Abstract
Abstract One of the essential prerequisites for an efficient and effective organisation in our information society is the timely provision of information to the entitled person or persons. This is particularly important in the public, economic and business sphere, in public administration, law enforcement agencies and military operations as well. The information must always be available in the right place, at the right time, in the required quantity, quality and format, in order to gain and maintain the information superiority. This paper aims to analyse and present the methods of information sharing among different classified and non-classified systems and networks, their proposed areas of application, the security measures required for their safe implementation, and the risks and issues arising from their use. In this part of the article, the author analysed the different international security management procedures, the possible threats, vulnerabilities and solutions to create the most effective information-sharing environment.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.