Keyword "VULNERABILITIES" found in the following publications:
MAIN TYPES OF COMPUTER THREATS
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, ...
ON THE SECURITY OF INFORMATION PROCESSING USING SMART CONTRACTS
The paper discusses the prospects for the use of smart contracts, as well as the issue of their ...
ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals ...
ANALYSIS AND COMPARISON OF BIOMETRIC METHODS OF IDENTIFICATION OF A PERSON
Biometric methods of identity identification have been actively developing in the world market over the past decade. These ...
ABOUT ENSURING SECURITY IN THE FIELD OF THE INTERNET OF THINGS
The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made ...
METHODS OF REMOTE WORK AND WAYS TO PROTECT IT
The topic of remote work with the arrival of the pandemic was an unusual way of working for ...