Zobrazeno 1 - 10
of 6 369
pro vyhledávání: '"Q350-390"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 124-136 (2024)
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS). The results of developing an access control pol
Externí odkaz:
https://doaj.org/article/1dc0e7a55fa040fdbebdaad2eee16900
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 148-156 (2024)
The paper analyzes the features of the experimental evaluation of the single event effects (SEE) cross section dependence on linear energy transfer (LET) for ions with energies above 100 MeV/nucleon. Ion energy degraders use in order to change the va
Externí odkaz:
https://doaj.org/article/9e5d3761ab444df1b488d6df4f3523d7
Autor:
Kennedy Njenga, Cosmas Ngwenya
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 64-82 (2024)
This study explores the prevalent issue of non-compliance with information security policies (ISPs) within organizations, offering a way by which organizations can monitor non-compliance of ISPs using a practical suggested approach. By crowdsourcing
Externí odkaz:
https://doaj.org/article/9fbee532977849349e28dc327089a36c
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 94-104 (2024)
The article develops a functional model of unauthorized access (UA) protection mechanisms at information infrastructure objects (IIOs). It defines the content of protection measures, techniques used, and stages of their implementation. It substantiat
Externí odkaz:
https://doaj.org/article/040087f8c4ba48e784564d84b0a22e58
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 43-63 (2024)
Problem description. One of the areas of digital transformation of Russian society is the development and implementation of the National Digital Ruble System (DR) in the credit and financial sphere (CFS) of the economy of the Russian Federation. The
Externí odkaz:
https://doaj.org/article/ed1a8247925c43119893c47beae4c7c4
Autor:
Mikhail A. Ivanov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 83-93 (2024)
Computer systems (CS) security has become a very critical concern that needs the attention of researchers to ensure the information protection and cyber security. This article provides an overview of the state of the art in cyber security, challenges
Externí odkaz:
https://doaj.org/article/5a99c2c918d44cd6b122b13fd6e19bfe
Autor:
Timofey Y. Melnikov, Pavel Y. Shamray, Julia A. Lyakhovenko, Sanzhar Mukhamedzhanov, Kirill A. Maximov, Andrey M. Boyko
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 157-167 (2024)
In the process of developing and operating navigation systems, it is very important to reliably assess the accuracy of determining spatial characteristics. A methodology has been developed for assessing and confirming the accuracy of determining spat
Externí odkaz:
https://doaj.org/article/bd5b32071d7a43f1937fb13703bf2a54
Autor:
Alexandr I. Tolstoy
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 105-123 (2024)
The article identifies the main problems associated with the inconsistency and incoordination of such concepts as “information protection”, “information security”, “security of information”, “cybersecurity” and “cyber resilience”,
Externí odkaz:
https://doaj.org/article/f6f17235190d4cd293cd73ff82454b2f
Autor:
Alexander Yu. Nikiforov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 5-8 (2024)
Externí odkaz:
https://doaj.org/article/9c55b868e79c47b79d57474cb42c6e82
Autor:
Leonid N. Kessarinsky
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 14-22 (2024)
Externí odkaz:
https://doaj.org/article/b859fbbe93ca4a709fa38b26573eca8f