Keyword "THREAT" found in the following publications:
STEREOTYPICAL RISKS AND THREATS IN THE YOUTH’S OPINION (DIACHRONIC COMPARATIVE ASPECT)
The paper reveals the structure of associative fields of words-stimuli "danger", "risk", "threat", fixed in 1988-90 (the materials of "Russian ...
Today, the stock market has high financial and investment potential. This market transforms the savings of individuals and ...
ATTITUDE TO THE VALUE OF LIFE AS A FACTOR IN THE PERCEPTION OF A TERRORIST THREAT BY THE POPULATION
The article continues the series of author's publications in the Journal and is aimed at implementing the previously developed ...
The article is devoted to the problems of aviation industry development in Russia. At the moment, the state with ...
PREVENTING INFORMATION SECURITY INCIDENTS
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection ...
The article represents preliminary generalization of results of the research of problems of reforming the work of the ...
SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION
Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements ...
THREATS TO THE ECONOMIC SECURITY OF RURAL AREAS IN THE ORENBURG REGION
This study examines the economic security of rural areas in the context of contemporary challenges. The authors highlight the ...
PROBLEMS OF CLOUD SERVICES AND METHODS OF PROTECTION AGAINST RISKS AND THREATS
More and more people are starting to use cloud services for storing, editing and transferring data via the ...
In the development of information technology, software and data protection on web services are of great importance. To ...
MAIN TYPES OF COMPUTER THREATS
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, ...
TERMS OF EMERGENCE OF THE MAIN CLINICAL SYMPTOMS OF PREECLAMPSIA AT THE PRESENT STAGE
The purpose of the research was to study the terms of appearance of the first clinical symptoms of preeclampsia ...
POSSIBLE THREATS AND ATTACKS ON THE USER VOICE IDENTIFICATION SYSTEM
Times change. Technologies are used that not only simplify our lives, but also help us to effectively use all ...
ABOUT ENSURING SECURITY IN THE FIELD OF THE INTERNET OF THINGS
The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made ...
REVIEW AND ANALYSIS OF THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE
One of the most pressing questions of the modern world is what is artificial intelligence (AI) – an assistant ...
- In connection with the transition to the information society and the widespread use of information and communication technologies in the ...
NETWORK SECURITY INCIDENTS IN THE DIGITAL ECONOMY SYSTEM
The modern period of development is closely related to the digital transformation of various industries and the implementation ...
ANALYSIS AND DEFINITION OF INFORMATION SECURITY RISKS
Any information requires an effective system of protection and is to ensure the sustainable development and functioning of ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
The most relevant and widespread type of information that almost all organizations of the Russian Federation work with ...