Kontaktujte nás | Jazyk: čeština English
dc.title | Inclusion of cyber security mechanisms in the development of the telematics system | en |
dc.contributor.author | Handriková, Jana | |
dc.contributor.author | Mihoková Jakubčeková, Júlia | |
dc.contributor.author | Stachová, Darina | |
dc.contributor.author | Benčíková, Eleonóra | |
dc.relation.ispartof | Transbaltica XII: Transportation Science and Technology | |
dc.identifier.issn | 2523-3440 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.issn | 2523-3459 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2022 | |
dc.citation.spage | 375 | |
dc.citation.epage | 384 | |
dc.event.title | 12th International Scientific Conference on Transbaltica - Transportation Science and Technology (TRANSBALTICA) | |
dc.event.location | Vilnius | |
utb.event.state-en | Lithuania | |
utb.event.state-cs | Litva | |
dc.event.sdate | 2021-09-16 | |
dc.event.edate | 2021-09-17 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Springer International Publishing Ag | |
dc.identifier.doi | 10.1007/978-3-030-94774-3_37 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-3-030-94774-3_37 | |
dc.subject | cyber security | en |
dc.subject | cyber risk | en |
dc.subject | cyber threat | en |
dc.subject | cyber terrorism | en |
dc.subject | cyber-attack | en |
dc.subject | critical infrastructure | en |
dc.subject | cyber space | en |
dc.description.abstract | The increase in demand for the transport of people and goods is leading to a rapid development of transport systems. Data protection must include the privacy and security of end users, service providers and application providers. In this document, we propose a new data protection framework based on privacy and security technologies. Privacy technology allows users and service providers to define a flexible data model. Security technology provides traditional features such as encryption, authentication, and denial. In addition, it provides a secure environment for secure execution, which is necessary to restrict access to data for specific purposes. The increase in the number of system components places high demands on the management of the entire system. Intelligent control systems used by computer architectures such as cloud computing, fog computing, SDN or NFV architecture. The safety of this system is essential for safe and efficient transport. They also use development systems from research projects that improve the individual functions of telematics systems. Necessary solution already in the development phase, where the requirements of cyber security must be implemented. This study examines the weaknesses of cyber security. Threats and attacks exploiting these vulnerabilities are identified and classified. The final part proposes and discusses the development guidelines and mitigation strategies to be used in the development of autonomous and unmanned systems. | en |
utb.faculty | Faculty of Logistics and Crisis Management | |
dc.identifier.uri | http://hdl.handle.net/10563/1010943 | |
utb.identifier.obdid | 43883813 | |
utb.identifier.wok | 000763725500037 | |
utb.source | C-wok | |
dc.date.accessioned | 2022-04-14T07:07:43Z | |
dc.date.available | 2022-04-14T07:07:43Z | |
utb.contributor.internalauthor | Benčíková, Eleonóra | |
utb.wos.affiliation | [Handrikova, Jana; Jakubcekova, Julia Mihokova; Stachova, Darina] Univ Zilina, Fac Secur Engn, Univ 8215-1, Zilina 01026, Slovakia; [Bencikova, Eleonora] Tomas Bata Univ Zlin, Fac Logist & Crisis Management, Nam TG Masaryka 5555, Zlin 76001, Czech Republic |
Soubory | Velikost | Formát | Zobrazit |
---|---|---|---|
K tomuto záznamu nejsou připojeny žádné soubory. |