Zobrazeno 1 - 10
of 3 043
pro vyhledávání: '"information protection"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 43-63 (2024)
Problem description. One of the areas of digital transformation of Russian society is the development and implementation of the National Digital Ruble System (DR) in the credit and financial sphere (CFS) of the economy of the Russian Federation. The
Externí odkaz:
https://doaj.org/article/ed1a8247925c43119893c47beae4c7c4
Autor:
Alexandr I. Tolstoy
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 105-123 (2024)
The article identifies the main problems associated with the inconsistency and incoordination of such concepts as “information protection”, “information security”, “security of information”, “cybersecurity” and “cyber resilience”,
Externí odkaz:
https://doaj.org/article/f6f17235190d4cd293cd73ff82454b2f
Autor:
Bobok I.I., Kobozeva A.A.
Publikováno v:
Problems of the Regional Energetics, Vol 3, Iss 63, Pp 29-43 (2024)
. The widespread introduction of information technologies into all spheres of society, the crea-tion of a significant amount of confidential and critical data in digital form leads to an increase in the priority of information security tasks everywhe
Externí odkaz:
https://doaj.org/article/003715879f4c45bf9c7969da8a1e7f1a
Autor:
Nina Rzhevska
Publikováno v:
Політичні дослідження, Iss 7, Pp 68-85 (2024)
The article argues for the need to enhance Ukraine's state modern information policy, identifying potential avenues for improvement of its effectiveness by drawing upon the experience of the United States. It is important to understand that the infor
Externí odkaz:
https://doaj.org/article/d039527ff1484d61b461ea936ad26f03
Autor:
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 2, Pp 42-50 (2024)
The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the
Externí odkaz:
https://doaj.org/article/5d05eb6260e84008b3aaf889e0f0b63a
Autor:
Viacheslav Kovtun, Yuriy Ivanov
Publikováno v:
ICT Express, Vol 10, Iss 2, Pp 330-335 (2024)
In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent wo
Externí odkaz:
https://doaj.org/article/b484234258724677b99561c56f5e58cf
Publikováno v:
Наука Красноярья, Vol 13, Iss 1, Pp 7-21 (2024)
The article discusses information security in the system of an industrial enterprise. Attention is focused on the need to implement a continuous information security process to protect all information assets from leaks, theft and unauthorized disclos
Externí odkaz:
https://doaj.org/article/9a105b9f0346470eaa0702b75a24bf5e
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 4, Pp 101-108 (2024)
Objective. In this paper, the main aspects of the operating conditions of the AS are considered, as well as the issues of standardization of the stages of the life cycle of the AS (creation, commissioning, maintenance, etc.) at the state level. In th
Externí odkaz:
https://doaj.org/article/910408c451e04213a3c68caa011c1977
Autor:
E. A. Perminova
Publikováno v:
Евразийская интеграция: экономика, право, политика, Vol 17, Iss 4, Pp 62-72 (2024)
Aim . Coverage of the problem of ensuring economic security in conditions of insufficient financing of information protection measures both from the state, which establishes requirements for the protection of restricted access information of various
Externí odkaz:
https://doaj.org/article/47b8504a7432484bb880abb26b1d2a8d