<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://irek.ase.md:443/xmlui/handle/123456789/40">
<title>Facultatea  Cibernetică, Statistică şi Informatică Economică</title>
<link>https://irek.ase.md:443/xmlui/handle/123456789/40</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://irek.ase.md:443/xmlui/handle/123456789/4704"/>
<rdf:li rdf:resource="https://irek.ase.md:443/xmlui/handle/123456789/4703"/>
<rdf:li rdf:resource="https://irek.ase.md:443/xmlui/handle/123456789/4702"/>
<rdf:li rdf:resource="https://irek.ase.md:443/xmlui/handle/123456789/4701"/>
</rdf:Seq>
</items>
<dc:date>2026-04-07T13:27:51Z</dc:date>
</channel>
<item rdf:about="https://irek.ase.md:443/xmlui/handle/123456789/4704">
<title>Modern Approach of Firewall in Local Network</title>
<link>https://irek.ase.md:443/xmlui/handle/123456789/4704</link>
<description>Modern Approach of Firewall in Local Network
Andronatiev, Victor; Zgureanu, Aureliu
In modern society, computer networks are increasingly used across a wide range of activities. According to data provided by CISCO, in 2020 the number of users and devices connected to the Internet reached 50 billion. While initially computer networks were used primarily for file sharing, email, and reading news, today they serve many more purposes—such as online conferences, medical appointments, online shopping, remote learning, gaming, social media platforms like YouTube and Facebook, Wikipedia, and more. Given this widespread expansion, hundreds of billions of dollars are invested annually in computer network infrastructure. To ensure proper functionality and user convenience, a high level of security is essential. Without proper protection, users and companies risk losing money, personal data, or intellectual property, which would erode trust in these technologies. As a result, investments in cybersecurity are critical: better security protocols are being developed, network equipment and operating systems are becoming more secure, cybersecurity experts are being trained, and users are being educated on how to interact safely in a digital environment. One of the key protection methods in network security is the use of firewalls. Firewalls can be implemented in various ways: on servers to protect the local network from external access (and vice versa), on networking devices such as routers, or built into modern operating systems. Additionally, certain applications that require high levels of security may include their own dedicated firewalls, known as next-generation firewalls (NGFWs). UDC: 004.056.52:004.732; JEL Classification: D85, L86.
ANDRONATIEV, Victor and Aureliu ZGUREANU. Modern Approach of Firewall in Local Network. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 138-144. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.18
</description>
<dc:date>2025-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://irek.ase.md:443/xmlui/handle/123456789/4703">
<title>Diagnosing the Risk Exposure of Enterprises in Bulgaria with Online Sales</title>
<link>https://irek.ase.md:443/xmlui/handle/123456789/4703</link>
<description>Diagnosing the Risk Exposure of Enterprises in Bulgaria with Online Sales
Ivanova, Zoya
In modern conditions, enterprises conducting online sales need to continuously apply new concepts, logic and mechanisms that are in line with the ongoing evolution of information and communication technologies and digital transformation. Unfortunately, Bulgarian enterprises operating in digital markets are significantly lagging behind in this direction. The main purpose of this study is to perform a thorough and multifaceted diagnostic to show the risk exposure of Bulgarian enterprises that operate online sales. The main theoretical and methodological basis of the study is the general risk theory and the private-scientific approach, as well as analytical methods such as: comparative method, analogy method. The specialized information sources of statistical data on the basis of which the research and comparative analyses are conducted are the National Statistical Institute (NSI) and Eurostat. Respondents of the survey are enterprises in Bulgaria with online sales of goods or services in the non-financial sector, which have 10 persons employed or more. Summarising the main findings of the survey suggests a relatively high-risk exposure of the enterprises surveyed. UDC: 005.334:[339.187:004.78](497.2); JEL: F14, L81, L86.
IVANOVA, Zoya. Diagnosing the Risk Exposure of Enterprises in Bulgaria with Online Sales. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 131-137. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.17
</description>
<dc:date>2025-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://irek.ase.md:443/xmlui/handle/123456789/4702">
<title>Information Security Aspects in Higher Education</title>
<link>https://irek.ase.md:443/xmlui/handle/123456789/4702</link>
<description>Information Security Aspects in Higher Education
Shishmanov, Krasimir; Tsanov, Emil; Tairov, Iskren
Recent studies indicate that information security plays an increasingly critical function in businesses today. Higher education is not an exemption. The growing number of safety incidents reported by higher education organizations in the past few years exemplifies the significance of privacy, reliability, and information accessibility in universities. The current review attempts to improve the authors' grasp of the views, methodology, and tendencies that define this emerging field of study. A literature review is conducted, and a direction for future research is suggested. The article suggests the fact that data protection in higher education is a profoundly unstudied topic. Other studied subjects include data safety habits, study evaluations of management information security in areas other than higher education, comparing studies between educational institutions, as well as security monetary theory and administration. UDC: [378.14:004.056.5]:005.342; JEL: L86.
SHISHMANOV, Krasimir; Emil TSANOV and Iskren TAIROV. Information Security Aspects in Higher Education. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 123-130. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.16
</description>
<dc:date>2025-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://irek.ase.md:443/xmlui/handle/123456789/4701">
<title>Political Economy Aspects of the Shadow Digital Economy</title>
<link>https://irek.ase.md:443/xmlui/handle/123456789/4701</link>
<description>Political Economy Aspects of the Shadow Digital Economy
Orlova, Dinara; Ohrimenco, Serghei
The article analyzes the shadow digital economy (SDE) as a modern threat to cybersecurity. The article formulates and proposes definitions of the SDE, based on the specifics of software production and the life cycle of information services of a criminal nature. In the course of the research, the political economy foundations and general features of the SDE were determined. These include latency, coverage of all phases of the process of social and economic reproduction, the parasitic nature of the activity, and others. Future cyber threats such as Quantum Computing Threats, AI-enabled cyberattacks, Internet of Things (IoT) vulnerabilities, Cyberwarfare, and political manipulation are presented. UDC: 004.056+339.19:004; JEL: D74 E26 F51 K24.
ORLOVA, Dinara and Serghei OHRIMENCO. Political Economy Aspects of the Shadow Digital Economy. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 116-122. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.15
</description>
<dc:date>2025-05-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
