Zobrazeno 1 - 10
of 533
pro vyhledávání: '"Critical Information Infrastructure"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 31-43 (2024)
A probabilistic approach to predicting the properties of identified software vulnerabilities has been developed. The approach is based on representing the process of changing the values of the basic metrics of detected software vulnerabilities CVSS v
Externí odkaz:
https://doaj.org/article/ff4781844d0549cf8b467da55ddbc499
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 51, Iss 3, Pp 42-53 (2024)
Objective. Currently, the task of ensuring the security of Russia's national information resources is being updated as an important area of state policy in the information sphere. The purpose of the article is to describe a methodology for determinin
Externí odkaz:
https://doaj.org/article/b26e00f8dcdb46b8a49931a8575d2b28
Autor:
D. A. Evdokimova, A. A. Mikryukov
Publikováno v:
Открытое образование (Москва), Vol 28, Iss 4, Pp 33-42 (2024)
The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identif
Externí odkaz:
https://doaj.org/article/d66deb3a41ed4a23ae364547a061cee6
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 94-104 (2024)
The article develops a functional model of unauthorized access (UA) protection mechanisms at information infrastructure objects (IIOs). It defines the content of protection measures, techniques used, and stages of their implementation. It substantiat
Externí odkaz:
https://doaj.org/article/040087f8c4ba48e784564d84b0a22e58
Autor:
Edelman, R. David
Publikováno v:
Rethinking Cyber Warfare: The International Relations of Digital Disruption.
Externí odkaz:
https://doi.org/10.1093/9780197509715.003.0003
Publikováno v:
Information & Computer Security, 2023, Vol. 32, Issue 1, pp. 112-129.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-03-2023-0031
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 1, Pp 100-119 (2024)
The departmental personnel training system of the Ministry of Internal Affairs of Russia has significant experience in training specialists in various educational programs in the field of information security. Over the past decade, due to various fac
Externí odkaz:
https://doaj.org/article/5e8902c94e794a5297ade86ad702bc6d
Autor:
Vladislav V. Zezyulin
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 1, Pp 86-99 (2024)
The purpose of the article is to identify clear directions and mechanisms for the creation of software manufacturing factories in the Russian Federation. This issue has become especially relevant during the period of sanctions pressure on our country
Externí odkaz:
https://doaj.org/article/c7fe91c3b85740bf87d24052c7bda1c5
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 4, Pp 61-73 (2023)
The content of the main threat assessment stages of unauthorized access (UA) at critical information infrastructure (CII) facilities is determined on the basis of analysis of the primary provisions of the Methodology for Assessing Information Securit
Externí odkaz:
https://doaj.org/article/a10d4dd3bac74974b7365ddc80241788
Autor:
Boris N. Krivoshein, Ivan A. Pokrovsky
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 4, Pp 39-60 (2023)
The article presents an analysis of the concepts and terms used in the Decree of the President of the Russian Federation No. 166 dated 30.03.2022 "On measures to ensure the technological independence and security of the critical information infrastru
Externí odkaz:
https://doaj.org/article/86b41c1c26a64fcf9903ff8122d439ed