Keyword "VULNERABILITIES" found in the following publications:
ON THE SECURITY OF INFORMATION PROCESSING USING SMART CONTRACTS
The paper discusses the prospects for the use of smart contracts, as well as the issue of their ...
MAIN TYPES OF COMPUTER THREATS
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, ...
METHODS OF REMOTE WORK AND WAYS TO PROTECT IT
The topic of remote work with the arrival of the pandemic was an unusual way of working for ...
ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals ...
ABOUT ENSURING SECURITY IN THE FIELD OF THE INTERNET OF THINGS
The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made ...
The article examines the phenomenon of “prompt injection” in the context of contemporary large language models (LLMs), elucidating a ...
ANALYSIS AND COMPARISON OF BIOMETRIC METHODS OF IDENTIFICATION OF A PERSON
Biometric methods of identity identification have been actively developing in the world market over the past decade. These ...