Zobrazeno 1 - 10
of 3 059
pro vyhledávání: '"Information Protection"'
Autor:
Tran, Dien Van, Nguyen, Phuong Van, Vrontis, Demetris, Nguyen, Sam Thi Ngoc, Dinh, Phuong Uyen
Publikováno v:
Journal of Asia Business Studies, 2024, Vol. 18, Issue 6, pp. 1445-1464.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JABS-01-2024-0058
Autor:
Evgenii S. Mityakov, Svetlana V. Artemova, Anatoly A. Bakaev, Alexander V. Dushkin, Zhanna G. Vegera
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 56-66 (2024)
The research problem lies in the absence of a comprehensive model for evaluating the effectiveness of information security systems, capable of taking into account both technical security aspects and subjective factors, such as user trust. Furthermore
Externí odkaz:
https://doaj.org/article/15c0d00bbae94afba05913a67d8c1bcd
Autor:
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 87-98 (2024)
This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment
Externí odkaz:
https://doaj.org/article/47fef815825e4662bf493c0e8bf2b7e4
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 43-63 (2024)
Problem description. One of the areas of digital transformation of Russian society is the development and implementation of the National Digital Ruble System (DR) in the credit and financial sphere (CFS) of the economy of the Russian Federation. The
Externí odkaz:
https://doaj.org/article/ed1a8247925c43119893c47beae4c7c4
Autor:
Alexandr I. Tolstoy
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 105-123 (2024)
The article identifies the main problems associated with the inconsistency and incoordination of such concepts as “information protection”, “information security”, “security of information”, “cybersecurity” and “cyber resilience”,
Externí odkaz:
https://doaj.org/article/f6f17235190d4cd293cd73ff82454b2f
Autor:
Bobok I.I., Kobozeva A.A.
Publikováno v:
Problems of the Regional Energetics, Vol 3, Iss 63, Pp 29-43 (2024)
. The widespread introduction of information technologies into all spheres of society, the crea-tion of a significant amount of confidential and critical data in digital form leads to an increase in the priority of information security tasks everywhe
Externí odkaz:
https://doaj.org/article/003715879f4c45bf9c7969da8a1e7f1a
Autor:
Nina Rzhevska
Publikováno v:
Політичні дослідження, Iss 7, Pp 68-85 (2024)
The article argues for the need to enhance Ukraine's state modern information policy, identifying potential avenues for improvement of its effectiveness by drawing upon the experience of the United States. It is important to understand that the infor
Externí odkaz:
https://doaj.org/article/d039527ff1484d61b461ea936ad26f03
Autor:
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 2, Pp 42-50 (2024)
The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the
Externí odkaz:
https://doaj.org/article/5d05eb6260e84008b3aaf889e0f0b63a
Autor:
Viacheslav Kovtun, Yuriy Ivanov
Publikováno v:
ICT Express, Vol 10, Iss 2, Pp 330-335 (2024)
In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent wo
Externí odkaz:
https://doaj.org/article/b484234258724677b99561c56f5e58cf