Analysis possibilities of the toolset of information security
Kárász, Balázs
2025-03-24T12:08:01Z
2025-03-24T12:08:01Z
2025-03-19
2676-9042
hu_HU
http://hdl.handle.net/20.500.14044/28512
Regarding the limited availability of compre hensive Hungarian
literature on this topic, this paper aims to collect tools of information
security utilised by all involved parties and present them to the professional audience in a structured manner. Involved parties consist
of users of information infrastructures who a re exposed to threats, defence personnel contributing to the maintenance of security
level, and attackers that probe the effectiveness of security systems. Tools are widely mapped, including concepts that belong to
the logical layer of cybersecurity, as well as physically manifested devices, systems, networks and programs. The objective of the research presented in this paper is to describe the tools by main dimensions and detailed characteristics in a way that, according to these attributes, a comprehensiv e analysis of comparison can be performed. As a result of
the analysis since tools are collected both from military and civil background the author makes efforts to determine ways of classification of information security tools, in order to facilitate more successful targeting of further researches of the topic both within
military, administrative (public service) and
civil context.
hu_HU
dc.format
PDF
hu_HU
en
hu_HU
Analysis possibilities of the toolset of information security
hu_HU
Open access
hu_HU
Óbudai Egyetem
hu_HU
Budapest
hu_HU
Bánki Donát Gépész és Biztonságtechnikai Mérnöki Kar