Online glossary of cyber security
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28120%2F19%3A63523585" target="_blank" >RIV/70883521:28120/19:63523585 - isvavai.cz</a>
Výsledek na webu
<a href="https://books.google.cz/books?id=b8-hDwAAQBAJ&pg=PP3&lpg=PP3&dq=isbn+978-1-912764-28-0&source=bl&ots=KOU-BFOqzq&sig=ACfU3U1RtLrpyGWI7i77CPBr6zwHrb065A&hl=cs&sa=X&ved=2ahUKEwju_tz39ILoAhXREcAKHU9DAs8Q6AEwAHoECA4QAQ#v=onepage&q=isbn%20978-1-912764-28-0&f=false" target="_blank" >https://books.google.cz/books?id=b8-hDwAAQBAJ&pg=PP3&lpg=PP3&dq=isbn+978-1-912764-28-0&source=bl&ots=KOU-BFOqzq&sig=ACfU3U1RtLrpyGWI7i77CPBr6zwHrb065A&hl=cs&sa=X&ved=2ahUKEwju_tz39ILoAhXREcAKHU9DAs8Q6AEwAHoECA4QAQ#v=onepage&q=isbn%20978-1-912764-28-0&f=false</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Online glossary of cyber security
Popis výsledku v původním jazyce
The research results published in the article aim to contribute to the solution for the absence of an internationally accepted and harmonized definition of cyber security and definitions of the related concepts. The goal of the case study is to create an Online Glossary of Cyber security as a Knowledge Management System (KMS) based on the software ATOM, a product of the Company AION-CS Zlín, Czech Republic. Characteristics and functions of the SW ATOM and its environments are mentioned in the paper. The literature review has confirmed that cyber security is a very frequently published topic, but the online dictionary or glossary is out of scientists’ interest not only about cyber security. The working methodology of the research includes the steps: assembling of glossary documents and their analysis, determination of integrative themes and areas, selection of concepts for the glossary, creation of an ontology of the KMS and implementation of the glossary. The content of the online glossary in the theme of cyber security is divided into the three relevant areas: 1) Assets protected against cyber threats and attacks; 2) Threats and attacks from cyberspace; and 3) Set of means for protection against cyber threats and attacks. The volume of concepts in the glossary is about 30 and they were chosen for the case study to highlight the advantage of the online glossary layout in a KMS format. The glossary as a KMS offers complexity and flexibility more than a book; it is valuable for analysis, integration, education and study purposes. For example, the ontology includes recursive associations to the class CONCEPT that makes it possible to link terms according to their hierarchy or affinity, thus increasing understanding of the theme, when there are relationships between glossary terms. However, the successful finishing of the idea depends on fulfilling some requirements and the solution takes time for a team of scientists.
Název v anglickém jazyce
Online glossary of cyber security
Popis výsledku anglicky
The research results published in the article aim to contribute to the solution for the absence of an internationally accepted and harmonized definition of cyber security and definitions of the related concepts. The goal of the case study is to create an Online Glossary of Cyber security as a Knowledge Management System (KMS) based on the software ATOM, a product of the Company AION-CS Zlín, Czech Republic. Characteristics and functions of the SW ATOM and its environments are mentioned in the paper. The literature review has confirmed that cyber security is a very frequently published topic, but the online dictionary or glossary is out of scientists’ interest not only about cyber security. The working methodology of the research includes the steps: assembling of glossary documents and their analysis, determination of integrative themes and areas, selection of concepts for the glossary, creation of an ontology of the KMS and implementation of the glossary. The content of the online glossary in the theme of cyber security is divided into the three relevant areas: 1) Assets protected against cyber threats and attacks; 2) Threats and attacks from cyberspace; and 3) Set of means for protection against cyber threats and attacks. The volume of concepts in the glossary is about 30 and they were chosen for the case study to highlight the advantage of the online glossary layout in a KMS format. The glossary as a KMS offers complexity and flexibility more than a book; it is valuable for analysis, integration, education and study purposes. For example, the ontology includes recursive associations to the class CONCEPT that makes it possible to link terms according to their hierarchy or affinity, thus increasing understanding of the theme, when there are relationships between glossary terms. However, the successful finishing of the idea depends on fulfilling some requirements and the solution takes time for a team of scientists.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Ostatní
Rok uplatnění
2019
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
European Conference on Information Warfare and Security, ECCWS
ISBN
978-1-912764-28-0
ISSN
2048-8602
e-ISSN
—
Počet stran výsledku
6
Strana od-do
72-77
Název nakladatele
Curran Associates, Inc.
Místo vydání
Milwaukee
Místo konání akce
Coimbra
Datum konání akce
4. 7. 2019
Typ akce podle státní příslušnosti
EUR - Evropská akce
Kód UT WoS článku
—