Search by keyword: "information security threats"
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
| Authors: Kulagin G.I. | Published: 19.04.2022 |
| Published in issue: #3(68)/2022 | |
| DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET | |
The information security threats conditioned by incorrect password selection
| Authors: Sukhorukova N.A. | Published: 15.02.2019 |
| Published in issue: #2(31)/2019 | |
| DOI: DOI: 10.18698/2541-8009-2019-2-444 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information protection, information security threats, password compromise, password cracking methods, password entropy, password resistance, password rating, password selection | |
Detecting information technology risk factors in a telemedicine system
| Authors: Mikov D.A. | Published: 02.12.2016 |
| Published in issue: #3(3)/2016 | |
| DOI: DOI: 10.18698/2541-8009-2016-3-24 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: remote health condition monitoring system, IDEF model, information technology risk analysis, risk factors, information security threats, potential damage, vulnerabilities of an automated system, countermeasures | |
