<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eugene Nickolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Information Infrastructure Protection</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Information Infrastructure Protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">Malware Attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">National Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">105-119</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article provides a brief description of critical information infrastructure and analyzes the extent to which organizations depend on the proper functioning of banking and financial services, electricity, fuel and water supply networks, as well as information and telecommunication networks. The consequences of attacks on specific elements of these infrastructures are examined, as well as the initiatives and problems that arise with their protection on national and international level. Special attention is paid to the state of critical infrastructure protection in Bulgaria, with analysis of the reasons for its poor level and recommendations for improvement.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eugene Nickolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contemporary Trends in the Development of Information Security and Computer Virology</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal </style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Biometric</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer Virology</style></keyword><keyword><style  face="normal" font="default" size="100%">Dynamic Programming</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">Mobile Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">Satellite Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Steganometric.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">60-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents an analysis of the latest trends in information security and computer virology. The basic components of the information security are introduced, including data security, computer security, communication security, network security, mobile security, manipulations security, biometric security, and steganometric security. The main factors exerting influence on these components, as well as their relationships are shown. A formal record for the information security as a function of specific arguments is developed. The fundamental procedures of the information security are represented, including Monitoring, Blocking, Removing, Protection and Verification. 
The analysis continues with the computer virology topic. In the beginning, the fundamental work principles of the computer viruses are examined: Reproduction, Transportation, Malicious Thinking and Good-natured Thinking. Then the main steps in the computer viruses investigation are analyzed: Isolation, Decomposition, Formal Description, Modeling, Decision-making and Program Realization. Next, methods for computer viruses detection are examined, such as Signature analysis, Integrity Check, Monitoring and Restriction. After that the basic steps during the computer viruses removal as Localization, Identification, Removing, Deactivation and Verification are shown. 
In the conclusion, the role and the importance of the information security and the computer virology for the development of the contemporary society in conditions of growing communication mobility and globality are pointed out.</style></abstract></record></records></xml>