Keyword "INFORMATION SECURITY" found in the following publications:
POSSIBLE THREATS AND ATTACKS ON THE USER VOICE IDENTIFICATION SYSTEM
Times change. Technologies are used that not only simplify our lives, but also help us to effectively use all ...
ANALYSIS OF THE GROWTH OF CYBERATTACKS OF THE INFORMATION SECURITY MARKET OF THE RUSSIAN FEDERATION
The IT sphere is progressing without stopping, which is why information security employees have to regularly progress along ...
ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION
Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals ...
MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. ...
Electronic document management is the fastest and most high-quality way of transmitting information in production in modern working conditions. ...
ANALYSIS AND DEFINITION OF INFORMATION SECURITY RISKS
Any information requires an effective system of protection and is to ensure the sustainable development and functioning of ...
ANALYSIS CODE SIMILARITY AND SEARCH FOR ITS BORROWINGS
This article discusses an actual problem in the field of programming — the borrowing of code and the possibility ...
INFORMATION SECURITY AS A SERVICE IN THE NEW REMOTE WORLD
The year 2020 in the Russian Federation led to changes in the work of companies, government ...
The research is devoted to the problem of investment information security industry. The authors identify the investments into ...
ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most ...
DEVELOPING A METHOD FOR CREATING A RESISTANT TO AUTOMATIC RECOGNITION AND GUESSING CAPTCHA
The relevance of the problem considered in the article is due to the growing number of web resources of ...
PREVENTING INFORMATION SECURITY INCIDENTS
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection ...
IT INFRASTRUCTURE RISKS AND METHODS FOR THEIR SOLUTION
Changes in global trends in IT infrastructure in business do not stand still, and one of the developing ...
REVIEW OF SOME DATA TRANSFER PROTOCOLS FROM THE POSITION OF INFORMATION SECURITY
The article identifies and describes the main problems in the field of recreational fishing: the The article discusses ...
SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION
Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine ...
REFLECTED RISKS OF NETWORK COMMUNICATIONS (THE RUSSIAN YOUTH ONLINE SURVEY RESULTS)
The author revises the latest risks and threats associated with technologization of the information and communication sphere, and ...
PROBLEMS OF CLOUD SERVICES AND METHODS OF PROTECTION AGAINST RISKS AND THREATS
More and more people are starting to use cloud services for storing, editing and transferring data via the ...