To see the other types of publications on this topic, follow the link: Modern methods of information protection.

Journal articles on the topic 'Modern methods of information protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Modern methods of information protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shelupanov, Alexander, Oleg Evsyutin, Anton Konev, Evgeniy Kostyuchenko, Dmitry Kruchinin, and Dmitry Nikiforov. "Information Security Methods—Modern Research Directions." Symmetry 11, no. 2 (2019): 150. http://dx.doi.org/10.3390/sym11020150.

Full text
Abstract:
In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools develop
APA, Harvard, Vancouver, ISO, and other styles
2

Sharsheeva, K. T., A. N. Zhumabaeva, and G. M. Usubakunova. "RESEARCH OF INFORMATION SYSTEMS PROTECTION METHODS USING MODERN AUTHENTICATION METHODS." Herald of KSUCTA n a N Isanov, no. 1-2021 (March 22, 2021): 20–25. http://dx.doi.org/10.35803/1694-5298.2021.1.20-25.

Full text
Abstract:
At the moment, the exchange of data via insecure communication channels is the most vulnerable to information systems that store a large amount of data, the partial loss or substitution of which can lead to irreversible consequences. For this reason, in order to ensure security, the task is to use such methods and means that allow to verify the authenticity of the user's belonging to this system and, if successful, give access to information. In this paper are reviewed authentication methods that can be used depending on the needs of the systems, their vulnerabilities and recommend solutions t
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrokhimova, Maftunakhona. "MODERN METHODS AND MEANS OF ENSURING INFORMATION SECURITY." Research and implementation 2, no. 2 (2024): 151–58. https://doi.org/10.5281/zenodo.10687797.

Full text
Abstract:
The importance of information in the life of any developed society is continuously increasing. From a long time ago, the information of the military-strategic importance of the state was strictly kept secret and protected. Currently, information related to production technologies and sales of products has the form of a commodity, and the demand for it in the domestic and foreign markets is increasing. Information technologies are constantly improving in the areas of automation and information protection. The development of modern information technologies is observed together with negative even
APA, Harvard, Vancouver, ISO, and other styles
4

Qizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.

Full text
Abstract:
In today's information society, the problem of information security is extremely important. In this article, the concept of information security and its tasks, threats to information security, the concept of encryption and types of encryptions, encryption standards, cryptography goals are given in-depth information. Issues of reliable protection of information were studied
APA, Harvard, Vancouver, ISO, and other styles
5

Khavikova, Yuliia. "PROTECTION OF INFORMATION IN ELECTRONIC SERVICES." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 215–28. http://dx.doi.org/10.28925/2663-4023.2024.25.215228.

Full text
Abstract:
The publication explores the problem of information security in the context of the rapid development of electronic services and growing requirements for their security. It is noted that the intensive introduction of modern technologies into financial and other electronic systems leads to an increase in the volume of electronic transactions and information exchange, which intensifies the need for highly effective security methods. The main emphasis is placed on the importance of using multi-factor authentication and modern cryptographic methods to prevent unauthorized access to confidential inf
APA, Harvard, Vancouver, ISO, and other styles
6

SHEVKO, N. R. "CYBER THREATS IN THE NEW REALITY OF RUSSIA: STATUS AND METHODS OF COUNTERING." Victimology 11, no. 4 (2024): 528–37. https://doi.org/10.47475/2411-0590-2024-11-4-528-537.

Full text
Abstract:
In the modern world, information security issues are becoming an integral part of life . In connection with the widespread introduction of modern information technologies into human activity, his life, information resources are the most vulnerable part of the system, subject to increasing attacks from intruders and of interest . Moreover, every year, cybercriminals use new ways and methods of committing atrocities, finding vulnerabilities both in computer networks, information security systems, and taking advantage of the gullibility and computer illiteracy of users, including using social eng
APA, Harvard, Vancouver, ISO, and other styles
7

Oliinyk, Yaroslav, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, and Yurii Shevchuk. "METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 100–108. https://doi.org/10.28925/2663-4023.2025.27.705.

Full text
Abstract:
This paper examines modern IoT systems, which are an integral part of technological progress. They have found application in industry, transport, smart home systems and other technical areas. However, the large number of connected devices, their limited computing resources and dependence on wireless networks make these systems extremely vulnerable to attacks aimed at violating the confidentiality, integrity and availability of data. The article considers a method for protecting information in IoT systems, which takes into account the vulnerabilities of wireless networks and devices such as IP
APA, Harvard, Vancouver, ISO, and other styles
8

Shelupanov, A. A., O. O. Evsutin, A. A. Konev, E. Yu Kostychenko, D. V. Kruchinin, and D. S. Nikiforov. "Modern trends in development of methods and means for information protection." Proceedings of Tomsk State University of Control Systems and Radioelectronics 20, no. 3 (2017): 11–24. http://dx.doi.org/10.21293/1818-0442-2017-20-3-11-24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fediushyn, O. I., Y. V. Holovko, A. O. Smirnov, V. M. Sukhoteplyi, and O. V. Chechui. "Methods of information protection based on quantum image steganography." Radiotekhnika, no. 218 (September 26, 2024): 44–55. https://doi.org/10.30837/rt.2024.3.218.03.

Full text
Abstract:
The purpose of the article is to study information protection methods based on quantum image steganography. Traditional image protection techniques have limitations in terms of resilience and reliability. The use of quantum computing, particularly the NEQR model, offers significant advantages in enhancing the security and efficiency of watermarks and steganography. The article analyzes existing approaches to image representation in quantum states and demonstrates their superiority in digital image protection. A simulation of steganography using quantum algorithms is presented, showing improved
APA, Harvard, Vancouver, ISO, and other styles
10

Nikitin, Petr Vladimirovich, and Rimma Ivanovna Gorokhova. "Analysis of modern intelligent methods for protecting critical information infrastructure." Вопросы безопасности, no. 3 (March 2024): 14–38. http://dx.doi.org/10.25136/2409-7543.2024.3.69980.

Full text
Abstract:
Critical information infrastructure (CII), including the financial sector, plays a key role in ensuring the sustainable functioning of economic systems and the financial stability of States. However, the growing digitalization of the financial industry and the introduction of innovative technologies are opening up new attack vectors for attackers. Modern cyber attacks are becoming more sophisticated, and traditional defenses are proving ineffective against new, previously unknown threats. There is an urgent need for more flexible and intelligent cybersecurity systems. Thus, the subject of the
APA, Harvard, Vancouver, ISO, and other styles
11

Tsekhmeister, Rostyslav, Artem Platonenko, Maksym Vorokhob, Vyacheslav Cherevyk, and Svitlana Semeniaka. "RESEARCH OF INFORMATION SECURITY PROVISION METHODS IN A VIRTUAL ENVIRONMENT." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 63–71. https://doi.org/10.28925/2663-4023.2025.27.703.

Full text
Abstract:
In today’s world of technological development and dependence, unfortunately, most IT assets of companies remain vulnerable due to a combination of technical and organizational factors, such as outdated technologies, configuration errors and the human factor. These weaknesses become the main entry points for cyber threats, allowing attackers to gain unauthorized access to data, disrupt services or launch large-scale attacks. The lack of a systematic approach to security significantly increases the risks of losing critical information and downtime. Analysis of existing threats, such as DDoS atta
APA, Harvard, Vancouver, ISO, and other styles
12

Lukova-Chuiko, Natalia, Serhii Toliupa, and Ivan Parkhomenko. "Intrusion detection methods in modern IDS systems." Information systems and technologies security, no. 1 (5) (2021): 19–26. http://dx.doi.org/10.17721/ists.2021.1.17-24.

Full text
Abstract:
Currently, the problem of protection of information and communication systems and resources of cyberspace is acute. The rapid development of the information sphere also leads to the modernization and complexity of methods of attacking cyberspace objects. The statistics of successful attacks on computer systems of various organizations, including government agencies, are growing every year. From this we can conclude that even the most reliable protection systems do not give a 100% guarantee of protection. One of the possible reasons for this state of affairs may be the use of standard security
APA, Harvard, Vancouver, ISO, and other styles
13

Novichkov, V. E. "Information Habitat and its Criminal Law Protection." Proceedings of Southwest State University. Series: History and Law 13, no. 4 (2023): 93–106. http://dx.doi.org/10.21869/2223-1501-2023-13-4-93-106.

Full text
Abstract:
Relevance. All previous conditions of human habitation on earth: natural, man-made, social and others, have determined the modern "information environment" of people. The “information environment” that has existed since the beginning of the 21st century is a new constant representing the organization, management and life support of the information society, the state and the individual. The increase in the flow of information, as well as its volume, essence and features, the "information habitat" is constantly filled with new meanings and meanings, which determines the relevance of the study of
APA, Harvard, Vancouver, ISO, and other styles
14

Fedorchenko, Volodymyr, Olha Yeroshenko, Oleksandr Shmatko, Oleksii Kolomiitsev, and Murad Omarov. "PASSWORD HASHING METHODS AND ALGORITHMS ON THE .NET PLATFORM." Advanced Information Systems 8, no. 4 (2024): 82–92. http://dx.doi.org/10.20998/2522-9052.2024.4.11.

Full text
Abstract:
Web applications, which are widely used to provide services and collect information, have become a major target for attackers, especially with the emergence of government services that process sensitive data. The .NET software platform, popular for developing web applications, includes built-in hashing algorithms (HA) and key generation functions (KDF) to protect passwords. However, these were developed over two decades ago for different levels of threats. More modern alternatives, such as Bcrypt, Scrypt, and Argon2, offer improved protection against modern GPU, ASIC, and FPGA attacks, but req
APA, Harvard, Vancouver, ISO, and other styles
15

Laptiev, Serhii. "THE ADVANCED METHOD OF PROTECTION OF PERSONAL DATA FROM ATTACKS USING SOCIAL ENGINEERING ALGORITHMS." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 45–62. http://dx.doi.org/10.28925/2663-4023.2022.16.4562.

Full text
Abstract:
Social interaction of subjects in the modern world, in addition to positive forms, also has negative ones. In modern society it is impossible to do without social networks and in the modern world the Internet - technologies prevail. Currently, everyone connected to a computer is registered in at least one social network. Social networks attract people, because in today's world all people communicate, exchange information, and get acquainted, some people come up with a virtual world in which they can be fearless, and popular and thus abandon reality. The problem related to the security of perso
APA, Harvard, Vancouver, ISO, and other styles
16

Popov, A. D., and A. D. Popova. "Analysis of information security technologies for use in the enterprise infrastructure." Herald of Dagestan State Technical University. Technical Sciences 49, no. 4 (2023): 78–84. http://dx.doi.org/10.21822/2073-6185-2022-49-4-78-84.

Full text
Abstract:
Objective. The purpose of the study is to analyze modern information security technologies for solving the problems of protecting information in the enterprise infrastructure.Method. The study is based on the methods of system analysis, synthesis, deduction.Result. The analysis was carried out and the features of information protection technology were disclosed for the purpose of possible use in the infrastructure of the enterprise. The analysis of domestic and foreign software for practical use is carried out.Conclusion. The results of the analysis reveal the features of using information pro
APA, Harvard, Vancouver, ISO, and other styles
17

Peliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "Modern threats to information and communication systems and methods of protection against them." Radiotekhnika, no. 216 (March 20, 2024): 46–56. http://dx.doi.org/10.30837/rt.2024.1.216.03.

Full text
Abstract:
In the modern world, information and communication systems (ICS) have become an integral part of our lives, processing, storing and transmitting information. However, this dependence makes them extremely vulnerable to various threats. The article examines the current threats that call into question the normal functioning of ICS. The authors emphasise the constant evolution of these threats, which makes them more complex and dangerous. This necessitates constant research and development of new methods and means of information protection, as well as raising awareness of ICS users about cyber thr
APA, Harvard, Vancouver, ISO, and other styles
18

Kulikov, Aleksandr, Pavel Ilyushin, and Anton Loskutov. "Enhanced Readability of Electrical Network Complex Emergency Modes Provided by Data Compression Methods." Information 14, no. 4 (2023): 230. http://dx.doi.org/10.3390/info14040230.

Full text
Abstract:
Current microprocessor-based relay protection and automation (RPA) devices supported by IEC 61850 provide access to a large amount of information on the protected or controlled electric power facility in real time. The issue of using such information (Big Data) in order to improve the parameters of technical modification of intelligent electronic devices at digital substations remains unaddressed. Prerequisites arise for designing modern power systems with relay protection devices of a new generation based on new information algorithms. In particular, it is expedient to develop multi-parameter
APA, Harvard, Vancouver, ISO, and other styles
19

Nikolaeva, Kristina A., and Aelita V. Shaburova. "THE PROBLEM OF ENSURING INFORMATION SECURITY AT ENTERPRISES IN MODERN CONDITIONS." Interexpo GEO-Siberia 6 (May 21, 2021): 230–34. http://dx.doi.org/10.33764/2618-981x-2021-6-230-234.

Full text
Abstract:
Today, an urgent problem is the proper provision of information security in organizations and enterprises, since access to protected information can cause significant damage to the company and its financial position. Based on the fact that the greatest attention and protection is required for information in enterprises, this article will consider, of various kinds, the causes of information security violations, as well as the means and methods of protecting this information. The need to protect information is caused by the increase in its importance in recent years, which explains the relevanc
APA, Harvard, Vancouver, ISO, and other styles
20

Sanieva, Alina D. "SECURITYAND DATA PROTECTION IN UNMANNED INFORMATION TRANSMISSION SYSTEMS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 7/6, no. 148 (2024): 14–22. http://dx.doi.org/10.36871/ek.up.p.r.2024.07.06.002.

Full text
Abstract:
This article discusses the issues of data security and protection in unmanned information transmission systems. The main types of unmanned systems, their vulnerabilities and key threats to data security are described. Particular attention is paid to modern technologies and methods of data protection, including cryptographic methods, authentication protocols, as well as promising approaches such as machine learning and blockchain. Practical examples of the application of protection methods, as well as the problems and challenges associated with their implementation are discussed. In conclusion,
APA, Harvard, Vancouver, ISO, and other styles
21

Zharkov, Grigoriy, Sergey Pshenichnyy, and Marina Ozhiganova. "Analysis of ERP-Systems Protection Methods." NBI Technologies, no. 3 (January 2019): 24–28. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.4.

Full text
Abstract:
The ERP is an organizational strategy of integration of production and operations, human resources management, financial management and asset management, focused on continuous balancing and optimization of enterprise resources through a specialized integrated software application package that provides a common model of data and processes for all areas of activity. An ERP system is a specific software package that implements the ERP strategy. Today, many modern companies use ERP-systems as an effective means of automation and acceleration of business processes. Most ERP-systems have impressive
APA, Harvard, Vancouver, ISO, and other styles
22

Dzhulij, V. M., V. A. Boychuk, V. Y. Titova, O. V. Selyukov, and O. V. Miroshnichenko. "PROTECTION MODELS AND METHODS AGAINST THREATED PROGRAMS INFORMATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 72–84. http://dx.doi.org/10.17721/2519-481x/2020/67-08.

Full text
Abstract:
The article proposes an approach to the development of protection methods against threatening programs in modern information systems, which consists in the development of security methods based on the implementation of access control to files by their types, which can be identified by file extensions that significantly exceed the known methods of antivirus protection, such as on the effectiveness of protection, as well as the impact on the load of computing resources of the information system. It is shown that the most important for protection are executable binary and script files, and that t
APA, Harvard, Vancouver, ISO, and other styles
23

Skitsko, Oleksii. "ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 229–40. http://dx.doi.org/10.28925/2663-4023.2024.24.229240.

Full text
Abstract:
In the modern digital world, where information technology is an integral part of life, cybersecurity issues are becoming increasingly relevant. One of the key aspects of protecting information systems is managing the attack surface, which includes all possible entry points for malicious actors. Forming and managing the attack surface is a complex task that requires constant attention and improvement. Malicious actors (“Threat actors”) play a crucial role in this process. They constantly seek new ways to penetrate systems, using various methods and techniques. These “actors” can vary in their o
APA, Harvard, Vancouver, ISO, and other styles
24

Chikrii, Arkadii, Ihor Martyniuk, Alona Desiatko, Inna Malyukova, and Roman Shyrshov. "THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 41–53. https://doi.org/10.28925/2663-4023.2025.27.714.

Full text
Abstract:
In the modern digital world, where information technology is an integral part of life, cybersecurity issues are becoming increasingly relevant. One of the key aspects of protecting information systems is managing the attack surface, which includes all possible entry points for malicious actors. Forming and managing the attack surface is a complex task that requires constant attention and improvement. Malicious actors («Threat actors») play a crucial role in this process. They constantly seek new ways to penetrate systems, using various methods and techniques. These "actors" can vary in their o
APA, Harvard, Vancouver, ISO, and other styles
25

Антипина, Н. М., Ф. А. Юн, Т. А. Гусева, and А. В. Желтенков. "Actual problems of ensuring information security." Экономика и предпринимательство, no. 4(129) (May 31, 2021): 1221–25. http://dx.doi.org/10.34925/eip.2021.129.4.242.

Full text
Abstract:
Повсеместное использование информационных систем для хранения, обработки и передачи данных приводит к повышению актуальности проблем, связанных с их защитой. Статья посвящена рассмотрению вопросов защиты современных информационных ресурсов и информационных систем от несанкционированного доступа. Обзор проблем обеспечения информационной безопасности приводит к выводу, что имеется ряд актуальных проблем, препятствующих эффективному обеспечению информационной безопасности общества. Раскрыто понятие информационной безопасности и защиты информации; виды угроз информационной безопасности; предложена
APA, Harvard, Vancouver, ISO, and other styles
26

Gurevich, Vladimir. "Susceptibility of modern relay protection: Will protection from cyber attacks help?" Serbian Journal of Electrical Engineering 11, no. 2 (2014): 233–41. http://dx.doi.org/10.2298/sjee131026019g.

Full text
Abstract:
Modern trends in relay protection (RP) based on the substitution of electromechanical protection relays (EMPR) by digital protective relays (DPR) have resulted in the emergence of an absolutely new problem, which was not known before. This problem is the possibility of an intentional remote destructive impact (IRDI) on relay protection in order to put it out of action or make it perform functions that have nothing to do with the current operational mode of protected electric equipment. Traditional and well-known methods ensuring information safety cannot fully prevent unauthorized actions of R
APA, Harvard, Vancouver, ISO, and other styles
27

Semenovikh, A. E. "Legal Protection of Genetic and Genomic Information in Genomic Legal Relationship: A Civil Law Aspect." Lex Genetica 3, no. 3 (2024): 93–106. http://dx.doi.org/10.17803/lexgen-2024-3-3-93-106.

Full text
Abstract:
Genetic and genomic information has enormous potential. In the near future; such information may be determined as an integral part of the world order in general; and the legal order in particular. The author examines the modern theory of legal relations; applying it to genomic legal relations regarding genetic and genomic information and methods of protecting such information. The author examines the mechanism of civil law protection to identify those legal means by which it is possible to ensure legal protection of genetic and genomic information. The research is aimed at studying the mechani
APA, Harvard, Vancouver, ISO, and other styles
28

Kozyreva, Nadezhda Ivanovna, Mihail Olegovich Muhtulov, Sergei Aleksandrovich Ershov, Sofiya Vladimirovna Novoseltseva, and Dinar Ayratovich Akhmadullin. "Modern methods of preventing DDoS attacks and protecting web servers." Программные системы и вычислительные методы, no. 2 (February 2025): 190–203. https://doi.org/10.7256/2454-0714.2025.2.73667.

Full text
Abstract:
The object of the study is modern methods and technologies for protecting web servers from distributed denial of service (DDoS) attacks. The subject of the research covers current strategies for preventing and mitigating DDoS threats, including a detailed classification of attacks by types and vectors of impact. Special attention is paid to the mechanisms of DDoS attack effects on information systems, addressing both the technical aspects of operational disruptions and their consequences for business processes. The field of study analyzes modern technological protection solutions: Anycast rout
APA, Harvard, Vancouver, ISO, and other styles
29

Shcheblanin, Yurii, Bohdan Sydorenko, and Inna Mykhalchuk. "SECURITY OF REST API: THREATS AND PROTECTION METHODS." Information systems and technologies security, no. 2 (8) (2024): 60–65. https://doi.org/10.17721/ists.2024.8.60-65.

Full text
Abstract:
B a c k g r o u n d . The increase in malicious activity in the information space creates additional challenges for organizations that use REST APIs to transfer data and facilitate interactions with clients and partners. According to statistics, over 80% of modern web traffic goes through web APIs, making them an attractive target for cybercriminals. Vulnerabilities in REST API authentication and authorization mechanisms can lead to data breaches, financial losses, and reputational risks. Therefore, ensuring REST API security is a critical task for modern companies, especially those operating
APA, Harvard, Vancouver, ISO, and other styles
30

Senyk, Sviatoslav, Oleksandr Kondratiuk, Ihor Fedchak, Stepan Tserkovnyk, and Marianna Fedun. "Application of international standards with a view to ensuring legal and organizational aspects of information protection in specialized information systems." Cuestiones Políticas 41, no. 76 (2023): 419–36. http://dx.doi.org/10.46398/cuestpol.4176.24.

Full text
Abstract:
The article analyzes the regulatory and legal framework of Ukraine in the field of information protection, in order to develop proposals on the improvement of organizational and legal measures aimed at the protection of information resources in specialized information systems of the state authorities of Ukraine. It was imposed the necessity to clearly identify at organizational and legal level the problems of safe operation of specialized information systems, to determine the key threats in the field of information protection and to provide in time new modern legal tools to counteract the thre
APA, Harvard, Vancouver, ISO, and other styles
31

Shevchenko, Svitlana, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, and Kateryna Kravchuk. "MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY." Cybersecurity: Education, Science, Technique, no. 5 (2019): 31–39. http://dx.doi.org/10.28925/2663-4023.2019.5.3139.

Full text
Abstract:
The article deals with the application of modern mathematical apparatus in information and cyber security namely fractal analysis. The choice of fractal modeling for the protection of information in the process of its digital processing is grounded. Based on scientific sources, the basic definitions of the research are analyzed: fractal, its dimension and basic properties used in the process of information protection. The basic types of fractals (geometric, algebraic, statistical) are presented and the most famous of them are described. The historical perspective of the development of fractal
APA, Harvard, Vancouver, ISO, and other styles
32

Rodionov, Aleksandr, Vladislav Belyanin, and Aleksandr Gorbunov. "Improving the Methods for Protecting Information from Unauthorized Access." NBI Technologies, no. 2 (December 2018): 39–43. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.6.

Full text
Abstract:
The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capab
APA, Harvard, Vancouver, ISO, and other styles
33

Diachenko, L., N. Dichek, and O. Orel. "Information in the modern digital world." Fundamental and applied researches in practice of leading scientific schools 38, no. 2 (2020): 135–38. http://dx.doi.org/10.33531/farplss.2020.2.24.

Full text
Abstract:
The article analyzes the concept of “information” in its different representations: in the form of documents, drawings, pictures, texts, audio or light signals, electrical or nerve impulses etc., considers the most significant properties of the information (objectivity and subjectivity; completeness; reliability; adequacy; availability; relevance; accuracy; value) which have lately gained a worldwide currency). It analyzes the topics of journal and online publications, IT expert reviews as to the researches on the Information Theory. It is noted that the Source, Signal Channel, Converter, Codi
APA, Harvard, Vancouver, ISO, and other styles
34

Volosatova, Tamara M., and Anastasiya A. Kozar’. "ANALYSIS OF THE APPLICATION OF DIGITAL HOLOGRAPHY METHODS FOR INFORMATION PROTECTION." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2022): 44–58. http://dx.doi.org/10.28995/2686-679x-2022-4-44-58.

Full text
Abstract:
The paper provides an overview of digital holography as a method of recording information, provides general information about the concept of “hologram” of different types, draws a parallel between physical (optical, analogous) and digital holography, considers differences and similarities, and points out the reasons for the predominance of digital holography for modern purposes. The principles and some methods of synthesizing digital holograms are briefly considered, their advantages and disadvantages are given. The article also considers a brief historical background on the creation of the co
APA, Harvard, Vancouver, ISO, and other styles
35

Pechyonkina, Angelika, and Igor Karmanov. "APPLICATION OF DIGITAL WATERMARKS FOR INTELLECTUAL PROPERTY PROTECTION." Interexpo GEO-Siberia 6, no. 2 (2019): 159–68. http://dx.doi.org/10.33764/2618-981x-2019-6-2-159-168.

Full text
Abstract:
At the moment, due to the development of global networks, protection of intellectual property from illegal copying is of great importance. A lot of research is devoted to use of steganography for copyright protection. Steganographic methods not only secretly transmit information, but also solve problems of authentication noise immunity, protecting data from unauthorized copying, tracking information movement in a network and for searching it in multimedia databases. Most areas of applied mathematics are used as a tool for steganography, and the term «stego» has long been used by Internet users
APA, Harvard, Vancouver, ISO, and other styles
36

Laptiev, Oleksandr, Vitalii Savchenko, Alla Kobozieva, Anatolii Salii, and Tymur Kurtseitov. "METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 522–33. https://doi.org/10.28925/2663-4023.2025.27.767.

Full text
Abstract:
The article considers methodological approaches to determining and assessing information security indicators in modern security systems. The authors focus on the complexity of the process of selecting indicators to assess the level of security, which requires taking into account a wide range of factors. These include the characteristics of protected components, destabilizing environmental influences, protection mechanisms, and the time aspect, which plays a key role in predicting the effectiveness of protective measures. A generalized approach to constructing an integral indicator is proposed,
APA, Harvard, Vancouver, ISO, and other styles
37

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of
APA, Harvard, Vancouver, ISO, and other styles
38

Israfilov, A. "CYBERSECURITY IN THE AUTOMOTIVE INDUSTRY: VULNERABILITIES AND PROTECTION." Sciences of Europe, no. 145 (July 26, 2024): 60–63. https://doi.org/10.5281/zenodo.12910322.

Full text
Abstract:
Protection against cyber threats in the automotive industry is one of the most crucial aspects of ensuring the safety of vehicles equipped with information and communication systems. The article analyzes existing vulnerabilities and their consequences for car users, manufacturers, and society. It examines various types of threats and attacks, as well as modern protection methods. The necessity for joint efforts by automotive market participants to ensure cybersecurity in vehicle internal systems is emphasized.
APA, Harvard, Vancouver, ISO, and other styles
39

Shevchuk, M. O. "The mechanism for ensuring information security of individuals." Analytical and Comparative Jurisprudence, no. 6 (December 16, 2024): 684–89. https://doi.org/10.24144/2788-6018.2024.06.113.

Full text
Abstract:
The article examines the mechanism of ensuring information security of individuals. The author emphasizes that there is a tendency in legislation to presume information security. This is one of the legal means to ensure information security and protect the rights of information owners. This presumption performs several important functions: it ensures the legality of actions with information, guarantees the fact of information security, protects the rights of participants in information legal relations, and allows to assess the significance and value of information. Users of information subject
APA, Harvard, Vancouver, ISO, and other styles
40

Metelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.

Full text
Abstract:
In theory and in practice, there is uncertainty in the existence of measures for cryptographic protection of information due to the fuzzy legal regulation of the classification of information protection measures associated with the use of cryptographic methods and encryption (cryptographic) information protection tools to ensure the security of data automatically processed in information systems. Cryptographic methods are widely used not only to protect information from unauthorized access, but also as the basis for a number of modern information technologies. The author proposed to introduce
APA, Harvard, Vancouver, ISO, and other styles
41

Rymchuk, Iryna, Serhii Kostiuchko, Mykola Polishchuk, Serhii Hryniuk, and Liudmyla Konkevych. "COMMUNICATION PROCESSES SECURITY USING VISUAL CRYPTOGRAPHY." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 258–67. https://doi.org/10.28925/2663-4023.2024.26.677.

Full text
Abstract:
The article is devoted to the study of data encryption technologies with an emphasis on visual cryptography, which is a modern and promising method of ensuring information confidentiality. The main attention is paid to the analysis of information encryption existing methods and the solutions development that allow to ensure reliable communications protection. Visual cryptography, as one of the modern methods, is relevant due to the growing need for protecting confidential data in the face of increasing cybersecurity threats. The paper describes the basic principles of visual cryptography, its
APA, Harvard, Vancouver, ISO, and other styles
42

Aboelfotoh, Said F., and Noha A. Hikal. "A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises." JOIV : International Journal on Informatics Visualization 3, no. 2 (2019): 157. http://dx.doi.org/10.30630/joiv.3.2.239.

Full text
Abstract:
Regarding the huge spread of technology among individuals and enterprises, technologies and electronic communications become one of the most important pillars of the operation of small and large enterprises alike, and the source of education and entertainment for individuals, this led to thinking about the risks of reliance on this technology and the impact on the economic index of enterprises market, reputation and the safety of individuals and enterprises, these fears forced the experts and decision-makers to think about information security and develop new methods to measure and assess the
APA, Harvard, Vancouver, ISO, and other styles
43

Shchinnikov, Ilya, Stanislav Tokarev, and Dmitry Surinsky. "Justification of the need to systematize pest control at AIC objects." АгроЭкоИнфо 1 S (October 15, 2022): 7. http://dx.doi.org/10.51419/20212s1107.

Full text
Abstract:
The analysis of modern ensuring the safety of agricultural crops and the preservation of crops from pests is carried out. The use of systems to ensure the protection of agro-industrial complex from synanthropic pests is substantiated. The advantages of the electrophysical method of control and the need to create an effective system for protecting agricultural crops from pests are substantiated. The essence of each direction of the electrophysical method is revealed. An integrated protection of agricultural crops based on an information-software complex for monitoring and evaluating the effecti
APA, Harvard, Vancouver, ISO, and other styles
44

Novruz Aliyeva, Yegana, and Laman Qadir Ibrahimova. "ANALYSIS OF THE PROBLEM OF PROTECTION OF INFORMATION IN THE CORPORATE INFORMATION SYSTEMS SEGMENT." Elmi Əsərlər, no. 1 (June 10, 2024): 77–82. http://dx.doi.org/10.61413/uxhj2154.

Full text
Abstract:
Successful use of modern information technologies is impossible without effective management of not only the computer network, but also the IT process. Improvement of information security management is possible both by using new methods for solving the management problem and by increasing the quality of the management effect by reducing the duration of these control periods. Therefore, a reasonable approach to increasing the effectiveness of information security measures can be the development of intelligent decision-making tools related to information management issues. Although active resear
APA, Harvard, Vancouver, ISO, and other styles
45

Gumenyuk, Ludmila. "CYBER INSURANCE: MODERN REQUIREMENTS." Economics & Education 6, no. 4 (2021): 33–36. http://dx.doi.org/10.30525/2500-946x/2021-4-5.

Full text
Abstract:
The purpose of this article is to outline current trends in the development of cyber insurance in the world and in Ukraine. Modern information wars and a significant increase in cyber-attacks over the past three years (2019-2021) indicate a low level of protection of critical infrastructure, data storage and personal information, so the development of cyber insurance as an effective protection tool is a priority today. Methodology. The article used methods of data analysis and synthesis to prepare the information base for defining the concept of cyber insurance; comparison of domestic and fore
APA, Harvard, Vancouver, ISO, and other styles
46

Prokopova, M. V. "Flooding Hazard Assessment of Built-Up Lands Using Modern Geographic Information Systems." Modern Trends in Construction, Urban and Territorial Planning 1, no. 2 (2022): 23–32. http://dx.doi.org/10.23947/2949-1835-2022-1-2-23-32.

Full text
Abstract:
Introduction. The construction and operation of buildings and structures on the banks of rivers and other water reservoirs with rapidly changing water level are associated with the hazard of territories flooding and underflooding, which can lead to major material damage and even endanger the life and health of people. It’s very important to make a reliable forecast of floodable and underfloodable zones and to develop possible engineering protection measures for such territories, as well as evacuation or rescue plans for cases of emergency. In this article by the example of 2 allocated for cons
APA, Harvard, Vancouver, ISO, and other styles
47

Alieksieiev, Artem, and Igor Svatovskiy. "ANALYSIS OF COMMON AUDIO STEGANOGRAPHY METHODS." Grail of Science, no. 34 (December 16, 2023): 117–18. http://dx.doi.org/10.36074/grail-of-science.08.12.2023.24.

Full text
Abstract:
In the face of modern challenges, the protection of vital interests of a person and a citizen is fundamental to the issue of national security. In this context, the ability to freely transfer confidential information is very important. One of the possible solutions is the use of steganographic methods. Digital audio steganography has advantages over other types of steganography. This makes it important to analyze the most common audio steganography methods.
APA, Harvard, Vancouver, ISO, and other styles
48

Prokopovych-Tkachenko, Dmytro, Liudmyla Rybalchenko, and Yaroslav Derkach. "Steganographic Methods in Information Security." Central Ukrainian Scientific Bulletin. Technical Sciences 2, no. 11(42) (2025): 79–86. https://doi.org/10.32515/2664-262x.2025.11(42).2.79-86.

Full text
Abstract:
The article discusses the possibilities of using deep autoencoders in the field of information hiding (steganography). It is shown that the combination of steganography methods with deep learning makes it possible to improve system reliability and increase the bandwidth of the hidden data transmission channel. The purpose of this paper is to analyse modern approaches to the use of deep autoencoders in steganography, to determine their main advantages and disadvantages, and to formulate promising directions for further research. The development of deep learning opens up broad prospects for enha
APA, Harvard, Vancouver, ISO, and other styles
49

Yi, Ding. "Research on the Relevant Methods and Technologies of Digital Watermarking." Highlights in Science, Engineering and Technology 47 (May 11, 2023): 217–23. http://dx.doi.org/10.54097/hset.v47i.8210.

Full text
Abstract:
With the diversification of recording equipment and the rapid development of Internet technology, it is easier to steal and spread movies, which makes the copyright protection of movies face great challenges. The technology of tracing the origin of movie piracy in cinemas provides strong technical support for film digital copyright protection by extracting the watermark information hidden in the film carrier, tracking and locating the playback server where the piracy flows out and the theater where the piracy occurs. In addition, the emergence of digital technology has led to the rapid spread
APA, Harvard, Vancouver, ISO, and other styles
50

Ostrovskikh, Zh V., O. M. Khokhlova, and A. K. Rozhkova. "Information security in the national security system of modern Russia during the pandemic COVID-19." Siberian Law Herald 2022.2 (2022): 105–15. http://dx.doi.org/10.26516/2071-8136.2022.2.105.

Full text
Abstract:
The authors study information security as one of the important components of the national security system of modern Russia, and which, as shown by the COVID-19 pandemic, has a high social significance and a priority need to protect information resources at various levels, including national. The analysis of the intensively developing legislation in the field of information technology and information protection, and the heterogeneous practice of its application, made it possible to identify discrepancies, and, as a result, to identify the need for unification of approaches. The priority directi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!