponent. The information warfare is the manipulation with the information that trusts the goal, so that the goal should make decisions about its interests in the interests of opponents. Information structures are treated as systems that process different types of information, provide storage and access to users. Such structures may enclose neural networks, self-learning systems etc. They need to be ready to learn, respond to threats and ensure their safety, which is topical in today's information warfare. The paper will examine theoretical aspects of ensuring the security of information structures from the system theory point of view. The description of information structures, analysis of their security protocols will be given. The knowledge base of the information structure can be a neural network, the training of which is secured from external interference. The research presents a description of a potential counteraction against the threats of information warfare against information systems (AI based on artificial neural networks). The CORAS methodology for risk analysis in case of threats to information structures was discussed.
  • Publication
    Ensuring the security of information structures in today's environment
    In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may include neural networks, adaptive learning systems, etc. This analytical article will cover more theoretical aspects related to the security of information systems from the system theory point of view. The author considers artificial neural networks as one of the potential threats in the context of information warfare.
    Scopus© Citations 2