Show simple item record

Kárász, Balázs
2025-03-24T12:08:01Z
2025-03-24T12:08:01Z
2025-03-19
2676-9042hu_HU
http://hdl.handle.net/20.500.14044/28512
Regarding the limited availability of compre hensive Hungarian literature on this topic, this paper aims to collect tools of information security utilised by all involved parties and present them to the professional audience in a structured manner. Involved parties consist of users of information infrastructures who a re exposed to threats, defence personnel contributing to the maintenance of security level, and attackers that probe the effectiveness of security systems. Tools are widely mapped, including concepts that belong to the logical layer of cybersecurity, as well as physically manifested devices, systems, networks and programs. The objective of the research presented in this paper is to describe the tools by main dimensions and detailed characteristics in a way that, according to these attributes, a comprehensiv e analysis of comparison can be performed. As a result of the analysis since tools are collected both from military and civil background the author makes efforts to determine ways of classification of information security tools, in order to facilitate more successful targeting of further researches of the topic both within military, administrative (public service) and civil context.hu_HU
dc.formatPDFhu_HU
enhu_HU
Analysis possibilities of the toolset of information securityhu_HU
Open accesshu_HU
Óbudai Egyetemhu_HU
Budapesthu_HU
Bánki Donát Gépész és Biztonságtechnikai Mérnöki Karhu_HU
Óbudai Egyetemhu_HU
Műszaki tudományok - informatikai tudományokhu_HU
Tudományos cikkhu_HU
Biztonsgátudományi Szemlehu_HU
local.tempfieldCollectionsFolyóiratcikkekhu_HU
10.12700/btsz.2025.7.1.65
Kiadói változathu_HU
11 p.hu_HU
1. sz.hu_HU
7. évf.hu_HU
2025hu_HU
Óbudai Egyetemhu_HU


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record