Modern Quantum Technologies of Information Security against Cyber-terrorist Attacks
نویسندگان
چکیده
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In particular, a short review of existing commercial systems of quantum key distribution is given.
منابع مشابه
Modern Quantum Technologies of Information Security
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...
متن کاملA Review on Cyberspace Security: Lessons for Islamic Republic of Iran
Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...
متن کاملStatus and Requirements of Counter-Cyberterrorism
The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect comp...
متن کاملC . Modeling Behavior of the Cyber - Terrorist
The Cyber-Terrorist is assumed to be a very real threat to modern information systems, especially those trusted to control the nation’s defenses and critical infrastructure. Very little intelligence or solid data exist regarding this adversary. This discussion chronicles the efforts by a team at the Defense Advanced Research Projects Agency to model and characterize this adversary. The ultimate...
متن کاملNew Science and Technology in Line with Terrorist Groups in the Middle East
Abstract:Terrorism is a phenomenon that has spread to almost all parts of the world in the late 20th century and the beginning of the 21th century to the extent that many Middle East-ern countries have been subjected to such violence and unrest; in fact, with the advent of science and technology, particularly the global spread of the Internet and social net-works, the face of terrorism ha...
متن کامل