16+

INFORMATION SYSTEM AND TECHNOLOGIES

ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS

Volume 9, Issue №1, 2024
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals and objectives, risk assessment. The basic principles of the choice ...

PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS

Volume 9, Issue №1, 2024
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other ...

ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS

Volume 9, Issue №1, 2024
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most reliable and secure encryption algorithm. The article analyzes the characteristics ...

OVERVIEW OF CRYPTOGRAPHIC GATEWAYS FOR PROTECTION INFORMATION IN CORPORATE NETWORKS

Volume 9, Issue №1, 2024
This article discusses solutions from domestic manufacturers for the organization of a secure corporate network (cryptoslocks, VPN gateways), the basic principles of operation of this equipment, connection scenarios ...

RESEARCH AND ANALYSIS OF PROBLEMS OF TEACHING DISCRETE MATHEMATICS IN AN EDUCATIONAL INSTITUTION AND VIA THE INTERNET

Volume 8, Issue №4, 2023
This article raises the problem of teaching discrete mathematics in an educational institution and on the Internet, and also explores problems and solutions in the field of distance interactive ...

COMPUTER MODELLING OF MATERIAL OBJECTS’ STRUCTURE. PART III. CLUSTERING OF NUCLEON SYSTEMS

Volume 8, Issue №4, 2023
The structure of light atomic nuclei, such as hydrogen, helium and lithium nuclides, was studied based on the cluster approach. Atomic nuclei are formed as systems consisting of free ...

ANALYSIS OF SOFTWARE AND HARDWARE-SOFTWARE TOOLS FOR INFORMATION PROTECTION IN INFORMATION SYSTEMS OF PUBLIC AUTHORITIES

Volume 8, Issue №4, 2023
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. When considering security measures to ensure the security of information ...

ANALYSIS CODE SIMILARITY AND SEARCH FOR ITS BORROWINGS

Volume 8, Issue №3, 2023
This article discusses an actual problem in the field of programming — the borrowing of code and the possibility of its analysis. With the increase in the number of ...

RESEARCH AND ANALYSIS OF THE PROBLEMS OF DEVELOPING CREATIVE THINKING IN THE FIELD OF GRAPHIC DESIGN AMONG MODERN YOUTH

Volume 8, Issue №2, 2023
This article raises the problem of the development of creative thinking of modern youth in the field of graphic design, and also examines the problems and solutions in ...

ANALYSIS OF THE GROWTH OF CYBERATTACKS OF THE INFORMATION SECURITY MARKET OF THE RUSSIAN FEDERATION

Volume 8, Issue №2, 2023
The IT sphere is progressing without stopping, which is why information security employees have to regularly progress along with all software updates to maximize the effectiveness of ensuring ...

ABOUT RUSSIAN SPEECH SYNTHESIS SOFTWARE

Volume 8, Issue №2, 2023
In modern information technologies, an important place is occupied by interactive methods for entering information with the subsequent use of processed data. Voice input, gesture control, motion capture, ...

COMPUTER MODELLING OF MATERIAL OBJECTS’ STRUCTURE. PART II. ELEMENTARY PARTICLES

Volume 8, Issue №1, 2023
Based on the previously presented model of space-time, the structural features of elementary particles formation are considered. The paper investigates the model of elementary particles formation composed of ...

ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION

Volume 8, Issue №1, 2023
Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, chatting in instant messengers, writing letters to the post office. ...

A HYPERSPECTRAL IMAGE CLASSIFIERS WITHIN WIRELESS SENSOR NETWORK IN EXTREME ENVIRONMENTS

Volume 8, Issue №1, 2023
Progress in the field of computer networks has produced many areas of researches which paved the way for studying many new applications. One of the most popular applications ...

ON THE SECURITY OF INFORMATION PROCESSING USING SMART CONTRACTS

Volume 8, Issue №1, 2023
The paper discusses the prospects for the use of smart contracts, as well as the issue of their information security. The analysis of the world market of smart ...

COMPUTER MODELLING OF MATERIAL OBJECTS’ STRUCTURE. PART I. SPACE-TIME

Volume 7, Issue №4, 2022
Present paper considers a structure model of discrete space-time, the properties of which are determined by the substrate. As a substrate a 2-dimensional plane under no matter is ...

METHODS OF THE EPIDEMICS SPREAD MATHEMATICAL MODELING

Volume 7, Issue №4, 2022
Modelling the mechanisms of epidemic spread and predicting its evolution can significantly reduce the damage caused by a pandemic. This paper presents a review of SIR mathematical models ...

CLASSIFICATION OF METHODS AND MEANS OF FORMING THREE-DIMENSIONAL PANORAMIC IMAGES

Volume 7, Issue №4, 2022
Due to the development of panoramic shooting technologies within a single device, today there is a fairly limited list of panoramic image recording devices, most of them only ...

OVERVIEW OF SOURCES OF INTERFERENCE IN SATELLITE COMMUNICATION SYSTEMS

Volume 7, Issue №3, 2022
The article discusses some sources of interference in satellite communication channels, such as the impact of the ionosphere, space weather and the impact of man-made sources of interference. ...
Page 1 of 4 | Next