This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification...This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.展开更多
2024 marks the tenth anniversary of a holistic approach to national security. As an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, a holistic approach to national se...2024 marks the tenth anniversary of a holistic approach to national security. As an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, a holistic approach to national security provides fundamental guidance for China's national security work in the new era and is, therefore, of great theoretical and practical significance. This approach has several distinct features: it ref lects the trends of our times, is deeply rooted in China's national culture, and follows a people-centered, struggle-oriented, systematic, st rategic, in novative, and practice-based approach. By upholding and developing a holistic approach to national security, the Central Committee of the Communist Party of China(CPC) has comprehensively strengthened the Party's absolute leadership over national security, reshaped the systems and mechanisms for national security across the board, and made brilliant achievements in national security work in the new era. Given the context of the momentous changes unseen in a century that shape today's world, the national security situation facing China is increasingly complex and grim, characterized by many challenges and new characteristics. On the new journey toward rejuvenating the nation and building China into a strong country, we should fully implement the spirit of the 20th CPC National Congress, firmly pursue a holistic approach to national security, and accelerate the modernization of China's national security system and capacity to ensure steady and sustained progress in Chinese modernization.展开更多
Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w...Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common.展开更多
In this article, the researchers tried to evaluate the contribution of civil society to Mongolian democracy and the problems faced by civil society. In addition, the article aimed to determine the unique national crit...In this article, the researchers tried to evaluate the contribution of civil society to Mongolian democracy and the problems faced by civil society. In addition, the article aimed to determine the unique national criteria of Mongolian democracy and the need to create an organization to monitor the process of democracy. The process of identifying important documents and ideals for the development of Mongolian civil society today is still in its early stages. It can be said that the approval of the democratic constitution and the first free and fair parliamentary elections as a country that has newly and restored democracy became another impetus for the creation of a new type of citizen organization. It is characterized by trying to study the changes that have occurred since this historical period at the intersection of political science and security studies. One of the most important issues today is to find out how many non-governmental and civil society organizations exist in Mongolia today, which are Western-oriented, focused on specific issues, have their own position and opinion, are specialized, and are capable of influencing government policy. On the other hand, in this article, we emphasize whether non-governmental and civil society organizations, which aim to hold the government accountable, and carry out influence and control activities, are fully developed.展开更多
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic...This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat...Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.展开更多
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has...The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.展开更多
The structure of the National Security Council(NSC)under Donald Trump has been tweaked only slightly on the basis of the previous administration’s"three tiers of committees"model,and without any breakthroug...The structure of the National Security Council(NSC)under Donald Trump has been tweaked only slightly on the basis of the previous administration’s"three tiers of committees"model,and without any breakthrough in reform.However,the NSC also faces a series of new changes and features,including instability caused by changes in the President’s entourage,and dysfunction induced by the decreased number of formal meetings.These changes may be attributed principally to the impact of Trump’s governing style,management style and informal decision-making process.The NSC’s role in the decision-making system varies according to the frequent changes in National Security Advisor.In the 70 plus year history of the NSC,it is evident that its development direction is determined by structural changes in the international pattern,US national security challenges and the transfer of power within the decision-making system.How the President positions and utilizes the NSC ultimately determines the structure and efficiency of the mechanism.展开更多
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of sec...The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study.展开更多
Counterterrorism,de-radicalization and anti-violence are the major tasks of the international community.As the arch enemy of human rights,terrorism destroys the constitutional order and endangers people’s lives,freed...Counterterrorism,de-radicalization and anti-violence are the major tasks of the international community.As the arch enemy of human rights,terrorism destroys the constitutional order and endangers people’s lives,freedom and safety.It is the obligation of modern countries and the core value of legal states to safeguard human rights.Human rights should be effectively safeguarded under the premise of building a sound constitutional order and national security.public order and social stability foster a sound environment for the protection of human rights.In the face of terrorism’s severe threat to human rights,all countries are re-examining the order of human rights values and seeking mechanisms and procedures to balance National Security and Human Rights through their constitutions.The concepts of human rights and social order and the ways to explain the two are different due to different constitutional systems and cultural and religious traditions.However,they do have something in common,that is,counterterrorism and de-radicalization do not conflict with human rights protection.Efforts should be made to foster a view of human rights based on security and a view of security based on human rights,and a dynamic principle of proportionality established for counterterrorism and human rights protection,so endowing the traditional principle of proportionality with flexible,rich value connotation.展开更多
The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in ...The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa.展开更多
A ten-month field research study was meticulously conducted at Robert Moses State Park (RMSP) on the south shore of Long Island, NY. The objective was to determine if aerial phenomena of an unknown nature exist over a...A ten-month field research study was meticulously conducted at Robert Moses State Park (RMSP) on the south shore of Long Island, NY. The objective was to determine if aerial phenomena of an unknown nature exist over a coastal location and to characterize their properties and behaviors. Primary and secondary field observation methods were utilized in this data-centric study. Forensic engineering principles and methodologies guided the study. The challenges set forward were object detection, observation, and characterization, where multispectral electro-optical devices and radar were employed due to limited visual acuity and intermittent presentation of the phenomena. The primary means of detection utilized a 3 cm X-band radar operating in two scan geometries, the X- and Y-axis. Multispectral electro-optical devices were utilized as a secondary means of detection and identification. Data was emphasized using HF and LF detectors and spectrum analyzers incorporating EM, ultrasonic, magnetic, and RF field transducers to record spectral data in these domains. Data collection concentrated on characterizing VIS, NIR, SWIR, LWIR, UVA, UVB, UVC, and the higher energy spectral range of ionizing radiation (alpha, beta, gamma, and X-ray) recorded by Geiger-Müller counters as well as special purpose semiconductor diode sensors.展开更多
In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively re...In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements.展开更多
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ...Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.展开更多
On the basis of the authors’ experiences of setting up an NGDC Web site,this paper attempts to present some significant aspects about the security of NGDC based on ASP.They include data storing,database maintenance,n...On the basis of the authors’ experiences of setting up an NGDC Web site,this paper attempts to present some significant aspects about the security of NGDC based on ASP.They include data storing,database maintenance,new technical support and so on.Firstly,this paper discusses how to provide the security of data which is saved in the hosts of NGDC.The security model of "Networks_DB Server_DB_DB Object" is also presented.In Windows NT Server,Internet Information Server (i.e.,IIS) is in charge of transferring message and the management of Web sites.ASP is also based on IIS.The advantages of virtual directory technique provided by IIS are emphasized. An NGDC Web site,at the Research Center of GIS in Wuhan Technical University of Surveying and Mapping is also mentioned in this paper.Because it is only an analoge used for case study,the transmission of digital spatial products is not included in the functions in this NGDC Web site.However,the management of spatial metadata is more important and some functions of metadata query are implemented in it.It is illustrated clearly in the functional diagram of the NGDC Web site.展开更多
The fourth wave science and technology revolution is quickly ushering in a worldwide military revolution.The major powers such as the United States,Russia and China are all striving to catch up with the wave by accele...The fourth wave science and technology revolution is quickly ushering in a worldwide military revolution.The major powers such as the United States,Russia and China are all striving to catch up with the wave by accelerating their own research on new military technology and the deployment of new military equipment.This presents significant changes to the international security system:the existing disarmament and arms control system is on the brink of collapse,strategic competition among the big powers has intensified,and the risk of global turbulence is on the rise.The future of international security and its mechanism depends both on the method and direction of the technology revolution,and on the ability of the big powers to put aside their differences and avoid conflict in the major arenas of competition.In this process,China should seek to play a bigger and more constructive role.This would not only be conducive to world peace and development,but is also the only way for China to secure a seat in the future international system.展开更多
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar...Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.展开更多
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic...Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.
文摘2024 marks the tenth anniversary of a holistic approach to national security. As an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, a holistic approach to national security provides fundamental guidance for China's national security work in the new era and is, therefore, of great theoretical and practical significance. This approach has several distinct features: it ref lects the trends of our times, is deeply rooted in China's national culture, and follows a people-centered, struggle-oriented, systematic, st rategic, in novative, and practice-based approach. By upholding and developing a holistic approach to national security, the Central Committee of the Communist Party of China(CPC) has comprehensively strengthened the Party's absolute leadership over national security, reshaped the systems and mechanisms for national security across the board, and made brilliant achievements in national security work in the new era. Given the context of the momentous changes unseen in a century that shape today's world, the national security situation facing China is increasingly complex and grim, characterized by many challenges and new characteristics. On the new journey toward rejuvenating the nation and building China into a strong country, we should fully implement the spirit of the 20th CPC National Congress, firmly pursue a holistic approach to national security, and accelerate the modernization of China's national security system and capacity to ensure steady and sustained progress in Chinese modernization.
文摘Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common.
文摘In this article, the researchers tried to evaluate the contribution of civil society to Mongolian democracy and the problems faced by civil society. In addition, the article aimed to determine the unique national criteria of Mongolian democracy and the need to create an organization to monitor the process of democracy. The process of identifying important documents and ideals for the development of Mongolian civil society today is still in its early stages. It can be said that the approval of the democratic constitution and the first free and fair parliamentary elections as a country that has newly and restored democracy became another impetus for the creation of a new type of citizen organization. It is characterized by trying to study the changes that have occurred since this historical period at the intersection of political science and security studies. One of the most important issues today is to find out how many non-governmental and civil society organizations exist in Mongolia today, which are Western-oriented, focused on specific issues, have their own position and opinion, are specialized, and are capable of influencing government policy. On the other hand, in this article, we emphasize whether non-governmental and civil society organizations, which aim to hold the government accountable, and carry out influence and control activities, are fully developed.
文摘This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.
文摘The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.
文摘The structure of the National Security Council(NSC)under Donald Trump has been tweaked only slightly on the basis of the previous administration’s"three tiers of committees"model,and without any breakthrough in reform.However,the NSC also faces a series of new changes and features,including instability caused by changes in the President’s entourage,and dysfunction induced by the decreased number of formal meetings.These changes may be attributed principally to the impact of Trump’s governing style,management style and informal decision-making process.The NSC’s role in the decision-making system varies according to the frequent changes in National Security Advisor.In the 70 plus year history of the NSC,it is evident that its development direction is determined by structural changes in the international pattern,US national security challenges and the transfer of power within the decision-making system.How the President positions and utilizes the NSC ultimately determines the structure and efficiency of the mechanism.
文摘The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study.
文摘Counterterrorism,de-radicalization and anti-violence are the major tasks of the international community.As the arch enemy of human rights,terrorism destroys the constitutional order and endangers people’s lives,freedom and safety.It is the obligation of modern countries and the core value of legal states to safeguard human rights.Human rights should be effectively safeguarded under the premise of building a sound constitutional order and national security.public order and social stability foster a sound environment for the protection of human rights.In the face of terrorism’s severe threat to human rights,all countries are re-examining the order of human rights values and seeking mechanisms and procedures to balance National Security and Human Rights through their constitutions.The concepts of human rights and social order and the ways to explain the two are different due to different constitutional systems and cultural and religious traditions.However,they do have something in common,that is,counterterrorism and de-radicalization do not conflict with human rights protection.Efforts should be made to foster a view of human rights based on security and a view of security based on human rights,and a dynamic principle of proportionality established for counterterrorism and human rights protection,so endowing the traditional principle of proportionality with flexible,rich value connotation.
文摘The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa.
文摘A ten-month field research study was meticulously conducted at Robert Moses State Park (RMSP) on the south shore of Long Island, NY. The objective was to determine if aerial phenomena of an unknown nature exist over a coastal location and to characterize their properties and behaviors. Primary and secondary field observation methods were utilized in this data-centric study. Forensic engineering principles and methodologies guided the study. The challenges set forward were object detection, observation, and characterization, where multispectral electro-optical devices and radar were employed due to limited visual acuity and intermittent presentation of the phenomena. The primary means of detection utilized a 3 cm X-band radar operating in two scan geometries, the X- and Y-axis. Multispectral electro-optical devices were utilized as a secondary means of detection and identification. Data was emphasized using HF and LF detectors and spectrum analyzers incorporating EM, ultrasonic, magnetic, and RF field transducers to record spectral data in these domains. Data collection concentrated on characterizing VIS, NIR, SWIR, LWIR, UVA, UVB, UVC, and the higher energy spectral range of ionizing radiation (alpha, beta, gamma, and X-ray) recorded by Geiger-Müller counters as well as special purpose semiconductor diode sensors.
文摘In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements.
文摘Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.
文摘On the basis of the authors’ experiences of setting up an NGDC Web site,this paper attempts to present some significant aspects about the security of NGDC based on ASP.They include data storing,database maintenance,new technical support and so on.Firstly,this paper discusses how to provide the security of data which is saved in the hosts of NGDC.The security model of "Networks_DB Server_DB_DB Object" is also presented.In Windows NT Server,Internet Information Server (i.e.,IIS) is in charge of transferring message and the management of Web sites.ASP is also based on IIS.The advantages of virtual directory technique provided by IIS are emphasized. An NGDC Web site,at the Research Center of GIS in Wuhan Technical University of Surveying and Mapping is also mentioned in this paper.Because it is only an analoge used for case study,the transmission of digital spatial products is not included in the functions in this NGDC Web site.However,the management of spatial metadata is more important and some functions of metadata query are implemented in it.It is illustrated clearly in the functional diagram of the NGDC Web site.
文摘The fourth wave science and technology revolution is quickly ushering in a worldwide military revolution.The major powers such as the United States,Russia and China are all striving to catch up with the wave by accelerating their own research on new military technology and the deployment of new military equipment.This presents significant changes to the international security system:the existing disarmament and arms control system is on the brink of collapse,strategic competition among the big powers has intensified,and the risk of global turbulence is on the rise.The future of international security and its mechanism depends both on the method and direction of the technology revolution,and on the ability of the big powers to put aside their differences and avoid conflict in the major arenas of competition.In this process,China should seek to play a bigger and more constructive role.This would not only be conducive to world peace and development,but is also the only way for China to secure a seat in the future international system.
基金This researchwork is supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R411),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.
文摘Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance.