scholarly journals Kiberbiztonsági kompetencia hálózatok Európában – K+F+I lehetőségek a következő évtizedben

2020 ◽  
Vol 1 (1) ◽  
pp. 43-48
Author(s):  
Csaba Krasznay

Összefoglalás. Az elektronikusan tárolt információ biztonsága, általánosabban véve a kiberbiztonság, az egyik legnagyobb kihívás a 21. században. Folyamatosan jelennek meg újabb és újabb fenyegetések, melyekre innovatív és újszerű megoldásokat kell adni. Ezek az innovatív megoldások mindenképpen magukkal hozzák az olyan új típusú technológiák használatát az információbiztonságban, mint például a Nagy Adatokból (Big Data) való építkezés és az erre épülő mesterséges intelligencia. Ennek támogatása érdekében az Európai Unió a 2021 és 2027 közötti időszakban kiemelt fontosságúnak tartja a kiberbiztonsági innovációkat. A tanulmány bemutatja a kiberbiztonsági kompetenciahálózatok tervezetét, illetve ismerteti, hogy milyen kutatás-fejlesztés-innovációs lehetőségek lesznek a következő évtizedben Európában. Summary. Security of stored digital information and more generally, cybersecurity is one of the biggest challenges of the 21st century. Besides the negative effects of cybercrime, cyberespionage, or other state sponsored activities, like cyberwarfare, our society and economy should face the exposure of infocommunication systems all around us. At the dawn of 4th industrial revolution when the whole world is going to be digitalized and will be surrounded by networked digital devices in homes, cities and industry, new threats are constantly emerging that need to be responded with new innovative solutions. These innovative solutions should include the usage of big data and artificial intelligence built onto it. They should also give a response for the inherited risks of legacy systems that can be found in many critical information infrastructures. Meanwhile, they should protect the digital privacy of citizens by not giving out unnecessary user data which is contradictory with the need of big data and AI mentioned before. Due to the emerging cybersecurity threats and the virtually non-existence of European cybersecurity market, European Union gives high importance for cybersecurity innovation and will support it between 2021 and 2027. In the proposed budget for this period, approximately 3 billion of euros is expected to be spent to cybersecurity related research. On the one hand, that fund may help European research institutes, enterprises, and startups to appear on the global market, on the other hand this is the only possible way to regain Europe’s digital independence from the United States and China. In alignment with the European security policy, these innovative solutions may also lead to reducing the amount of cybercrime, ensure the resilience of continental critical information infrastructure and can help to establish strong European cyberwarfare capabilities. As Ursula von der Leyden, president of the European Commission said in her op-ed in February 2020, “The point is that Europe’s digital transition must protect and empower citizens, businesses and society as a whole. It has to deliver for people so that they feel the benefits of technology in their lives. To make this happen, Europe needs to have its own digital capacities – be it quantum computing, 5G, cybersecurity or artificial intelligence (AI). These are some of the technologies we have identified as areas for strategic investment, for which EU funding can draw in national and private sector funds.” The study presents the draft of cybersecurity competence networks and describes what R&D&I possibilities will be in Europe in the next decade.

2022 ◽  
pp. 83-112
Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


2020 ◽  
pp. 97-102
Author(s):  
Benjamin Wiggins

Can risk assessment be made fair? The conclusion of Calculating Race returns to actuarial science’s foundations in probability. The roots of probability rest in a pair of problems posed to Blaise Pascal and Pierre de Fermat in the summer of 1654: “the Dice Problem” and “the Division Problem.” From their very foundation, the mathematics of probability offered the potential not only to be used to gain an advantage (as in the case of the Dice Problem), but also to divide material fairly (as in the case of the Division Problem). As the United States and the world enter an age driven by Big Data, algorithms, artificial intelligence, and machine learning and characterized by an actuarialization of everything, we must remember that risk assessment need not be put to use for individual, corporate, or government advantage but, rather, that it has always been capable of guiding how to distribute risk equitably instead.


2018 ◽  
Vol 1 (1) ◽  
pp. 13-20
Author(s):  
Alexander Berger

The world observed a well-developed Russian strategy and military model have had destabilizing consequences and wide-ranging implications for international security, in particular for Europe, and global stability since the Ukraine crisis. Needless to say, most European countries and notably NATO conclude that Russian policy, military strategy, and military practice in the Ukraine crisis challenge the European security and carry significant implications for NATO, therefore the Ukraine crisis force the EU and NATO to concentrate on measures against Russian strategy.[1] In reality, Russia has already given the signals of its intentions via the Military Doctrine 2010 and Defense Strategy 2013 that list destabilization of the near abroad, in other words buffer zone, and NATO or the EU expansion, including deployment of military forces, as most relevant military threats. Both documents highlight that “Russia faced the very real threat of being side-lined in international affairs.” [2] Furthermore MacKinnon suggests that in line with its new regime change strategy, the United States forced the former Soviet Union’s member states to establish their political institutions, provided funds for the opposition, and supported revolutions in Georgia, Ukraine, and Kyrgyzstan. Thus, the revolutions added to the Kremlin’s perception that “Washington’s chief objective might have been to change the regime in Russia as well.”[3] Likewise, Russian Foreign Minister Sergei Lavrov said “NATO’s expansion by pulling more Russia’s neighboring countries into the alliance is unacceptable”.[4] Therefore it could be concluded from Russian point of view that everything should be done to prevent NATO and the EU expansion which can be characterized as the greatest threat to Russian security, and that’s why Russia must restore its status as a great power inside its own sphere of influence. It is the aim of this analytic paper to search why the EU and NATO have failed to manage the crisis emanating from Russian aggression and expansion in Ukraine, and to address the current strategic environment as well. I shall try to analyze the drivers and the reasons of NATO and the EU’s poor reaction against Russia, and finally I will emphasize why and how the roles of NATO and the European Security Strategy should be reconsidered in the light of energy security policy of the EU, and why NATO and the EU needs to improve their responsiveness rather than readiness.


2021 ◽  
pp. 349-356
Author(s):  
Yu Qing

Big data is profoundly changing our society and our way of production, life and thinking. At the same time, the development of big data continues to promote the innovation and breakthrough of artificial intelligence. Artificial intelligence is the focus of current research. All countries also raise artificial intelligence to the national strategic level and seize the commanding height of artificial intelligence. This paper analyzes the strategic characteristics of the development of artificial intelligence in the United States, Britain and Japan from the two dimensions of technology deployment and system guarantee. This paper studies the artificial intelligence technology based on big data and the development strategy of artificial intelligence, so as to provide a strategic idea for the development of artificial intelligence in China. The idea has a certain reference value for the research on the integrated development technology of artificial intelligence, big data and cloud computing.


Author(s):  
Myo Zarny ◽  
Meng Xu ◽  
Yi Sun

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.


Author(s):  
Ana Miodrag Zekavica ◽  
Aleksandar Djordjevic ◽  
Aleksandra Vukmirovic ◽  
Jovanka Vukmirovic ◽  
Milica Brankovic

Research question: Big Data represents a true business revolution in many areas, and, as such, in marketing research, as well. The subject of this study is the analysis of the existing stage, as well as of the achieved results in the implementation of the Big Data Technology in Serbia. Motivation: The success in managing the company depends on the ability to provide quality and comprehensive information by establishing personalized (1:1) communication with consumers on the global market in real or near real-time. This form of communication has become an imperative of the modern business decision-making process. Advanced Internet technologies, Cloud Computing (Cloud Technology), Big Data and Artificial Intelligence open a significant business potential for companies in Serbia to emerge on global markets. Idea: of this study is to perceive current business environment in Serbia through the prism of research development based on the Big Data technologies. Relevant hypotheses and conducted research have been set up with the aim of pointing to the potential of applying modern information-communication technologies, with an emphasis on artificial intelligence and the Big Data concept. Data: The survey was conducted on 154 business entities from the Serbian Business Register Agency’s database. The applied sampling method was a random analysis (selection was made randomly from the total number of selected companies, with the same probability of choice). Tools: An online survey was used, and respondents were contacted via e-mail. Findings: Research results, opinions and attitudes of managers, experts in the fields of marketing research and information technology, indicate a significant degree of justifiability of investments in new technologies in the Republic of Serbia and result in several proposals of certain measures and recommendations of incentives that should be conducted by the State. Contribution: The solutions in this paper are based upon the implementation of standardized procedures and advanced tools that could be used to overcome a "bottleneck" in the existing IT infrastructure, in order to enable a rapid collection and implementation of enabled data.


2018 ◽  
Author(s):  
Martin Obschonka ◽  
Neil Lee ◽  
Andrés Rodríguez-Pose ◽  
johannes Christopher Eichstaedt ◽  
Tobias Ebert

There is increasing interest in the potential of artificial intelligence and Big Data (e.g., generated via social media) to help understand economic outcomes and processes. But can artificial intelligence models, solely based on publicly available Big Data (e.g., language patterns left on social media), reliably identify geographical differences in entrepreneurial personality/culture that are associated with entrepreneurial activity? Using a machine learning model processing 1.5 billion tweets by 5.25 million users, we estimate the Big Five personality traits and an entrepreneurial personality profile for 1,772 U.S. counties. We find that these Twitter-based personality estimates show substantial relationships to county-level entrepreneurship activity, accounting for 20% (entrepreneurial personality profile) and 32% (all Big Five trait as separate predictors in one model) of the variance in local entrepreneurship and are robust to the introduction in the model of conventional economic factors that affect entrepreneurship. We conclude that artificial intelligence methods, analysing publically available social media data, are indeed able to detect entrepreneurial patterns, by measuring territorial differences in entrepreneurial personality/culture that are valid markers of actual entrepreneurial behaviour. More importantly, such social media datasets and artificial intelligence methods are able to deliver similar (or even better) results than studies based on millions of personality tests (self-report studies). Our findings have a wide range of implications for research and practice concerned with entrepreneurial regions and eco-systems, and regional economic outcomes interacting with local culture.


Author(s):  
Andrii Semenog

The article substantiates that the successful development of the digital economy is closely linked to progress in several “frontier technologies”, among which the most important are such software-oriented technologies as Blockchain, the Internet of Things (IoT), Big Data Analytics, Artificial Intelligence (AI), Cloud Computing, Artificial Intelligence (AI). It is determined that together these technologies provide new opportunities for better analysis, processing and use of digital information, which gives new opportunities for companies to improve their efficiency by offering new, more personalized products and services. In general, the article analyzes the leading technologies used in the formation of the digital economy, identifies their essence, types, and methods of practical application. The properties, potential advantages, and risks of blockchain technology are studied. The article gives examples of companies that use blockchain. They represent such areas as finance, data management, energy, government, transport, health. The main components of the Internet of Things are identified. These include means of identification, means of measurement, means of data transmission, means of data processing, performing devices. The hierarchy of the Internet of Things is also given. It consists of personal wearable devices, smart homes, and smart industry (industrial internet). The phases of the “industrial Internet” development are presented. The essence and constituent characteristics of Big Data are determined. Among them: volume, velocity, variety, value, veracity, variability, visualization. It is determined that the key sources of Big Data are information from the Internet; readings of various devices; corporate information. The competitive advantages of companies that use Big Data are given. Also, the advantages and models of using cloud technologies are described. The essence and components of artificial intelligence are determined. An example of its application in the economic activity of companies is presented.


2006 ◽  
Vol 58 (4) ◽  
pp. 414-444
Author(s):  
Dejan Orlic

The author explores the operational capability of the European defense policy in the last 3 years. From the creation and adoption of the European Security Strategy, the European Union has made several specific steps in the development of the European Security and Defense Policy. Despite the disagreements with the United States about Iraq and the internal divisions in the "New and Old Europe" EU has shown the ability to set new military and civilian goals, make a small, but effective battle group concept for crisis management and conflict prevention as well as the European Defense Agency. The author also describes the main operations and missions of EU in the world, ranging from the Balkans and Africa to the Middle East and Eastern Asia. Finally, the paper analyses the Constitution for Europe and the articles concerning ESDP.


2019 ◽  
Vol 95 (2) ◽  
pp. 277-295
Author(s):  
Trevor McCrisken ◽  
Maxwell Downman

Abstract With its 2018 Nuclear Posture Review, the Trump administration expanded the scope of US nuclear deterrence, re-emphasizing the importance of non-strategic nuclear weapons, perceptively lowering the threshold for nuclear use and casting doubt on the future of arms control. The authors argue that these changes are consistent with the administration's wider ‘peace through strength’ approach that draws on traditional Republican thinking on security policy. While designed to demonstrate credibility and resolve to both allies and adversaries, however, this assertive approach to security policy and specifically nuclear policy as a necessary precursor to renewed engagement in strategic negotiations may have unintended consequences. This article focuses on European reactions to the strategy and argues that the Trump administration's nuclear posture challenges common European understandings in three principal areas. First, changes to US declaratory policy contest European assumptions on the role of nuclear weapons in defending NATO. Second, US modernization plans and their implications for intra-alliance relations risk accentuating controversial debates about the US commitment to Europe. Third, the apparent US rejection of arms control widens the scope for discord with European leaders. If European leaders assert a clear and credible alternative vision advocating nuclear restraint, risk reduction and arms control they could rebuild trust and confidence between the United States, NATO and Russia, demonstrating real strength and ultimately leading to more genuine opportunities for peace and sustainable European security.


Sign in / Sign up

Export Citation Format

Share Document