Search by keyword: "information security"
Social risks of information technology development in the knowledge society
| Authors: Sorokin M.A. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Humanities | Chapter: Social sciences | |
| Keywords: information technologies, digitalization, knowledge society, social risks, digital inequality, information security, soft security, ethical and legal risks | |
Security in the Web applications
| Authors: Glinskaya E.V., Bubnovich V.A. | Published: 29.06.2025 |
| Published in issue: #3(98)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: data protection, information security, web applications, cybercrime, API vulnerabilities, XSS attacks, DDoS attacks | |
Analyzing organizational and legal aspects of the information security tools operation in the organization
| Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 18.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, state information systems, protection class, protection level, information security tools, Federal Service for Technical and Export Control, Federal Security Service, significant object of critical information infrastructure, certification tests | |
Development and problems in using artificial intelligence in the information security
| Authors: Volodin A.A., Glinskaya E.V. | Published: 01.05.2024 |
| Published in issue: #2(91)/2024 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention | |
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
| Authors: Kulagin G.I. | Published: 19.04.2022 |
| Published in issue: #3(68)/2022 | |
| DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET | |
Socio-psychological aspects of youth Internet communication
| Authors: Sobornov T.I., Zueva A.E. | Published: 03.08.2021 |
| Published in issue: #7(60)/2021 | |
| DOI: DOI: 10.18698/2541-8009-2021-7-716 | |
| Category: Humanities | Chapter: Social sciences | |
| Keywords: internet communication, anonymity, internet dating, information security, causal attribution, virtual communication, youth, social networks, chat roulette | |
The human factor in the information security of an organization: areas of research, countermeasures, prospects for study
| Authors: Vanin A.V., Marchenko A.V. | Published: 08.05.2020 |
| Published in issue: #4(45)/2020 | |
| DOI: DOI: 10.18698/2541-8009-2020-4-601 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: human factor, information security, information security culture, socio-organizational and psychological aspects, security policy, security threats, awareness, holistic approach | |
Analysis of domestic software protection licensing systems
| Authors: Marchenko A.V. | Published: 25.12.2019 |
| Published in issue: #12(41)/2019 | |
| DOI: DOI: 10.18698/2541-8009-2019-12-561 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: electronic keys, digital signature, certificates, protection, flash-cards, information security, analysis, licensing system, software, cryptographic algorithms | |
DDOS attack detection and prevention methods
| Authors: Kadyrov R.R. | Published: 06.08.2019 |
| Published in issue: #7(36)/2019 | |
| DOI: DOI: 10.18698/2541-8009-2019-7-507 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, denial of service attack, DoS, DDoS, detection and prevention mechanisms, architecture of mitigating the attacks consequences, false positives, access to resources | |
Social engineering: yesterday, today, tomorrow
| Authors: Balakin K.A. | Published: 24.06.2019 |
| Published in issue: #6(35)/2019 | |
| DOI: DOI: 10.18698/2541-8009-2019-6-494 | |
| Category: Humanities | Chapter: Social sciences | |
| Keywords: social engineering, information security, personal information, human factor, impact scheme, social engineering technologies, social engineering techniques, user safety | |
