Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Artem Zhylin"'
Autor:
Olha Shevchuk, Artem Zhylin
Publikováno v:
Collection "Information Technology and Security". 10:72-82
The development and widespread introduction of the Internet into everyday life has transformed both economic and social relations. The representation of these relations in digital form has created a digital economy, characterized by an active exchang
Autor:
Olha Shevchuk, Artem Zhylin
Publikováno v:
Collection "Information Technology and Security". 9:165-175
Publikováno v:
Collection "Information Technology and Security". 9:53-66
Publikováno v:
Collection "Information Technology and Security". 8:177-190
Domestic and foreign regulations related to the protection of web applications are analyzed. It is established that the requirements for its individual means of protection should be taken into account when developing a comprehensive information prote
Publikováno v:
Collection "Information technology and security". 7:171-182
The solution to the problem of secure data centers for storage of information and state electronic information resources is offered through the implementation of cloud technologies. State regulatory acts don`t solve the problem of providing security
Publikováno v:
Collection "Information technology and security". 6:51-67
In general, the issue of building cybersecurity centers mainly stands for building a SOC which main function is monitoring and analyzing cybercrime questions and responding to cyber incidents online. The approach, mentioned above, implies insufficien
Autor:
Polina Seliukh, Vasyl Tsurkan, Lyudmyla Kovalchuk, Artem Zhylin, Nataliia Kuchynska, Oleksij Bespalov
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 6, Iss 4 (96), Pp 6-14 (2018)
The factorization problem, which is the basis for many classical asymmetric cryptosystems (RSA, Rabin, and others) and a cryptographically strong generator of pseudo-random sequences (PBS), has been investigated in this paper. The methods that served
Publikováno v:
Collection "Information technology and security". 5:33-42
In this article, the analysis of the main protocols of the creation of the virtual private networks which are widely used in case of creation of the protected connections on networks of general purpose is carried out. Possible types of implementation