DATA PROTECTION AS A PART OF CYBER SECURITY

被引:0
|
作者
Capek, Jan [1 ]
机构
[1] Univ Pardubice, Fac Econ & Adm, Inst Syst Engn & Informat, Pardubice, Czech Republic
关键词
Cybersecurity; Data protection; Blockchain technology; Hash function;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Introduction of computers in all spheres of life substantially changed the ways of how people communicate and exchange information. It is creating a virtually paperless work environment. Keyless Signatures Infrastructures are an alternative solution to traditional PKI signatures. Storing and safely sending a large amount of information is a problem on one side, on the other hand increasing communication between things (for example smart cars, consumer houses etc.) requires a secure exchange of information where the blockchanging method is promising.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 50 条
  • [1] Building an Ecosystem for Cyber Security and Data Protection in India
    Godse, Vinayak
    ETHICS AND POLICY OF BIOMETRICS, 2010, 6005 : 138 - 145
  • [2] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection
    Parraguez Kobek, Luisa
    Caldera, Erick
    OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
  • [3] CYBER SECURITY AWARENESS OF CROATIAN STUDENTS AND THE PERSONAL DATA PROTECTION
    Papic, Anita
    Radoja, Katarina Knol
    Szombathelyi, Donata
    11TH INTERNATIONAL SCIENTIFIC SYMPOSIUM REGION, ENTREPRENEURSHIP, DEVELOPMENT (RED 2022), 2022, : 563 - 574
  • [4] Human Centric Cyber Security: What are the New Trends in Data Protection?
    Kassicieh, Sul
    Lipinski, Valerie
    Seazzu, Alessandro F.
    PICMET '15 PORTLAND INTERNATIONAL CENTER FOR MANAGEMENT OF ENGINEERING AND TECHNOLOGY, 2015, : 1321 - 1338
  • [5] CYBER SECURITY AS PART OF THE BUSINESS ENVIRONMENT
    Koraus, Antonin
    Veselovska, Stanislava
    Kelemen, Pavel
    INTERNATIONAL RELATIONS 2017: CURRENT ISSUES OF WORLD ECONOMY AND POLITICS, 2017, : 571 - 577
  • [6] Data mining and Cyber security
    Thuraisingham, B
    THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
  • [7] CYBER SECURITY AND DATA VISUALISATION
    Azvine, Ben
    Ghanea-Hercack, Robert
    JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2016, 10 : 9 - 13
  • [8] Sociological study of cyber threats as an integrated part of the general data protection regulation
    Muqsith, M. A.
    Muzykant, V. L.
    Pratomo, R. R.
    RUDN JOURNAL OF SOCIOLOGY-VESTNIK ROSSIISKOGO UNIVERSITETA DRUZHBY NARODOV SERIYA SOTSIOLOGIYA, 2023, 23 (04): : 851 - 865
  • [9] Cyber Security: Terms, Laws, Threats and Protection
    Jha, Manasi
    Anand, C. S.
    Mahawar, Yogesh
    Kalyan, Uday
    Verma, Vikas
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 148 - 151
  • [10] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20