Zobrazeno 1 - 10
of 1 592
pro vyhledávání: '"information security audit"'
Autor:
A. M. Konakov, A. G. Pevneva
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 4, Pp 109-114 (2024)
Objective. The purpose of the study is the functionality of designing, building and implementing protection systems taking into account the time factor. Method. The analysis of the functional interaction of the construction of three sequentially inte
Externí odkaz:
https://doaj.org/article/98b1da2f73a444abac56810e40a67c01
Autor:
Alexey Yu. Grishentsev, Sergey A. Arustamov, Nikolay S. Karmanovsky, Vyacheslav A. Goroshkov, Roman I. Chernov
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 23, Iss 6, Pp 1233-1241 (2023)
It is known that there is an information signal in power supply systems and networks. The presence of information signals in the power elements of power supply systems and networks (electrical signal) in combination with other information allows ex
Externí odkaz:
https://doaj.org/article/dc49e483edd24f02b40d65fb6563b3f7
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 3, Pp 57-65 (2023)
Objective. The objective of the research is to develop a methodology for the security of an automated control system of critical information infrastructure from DDoS attacks. The methodology allows the decision-maker to obtain an assessment of the ri
Externí odkaz:
https://doaj.org/article/507298a4abaa48c39e6f2dc0cb2aba01
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 3, Pp 39-51 (2022)
Objective. The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables
Externí odkaz:
https://doaj.org/article/8382b0f4110e49f8ad232941f0dba5c3
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Gabriel Felley, Rolf Dornberger
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 14, Iss 7, Pp 66-70 (2016)
This article reflects the topic of IT audit – information technology audit – with respect to research, consulting and teaching. The expression 'IT audit' comprises information systems audits as well as information security audits combining the sh
Externí odkaz:
https://doaj.org/article/6203c4e664c5430496dd842f58ad15fd
Autor:
Василенко, А. О., Vasilenko, A. O.
Целью данной магистерской диссертации является проектирование системы для автоматизации проведения аудита технических мер безопасно
Externí odkaz:
http://elar.urfu.ru/handle/10995/128705
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 28, Iss 3, Pp 103-117 (2021)
In general the overall task of an information security audit is to verify that the security system of an object meets the set of criteria that determine the requirements for the security level. In this regard, it is necessary to define and to establi
Publikováno v:
Сучасні інформаційні системи; Том 6 № 2 (2022): Сучасні інформаційні системи; 48-56
Advanced Information Systems; Vol. 6 No. 2 (2022): Advanced Information Systems; 48-56
Современные информационные системы-Sučasnì ìnformacìjnì sistemi; Том 6 № 2 (2022): Сучасні інформаційні системи; 48-56
Advanced Information Systems; Vol. 6 No. 2 (2022): Advanced Information Systems; 48-56
Современные информационные системы-Sučasnì ìnformacìjnì sistemi; Том 6 № 2 (2022): Сучасні інформаційні системи; 48-56
The object of research in the article are the tools and capabilities of the C# programming language for the implementation of cybersecurity analysis software in local computer networks and computer-integrated systems. The relevance of the study is du
Publikováno v:
Transaction of Scientific Papers of the Novosibirsk State Technical University. :64-79
According to the Russian standards in the field of information security management (IS), which are authentic international standards, such as [1, 2], the organization must regularly conduct an internal audit of the information security management sys