Abstract
In the study, the author analyzed the basic conceptual environment of smart nations, the information security challenges, threats and dangers inherent in it. In the second half of the research, he seeks to answer the question of what are the most commonly used protection solutions against the threats that arise. To do these, the author has analyzed the available relevant literature and peer-reviewed reports to identify the areas most affected by potential threats, such as networks, clients and users, and the associated potential protection solutions. The analysis has produced a matrix illustrating which vulnerable areas could potentially benefit from protection solutions against typical attack vectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Singapore Government: Digital government blueprint (2018)
Nyikes, Z., Kovács, T.A., Tokody, D.: In situ testing of rail damages in accordance with Industry 4.0. J. Phys. Conf. Ser. (1742-6588 1742-6596) 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032
Observatory of Public Sector Innovation: Digital Transformation. https://oecd-opsi.org/guide/digital-transformation/. Last accessed 25 Sept 2021
OECD: The Path to Becoming a Data-Driven Public Sector OECD digital government studies. OECD Publishing, Paris (2019). https://doi.org/10.1787/059814a7-en
Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Proc. Manuf. (2351-9789) 22, 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130
Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater. (1013-9826 1662-9795) 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286
Sándor, M.: The interfaces of IT operation, development and cyber security, approached from the point of view of technical toolsets. Natl. Secur. Rev. 2, 73–85 (2019). 13 p
Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Complex Syst. (1334-4684 1334-4676) 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9
Sinha, P., Kumar Rai, A., Bhushan, B.: Information Security threats and attacks with conceivable counteraction. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), vol. 1, pp. 1208–1213 (2019, July). https://doi.org/10.1109/ICICICT46008.2019.8993384
Nyikes, Z.: Creation proposal for the digital competency framework of the middle-east European region. Key Eng. Mater. (1013-9826 1662-9795) 755, 106–111 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.106
Szádeczky, T.: Security of E-government website encryption in Germany and Hungary. Acad. Appl. Res. Military Public Manag. Sci. 17(2), 127–138 (2018). ISSN 2498-5392
Péter, B.: A közösségi média lehetőségei és kihívásai a védelmi szférában, Biztonság és honvédelem : Fenntartható biztonság és társadalmi környezet tanulmányok 2, Budapest, Magyarország : Ludovika Egyetemi Kiadó pp. 587–602 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature B.V.
About this paper
Cite this paper
Toth, A. (2022). Information Security Challenges and Solutions in Smart Nations. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_10
Download citation
DOI: https://doi.org/10.1007/978-94-024-2174-3_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-2173-6
Online ISBN: 978-94-024-2174-3
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)