Online glossary of cyber security
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28120%2F19%3A63523585" target="_blank" >RIV/70883521:28120/19:63523585 - isvavai.cz</a>
Result on the web
<a href="https://books.google.cz/books?id=b8-hDwAAQBAJ&pg=PP3&lpg=PP3&dq=isbn+978-1-912764-28-0&source=bl&ots=KOU-BFOqzq&sig=ACfU3U1RtLrpyGWI7i77CPBr6zwHrb065A&hl=cs&sa=X&ved=2ahUKEwju_tz39ILoAhXREcAKHU9DAs8Q6AEwAHoECA4QAQ#v=onepage&q=isbn%20978-1-912764-28-0&f=false" target="_blank" >https://books.google.cz/books?id=b8-hDwAAQBAJ&pg=PP3&lpg=PP3&dq=isbn+978-1-912764-28-0&source=bl&ots=KOU-BFOqzq&sig=ACfU3U1RtLrpyGWI7i77CPBr6zwHrb065A&hl=cs&sa=X&ved=2ahUKEwju_tz39ILoAhXREcAKHU9DAs8Q6AEwAHoECA4QAQ#v=onepage&q=isbn%20978-1-912764-28-0&f=false</a>
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Online glossary of cyber security
Original language description
The research results published in the article aim to contribute to the solution for the absence of an internationally accepted and harmonized definition of cyber security and definitions of the related concepts. The goal of the case study is to create an Online Glossary of Cyber security as a Knowledge Management System (KMS) based on the software ATOM, a product of the Company AION-CS Zlín, Czech Republic. Characteristics and functions of the SW ATOM and its environments are mentioned in the paper. The literature review has confirmed that cyber security is a very frequently published topic, but the online dictionary or glossary is out of scientists’ interest not only about cyber security. The working methodology of the research includes the steps: assembling of glossary documents and their analysis, determination of integrative themes and areas, selection of concepts for the glossary, creation of an ontology of the KMS and implementation of the glossary. The content of the online glossary in the theme of cyber security is divided into the three relevant areas: 1) Assets protected against cyber threats and attacks; 2) Threats and attacks from cyberspace; and 3) Set of means for protection against cyber threats and attacks. The volume of concepts in the glossary is about 30 and they were chosen for the case study to highlight the advantage of the online glossary layout in a KMS format. The glossary as a KMS offers complexity and flexibility more than a book; it is valuable for analysis, integration, education and study purposes. For example, the ontology includes recursive associations to the class CONCEPT that makes it possible to link terms according to their hierarchy or affinity, thus increasing understanding of the theme, when there are relationships between glossary terms. However, the successful finishing of the idea depends on fulfilling some requirements and the solution takes time for a team of scientists.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2019
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
European Conference on Information Warfare and Security, ECCWS
ISBN
978-1-912764-28-0
ISSN
2048-8602
e-ISSN
—
Number of pages
6
Pages from-to
72-77
Publisher name
Curran Associates, Inc.
Place of publication
Milwaukee
Event location
Coimbra
Event date
Jul 4, 2019
Type of event by nationality
EUR - Evropská akce
UT code for WoS article
—