Protection of Information and Communication Systems

  • Jiří Barta
  • Veronika Sadovská
  • Albert Srník
  • Jiří F. Urbánek
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 413)


Awareness, education and protection of organizational information secure environments are currently highly serious and relevant topics. The paper deals with the perspectives and possibilities of "new approaches" to the protection of information and communication systems and nets as a part of Czech Republic critical infrastructure. It means that selected technologies are used, considering new perspectives to interoperable management training and education. The first part of this paper is focused on the current state of organization management information systems in Czech Republic. The second part concentrates on the possibilities of new technologies application and computer-aided tools, protecting information ( communication systems and other assets.


Interoperability Security environment Assets Communication and information systems Safety 


  1. 1.
    Allen, R.: The PENGUIN English Dictionary. Penguin Books (2003)Google Scholar
  2. 2.
    Božek, F., Urban, R.: Management rizika. Univerzita obrany, Brno (2008)Google Scholar
  3. 3.
    Božek, F., Ješonková, L., Dvořák, J., Božek, A.: General Procedure of Risk Management. Ekonomika a management 3, 15–24 (2012)Google Scholar
  4. 4.
    Dardick, G.: Cyber Forensics Assurance. In: The Proceedings of the 8th Australian Digital Forensics Conference, pp. 57–64. Cowan University, Perth Western Australia (2010)Google Scholar
  5. 5.
    Halibozek, E.P., Kovacich, G.L.: Securing corporate assets: Protecting a business against cloak-and-dagger tactics requires a manager’s eye for efficiency. Industrial Engineer: IE 35, 39–43 (2003)Google Scholar
  6. 6.
    Knopová, M.: Bezpečnost dat v informačních systémech. Ikaros 15 (2011),
  7. 7.
    Ludík, T., Navrátil, J., Langerová, A.: Process Oriented Architecture for Emergency Scenarios in the Czech Republic. World Academy of Science, Engineering and Technology 1, 2342–2351 (2011)Google Scholar
  8. 8.
    Ludík, T., Ráček, J.: Process methodology for emergency management. In: Hřebíček, J., Schimak, G., Denzer, R. (eds.) ISESS 2011. IFIP AICT, vol. 359, pp. 302–309. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Mitnick, K.D., Simon, W.L.: The art of deception: controlling the human element of security. Wiley, Indianapolis (2002)Google Scholar
  10. 10.
    Proházková, D. a kol.: Bezpečnost a krizové řízení. Police history, Praha (2006)Google Scholar
  11. 11.
    Urbánek, J.F., et al.: Scénáře adaptivní kamufláže. Tribun EU, Brno (2012)Google Scholar
  12. 12.
    Urbánek, J.F., et al.: Crisis Scenarios. Univerzity of Defence, Brno (2013)Google Scholar
  13. 13.
    Urbánek, J.F., Průcha, J.: A Development of Wireless Interoper-mobile Application for Outdoor Operation Management. In: 8th Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, EHAC 2009, pp. 57–64. WSEAS Press (2009)Google Scholar
  14. 14.
    Czech Republic Legislation Decree. 523/2005 Coll., on the security of information and communication systems..In Czech Republic Statute BookGoogle Scholar
  15. 15.
    Czech Republic Act No. 412/2005 Coll., on the protection of Classified Information and Security. In Czech Republic Statute BookGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Jiří Barta
    • 1
  • Veronika Sadovská
    • 1
  • Albert Srník
    • 1
  • Jiří F. Urbánek
    • 1
  1. 1.University of DefenceBrnoCzech Republic

Personalised recommendations