Search by keyword: "information security"
Development and problems in using artificial intelligence in the information security
Authors: Volodin A.A., Glinskaya E.V. | Published: 01.05.2024 |
Published in issue: #2(91)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention |
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
Authors: Kulagin G.I. | Published: 19.04.2022 |
Published in issue: #3(68)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET |
Socio-psychological aspects of youth Internet communication
Authors: Sobornov T.I., Zueva A.E. | Published: 03.08.2021 |
Published in issue: #7(60)/2021 | |
DOI: DOI: 10.18698/2541-8009-2021-7-716 | |
Category: Humanities | Chapter: Social sciences | |
Keywords: internet communication, anonymity, internet dating, information security, causal attribution, virtual communication, youth, social networks, chat roulette |
The human factor in the information security of an organization: areas of research, countermeasures, prospects for study
Authors: Vanin A.V., Marchenko A.V. | Published: 08.05.2020 |
Published in issue: #4(45)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-4-601 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: human factor, information security, information security culture, socio-organizational and psychological aspects, security policy, security threats, awareness, holistic approach |
Analysis of domestic software protection licensing systems
Authors: Marchenko A.V. | Published: 25.12.2019 |
Published in issue: #12(41)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-12-561 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: electronic keys, digital signature, certificates, protection, flash-cards, information security, analysis, licensing system, software, cryptographic algorithms |
DDOS attack detection and prevention methods
Authors: Kadyrov R.R. | Published: 06.08.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-507 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, denial of service attack, DoS, DDoS, detection and prevention mechanisms, architecture of mitigating the attacks consequences, false positives, access to resources |
Social engineering: yesterday, today, tomorrow
Authors: Balakin K.A. | Published: 24.06.2019 |
Published in issue: #6(35)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-6-494 | |
Category: Humanities | Chapter: Social sciences | |
Keywords: social engineering, information security, personal information, human factor, impact scheme, social engineering technologies, social engineering techniques, user safety |
Mathematical representation of developing risk management principles in grc-solution for the banking system organizations of the Russian federation and its derivation
Authors: Abramova O.S., Posternak E.V. | Published: 11.04.2018 |
Published in issue: #4(21)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-4-294 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: threatening in the area of information, the Bank of Russia, data asset, information security, information security risk assessment, information security tool, adversary model, information security management, information protection level |