To see the other types of publications on this topic, follow the link: Information and its security.

Journal articles on the topic 'Information and its security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information and its security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.

Full text
Abstract:
The modern development of the world economy is increasingly defined by its reliance on vast and complex information flows. In today's interconnected global marketplace, the seamless exchange of data underpins almost every aspect of economic activity, from financial transactions and supply chain management to customer interactions and business intelligence. As a result, the importance of addressing issues related to safeguarding data flows and ensuring the confidentiality, integrity, and availability of information during its processing and transmission is growing at an unprecedented pace. Info
APA, Harvard, Vancouver, ISO, and other styles
2

Pisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.

Full text
Abstract:
Information security is a crucial aspect of modern digital infrastructure. This study explores the fundamentalprinciples of information security, its importance, key threats, and best practices for securing digital assets. It provides athorough analysis of current security challenges, presenting statistical data to illustrate trends in cybersecurity. The studyconcludes with recommendations for enhancing security measures.
APA, Harvard, Vancouver, ISO, and other styles
4

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
5

Aslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.

Full text
Abstract:
This article provides an analysis of information, information security, secret information, documented information, confidential information, principles of information security, and the main elements of information security .
APA, Harvard, Vancouver, ISO, and other styles
6

Pietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.

Full text
Abstract:
Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data pro
APA, Harvard, Vancouver, ISO, and other styles
7

FURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.

Full text
Abstract:
Organization of an effective system of economic security is an important aspect of business growth in modern management conditions. Due to the large role of information resources, the reality of threats, the information security problems of enterprises and organizations in Ukraine are relevant. Without protection of the enterprise information environment, it is impossible to ensure its economic security. The heads of enterprises in the field of economics and business do not have special literature on information security. Questions of concepts, characteristics, and components of information se
APA, Harvard, Vancouver, ISO, and other styles
9

Rhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.

Full text
Abstract:
<em>This article investigates the impact of information security threats in computer systems. It discusses such matters as the basic characteristics, principles, methods and mechanisms of information security, as well as organizational, technological and man-machine characters of the nature of CS, defining an extensive set of methods and mechanisms of information security.</em>
APA, Harvard, Vancouver, ISO, and other styles
11

GUO, Zhenyuan. "Computer Network Information Security and Its Protection." Theory and Practice of Science and Technology 1, no. 3 (2020): 109–12. http://dx.doi.org/10.47297/taposatwsp2633-456918.20200103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

ATC. "INFORMATION CENTRIC NETWORKS AND ITS SECURITY CHALLENGES." Journal of Data Acquistion an Processing 38, no. 3 (2023): 5160–83. https://doi.org/10.5281/zenodo.14333572.

Full text
Abstract:
An new networking discipline called "information centric networking" (ICN) has the power tocompletely alter how the Internet functions. ICNs allow users to immediately access contentfrom anywhere on the network, regardless of its physical location, by identifying each item ofinformation by its name instead by the destination host to which it will be routed over thenetwork. This makes ICN networks more scalable, secure, and efficient. However, since ICNinfrastructure is still a relatively new technology, it faces several security challenges. Theseinclude the threat of privacy breach, spoofing,
APA, Harvard, Vancouver, ISO, and other styles
13

Лихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (2012): 70–73. http://dx.doi.org/10.12737/162.

Full text
Abstract:
Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection
APA, Harvard, Vancouver, ISO, and other styles
14

Avdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Vera Vladimirovna Smirnova, Ilya Mihajlovich Rassolov, and Maria Alekseevna Khvatova. "Improvement of Information Technology and Its Impact on Information Security." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 15–21. http://dx.doi.org/10.46338/ijetae1121_02.

Full text
Abstract:
The article reveals the problems of information security in modern conditions with the globalization of international life, changing polycentric relations, taking into account the high rates of development in technical and information resources. The special importance of ensuring information security as an object of legal protection protected by international and national law is noted. The issues of eliminating conflicts in the norms of international law, preventing the possibility of their spreading to the territory of individual sovereign states, are being addressed. The correlation between
APA, Harvard, Vancouver, ISO, and other styles
15

Marczyk, Maciej, and Marek Błachut. "Information security as part of Poland’s security." Scientific Journal of the Military University of Land Forces 206, no. 4 (2022): 609–23. http://dx.doi.org/10.5604/01.3001.0016.1767.

Full text
Abstract:
Dynamic advances in technology as well as information and communication entail many new threats to the functioning of the Polish state, its citizens, as well as to the international community. These are mainly the dangers of using information networks and information systems. For this reason, particular importance is given to ensuring information security which combines procedures and tools for the protection of classified information, data and network systems. Information security has now become one of the most sensitive trans-sectoral areas of national security, having an impact on the effic
APA, Harvard, Vancouver, ISO, and other styles
16

Gorbunov, Igor' Andreevich. "Information security: international legal aspects of its provision." Международное право, no. 1 (January 2024): 29–38. http://dx.doi.org/10.25136/2644-5514.2024.1.70440.

Full text
Abstract:
The relevance of the topic under consideration is due to the globalization of the information space, which arises in connection with the intensive development of information technologies, which implies the need to develop new approaches to ensuring information security. Based on the principles of sovereign equality and international cooperation, States interact with each other in the common interest (including in the legal field), develop basic principles and norms on which the legal foundation for the legal provision of international information security is based. The author states that the i
APA, Harvard, Vancouver, ISO, and other styles
17

Abdugafforovich, Abdullaev Sharof. "Information Security: Modern Realities." European Journal of Higher Education and Academic Advancement 1, no. 2 (2023): 120–23. http://dx.doi.org/10.61796/ejheaa.v1i2.111.

Full text
Abstract:
The article discusses the concept of information security, its general meaning, ways to strengthen it, considers ways to protect personal data, considers the concept of information security. Some advice is given to ordinary users.
APA, Harvard, Vancouver, ISO, and other styles
18

Saadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.

Full text
Abstract:
Information security is still in its embryonic phase. The reason is that there are certain malevolent actors in the network that are always looking for loopholes in the system and can harm organizations with their malicious activities. The development of information security policy is very important. It lays the foundations of certain significant standards and procedures that help mitigate the potential risks associated with the organization or its network. The following article has discussed information security policy and its respective development cycle for the implementation of policy infr
APA, Harvard, Vancouver, ISO, and other styles
19

Bespalov, D. N., and M. A. Kazakov. "Information Warfare, Threats and Information Security." MGIMO Review of International Relations, no. 6(39) (December 28, 2014): 82–87. http://dx.doi.org/10.24833/2071-8160-2014-6-39-82-87.

Full text
Abstract:
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to t
APA, Harvard, Vancouver, ISO, and other styles
20

Hedin, Daniel, Luciano Bello, and Andrei Sabelfeld. "Information-flow security for JavaScript and its APIs." Journal of Computer Security 24, no. 2 (2016): 181–234. http://dx.doi.org/10.3233/jcs-160544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Yue, Haining Wang, and Kun Sun. "Personal Information in Passwords and Its Security Implications." IEEE Transactions on Information Forensics and Security 12, no. 10 (2017): 2320–33. http://dx.doi.org/10.1109/tifs.2017.2705627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ibrahimova, Aytakin Nazim. "The defintions of information and security; history of information security development." Vilnius University Open Series, no. 6 (December 28, 2020): 48–57. http://dx.doi.org/10.15388/os.law.2020.5.

Full text
Abstract:
Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed. Throughout the whole history, without even perceiving it people had to take steps to guarantee the security of important information that they have been able to maintain. The concept of information security is quite dynamic. A behaviour that is generally accepted today can be a peril to an entity that we will work with tomorrow. Developing techno
APA, Harvard, Vancouver, ISO, and other styles
23

Ершова, Е. Е. "Information security as an element of economic security." Management of Education, no. 6(52) (June 30, 2022): 225–30. http://dx.doi.org/10.25726/v8343-7232-2832-p.

Full text
Abstract:
В статье рассмотрена и обосновывается необходимость создания и функционирования качественной системы информационной безопасности современного предприятия, осуществляющего свою деятельность в самых различных направлениях (промышленность, энергетика, гуманитарная сфера и проч.). Также здесь анализируется её роль, которая она играет в ходе создания условий экономической безопасности самой организации и государства в целом. В работе отображена существующая классификация угроз информационной безопасности. Еще проанализированы мероприятия, направленные на защиту информации в современном мире, а такж
APA, Harvard, Vancouver, ISO, and other styles
24

Grabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.

Full text
Abstract:
In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may i
APA, Harvard, Vancouver, ISO, and other styles
25

Mohamad Noorman Masrek, Tri Soesantari, Asad Khan, and Aang Kisnu Dermawan. "Examining the Relationship between Information Security Effectiveness and Information Security Threats." International Journal of Business and Society 21, no. 3 (2021): 1203–14. http://dx.doi.org/10.33736/ijbs.3335.2020.

Full text
Abstract:
Information is the most critical asset of any organizations and business. It is considered as the lifeblood of the organization or business. Because of its importance, information needs to be protected and safeguarded from any forms of threats and this is termed as information security. Information security policy and procedure has been regarded as one of the most important controls and measures for information security. A well-developed information security policy and procedure will ensure that information is kept safe form any harms and threats. The aim of this study is to examine the relati
APA, Harvard, Vancouver, ISO, and other styles
26

Ahmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.

Full text
Abstract:
Purpose The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring. Design/methodology/approach T
APA, Harvard, Vancouver, ISO, and other styles
27

Yusupjanovich, Sharibayev Nosir, Djurayev Sherzod Sobirjonovich, Tursunov Axrorbek Aminjon o‘g‘li, and Sharifbayev Raximjon Nosir o‘g‘li. "ASSESSMENT OF COMPLIANCE WITH INFORMATION SECURITY REQUIREMENTS VIA SECUBE." American Journal of Applied Sciences 5, no. 12 (2023): 16–18. http://dx.doi.org/10.37547/tajas/volume05issue12-04.

Full text
Abstract:
This article focuses on the assessment of compliance with information security requirements using SeCube, a comprehensive information security management system. It explores howSeCube facilitates organizations in meeting various information security standards and regulations. Key features of SeCube, such as risk assessment, policy management, incident tracking, and compliance reporting are examined. The article also highlights the benefits and challenges of using SeCube for compliance purposes, providing insights into its effectiveness in maintaining high information security standards.
APA, Harvard, Vancouver, ISO, and other styles
28

E. N., Uspenskiy, Norkina A. N., Myseva E. R., and Chicherov K. A. "Economic Aspects of Information Security." KnE Social Sciences 3, no. 2 (2018): 170. http://dx.doi.org/10.18502/kss.v3i2.1539.

Full text
Abstract:
In this article economic aspects of information security are analyzed, the key issues of information security in economy and further measures for its facilitation are specified. Keywords: information security, economic aspect, information, security.
APA, Harvard, Vancouver, ISO, and other styles
29

Yarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Full text
Abstract:
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 o
APA, Harvard, Vancouver, ISO, and other styles
30

Pérez-González, Daniel, Sara Trigueros Preciado, and Pedro Solana-Gonzalez. "Organizational practices as antecedents of the information security management performance." Information Technology & People 32, no. 5 (2019): 1262–75. http://dx.doi.org/10.1108/itp-06-2018-0261.

Full text
Abstract:
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance. Design/methodology/approach Based on the literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 111 responses from CEOs at manufacturing small- and medium-sized enterprises (SMEs) that had already implemented security policies. The hypothesized relationships were
APA, Harvard, Vancouver, ISO, and other styles
31

Voronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.

Full text
Abstract:
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term "information security". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of th
APA, Harvard, Vancouver, ISO, and other styles
32

Voronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.

Full text
Abstract:
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term "information security". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of th
APA, Harvard, Vancouver, ISO, and other styles
33

Gałecki, Andrzej. "Contemporary Conditions of Information Security." System Safety: Human - Technical Facility - Environment 3, no. 1 (2021): 289–95. http://dx.doi.org/10.2478/czoto-2021-0030.

Full text
Abstract:
Abstract In the age of the information society, determined by the evolution of digital technology, information has become an essential element of the functioning of every human being. Its acquisition, processing and distribution serves to satisfy the key areas of society’s life and constitutes a necessary component of every decision-making process. These days became dominated by the increasing demand for information. The problem of its protection against unwanted obtaining (disclosure) has become a challenge for many scientific communities. This state of affairs has forced us to take a number
APA, Harvard, Vancouver, ISO, and other styles
34

DOVHAN, O. "Modern information structures as components of information security." INFORMATION AND LAW, no. 2(14) (August 19, 2015): 111–20. http://dx.doi.org/10.37750/2616-6798.2015.2(14).272705.

Full text
Abstract:
The article considers the modern information structures as components of information security. The structural organization of information security management system must be adequate to the general system of public administration – must be multilevel and territorially distributed with coordinated action of its components.
APA, Harvard, Vancouver, ISO, and other styles
35

Каримов, Х. Т., В. А. Андрианов, В. Н. Пермяков, Л. М. Тархова, and В. Г. Урманов. "Information security as a path to information systems efficiency." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 4 (December 29, 2023): 108–15. http://dx.doi.org/10.18137/rnu.v9187.23.04.p.108.

Full text
Abstract:
Рассматриваются вопросы, относящиеся к текущему состоянию безопасности компьютерных сетей. Производится анализ факторов, влияющих на безопасность компьютерных сетей. Поднимаются вопросы необходимости усиления безопасности компьютерных сетей и эффективности использования технологий шифрования для безопасности данных. The article addresses the issues related to the current state of computer network security and the need to strengthen its security. An analysis of factors affecting the security of computer networks is carried out. The authors raise the question of the effectiveness of using encryp
APA, Harvard, Vancouver, ISO, and other styles
36

Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. J. Hinek. "Dual RSA and Its Security Analysis." IEEE Transactions on Information Theory 53, no. 8 (2007): 2922–33. http://dx.doi.org/10.1109/tit.2007.901248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Axmetov Rustam Dilshotovich. "Cyber Security and its Fundamentals." European Multidisciplinary Journal of Modern Science 26, no. 1 (2024): 8–12. http://dx.doi.org/10.51699/emjms.v26i1.1094.

Full text
Abstract:
Ransomware typically targets large commercial targets. However, random victims who are unable to repel a cyber attack also fall under their attacks. This article will talk about how malware can harm the life of an entire city, and even a country. This article provides information on cyber security, a summary of its worldwide research status and implications, and statistical sources.
APA, Harvard, Vancouver, ISO, and other styles
38

Tayyaba Sultana, Tayyaba Sultana. "Information Security with Cryptography." International Journal for Electronic Crime Investigation 2, no. 1 (2018): 6. http://dx.doi.org/10.54692/ijeci.2018.02019.

Full text
Abstract:
The purpose of Information Security and Cryptography is to secure the data transmission and network over wireless network. The main feature of data Security is to protect transmission of data over unsecure network. The authorization of access over the data within the network is included in Information Security and which is managed by the administration of network. The users are authorized and have their own ID and password or may be some other validating information which permits them to access the programs and information under their limited authority. Diversity of computer networks is covere
APA, Harvard, Vancouver, ISO, and other styles
39

Churilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.

Full text
Abstract:
To control the access to information systems (IS), user identification and authentication processes play an important role, which allows to identify the user by the identifier and verify its authenticity. In the most common case, these systems are based on a combination of a username and a password, i.e. the user must remember this combination. However, in recent years, the popularity of systems that use human biometric data, which is always with us and can not be forgotten or lost, has increased, which provides certain convenience for users, since they do not need to remember anything or pres
APA, Harvard, Vancouver, ISO, and other styles
40

Аверченкова, Елена, Elena Averchenkova, Д. Гончаров, D. Goncharov, Дмитрий Лысов, and Dmitriy Lysov. "MODEL OF INFORMATION SECURITY OF INFORMATION ADVISING SY." Bulletin of Bryansk state technical university 2016, no. 4 (2016): 251–61. http://dx.doi.org/10.12737/23243.

Full text
Abstract:
The problems in assurance of information security for the automated system under development are considered. The model of threats to security is formulated. A topicality and possibility of threats realization, a level of design protection of the information system developed are defined. Peculiarities in the formation of an information security module and its correlation with other elements of a structural-functional circuit of an automated system are considered.
APA, Harvard, Vancouver, ISO, and other styles
41

Nowrin, Shohana, and David Bawden. "Information security behaviour of smartphone users." Information and Learning Science 119, no. 7/8 (2018): 444–55. http://dx.doi.org/10.1108/ils-04-2018-0029.

Full text
Abstract:
Purpose The purpose of this study is to understand the information security behaviour of the students of the University of Dhaka, Bangladesh in the use of smartphones. Bangladesh is well-known as one of the largest and fastest growing mobile phone market of the world, and the University of Dhaka is also the largest student’s assembly in the country in terms of using smartphones. Besides, the rising use of smartphones is also likely to be typical of other sub-continent countries. Design/methodology/approach To gain an understanding of the information security behaviours of the students of Unive
APA, Harvard, Vancouver, ISO, and other styles
42

Teymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.

Full text
Abstract:
According to the legal literature, information and information systems are objects of information-legal relations. Information is facts, opinions, information, news or other information created or obtained as a result of any activity, regardless of the date of its creation, form of presentation and classification. An information system is a regulated set of information technologies and documents. Information security means the protection of information and the infrastructure that serves it from unacceptable, harmful or accidental or intentional threats to the participants of the information re
APA, Harvard, Vancouver, ISO, and other styles
43

Som, Zoltán, and Tamás Szádeczky. "The legend of information security." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 385–98. http://dx.doi.org/10.24989/ocg.v325.32.

Full text
Abstract:
Act 50 of 2013 has served as a new and large scale impetus for both public bodies and local governments regarding information security in Hungary. This naturally means an increased need for professionals on the field. The National University of Public Services has become an institution that may very well be capable of training the required number of professionals. The aforementioned act has been amended by an implementing regulation (no. 41/2015) and as a result the system as a whole has changed regarding information security.3 This paper aims to highlight any problems that shall be addressed
APA, Harvard, Vancouver, ISO, and other styles
44

Zhestovskii, Aleksandr Georgievich, Denis Yaroslavovich Okolot, and Igor Davidovich Rudinskiy. "Marine Specialist’s Information Security Culture and Its Formation Conditions." Pedagogika. Voprosy teorii i praktiki, no. 1 (January 2022): 100–107. http://dx.doi.org/10.30853/ped20220010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cooper, Martin. "BCS Information Security Specialist Group Celebrates its 40th Anniversary." ITNOW 65, no. 2 (2023): 8–11. http://dx.doi.org/10.1093/combul/bwad041.

Full text
Abstract:
Abstract Conceived in 1983, the ISSG was founded to focus on professionalism and professional development within security. BCS marked its landmark anniversary with a London event. Martin Cooper MBCS reports.
APA, Harvard, Vancouver, ISO, and other styles
46

Rusetskaya, Irina A. "COMPLIANCE IN INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2023): 70–80. http://dx.doi.org/10.28995/2686-679x-2023-2-70-80.

Full text
Abstract:
The article is about studying the main approaches to the organization of compliance in solving the issues of ensuring information security. It analyzes the concept of compliance and its main components. Considering the system of compliance functions, the author also analyzes the categories of norms and requirements that underlie the implementation of compliance functions, as well as examples of legal and regulatory documents in the field of information security compliance. There are notes on features of the modern development of compliance in Russia in various fields. The main tasks of complia
APA, Harvard, Vancouver, ISO, and other styles
47

Sohrabi Safa, Nader, Carsten Maple, Tim Watson, and Steve Furnell. "Information security collaboration formation in organisations." IET Information Security 12, no. 3 (2018): 238–45. http://dx.doi.org/10.1049/iet-ifs.2017.0257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Seehusen, F., and K. Stølen. "Information flow security, abstraction and composition." IET Information Security 3, no. 1 (2009): 9–33. http://dx.doi.org/10.1049/iet-ifs:20080069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Everett, Cath. "Microsoft bares its security teeth." Infosecurity 4, no. 1 (2007): 26–28. http://dx.doi.org/10.1016/s1754-4548(07)70016-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Korniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.

Full text
Abstract:
This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the network, Third-party Applications for network packet analysis are supported. Depending on
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!