To see the other types of publications on this topic, follow the link: Security Components.

Journal articles on the topic 'Security Components'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Components.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.

Full text
Abstract:
The modern development of the world economy is increasingly defined by its reliance on vast and complex information flows. In today's interconnected global marketplace, the seamless exchange of data underpins almost every aspect of economic activity, from financial transactions and supply chain management to customer interactions and business intelligence. As a result, the importance of addressing issues related to safeguarding data flows and ensuring the confidentiality, integrity, and availability of information during its processing and transmission is growing at an unprecedented pace. Info
APA, Harvard, Vancouver, ISO, and other styles
2

Metodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.

Full text
Abstract:
A new element has been added to the components of corporate security - migration security. The proposed new author's terms for our scientific community - "migration security" will facilitate future research in the field of the impact of migration processes on the security of regions and business organizations.
APA, Harvard, Vancouver, ISO, and other styles
3

Wood, Charles Cresson, and Howard M. Zeidler. "Security modules: Potent information security system components." Computers & Security 5, no. 2 (1986): 114–21. http://dx.doi.org/10.1016/0167-4048(86)90133-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baranovskyi, О. І., and M. O. Moroz. "INVESTMENT COMPONENTS OF FINANCIAL SECURITY." Financial and credit activity: problems of theory and practice 1, no. 22 (2017): 46–59. http://dx.doi.org/10.18371/fcaptp.v1i22.109926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Filippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.

Full text
Abstract:
The article considers the existing methods of risk analysis in the design of physical protection systems. It is noted that in the expert method vulnerability assessed integrally, that does not guarantee the principle of equal strength, vulnerability elements of physical protection are considered without regard to the vulnerability of the object itself, and parameters of the model of the intruder, not taking into account such factors as catalysts and inhibitors of the threat. Noted that to improve the adequacy of physical protection required the formation of a databank of security threats and v
APA, Harvard, Vancouver, ISO, and other styles
6

Qun Zhong and N. Edwards. "Security control for COTS components." Computer 31, no. 6 (1998): 67–73. http://dx.doi.org/10.1109/2.683010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ganna, Smokvina, and Yankovska Olga. "Personnel security of the industrial enterprise: essence, components and measures of threats minimization." Economic journal Odessa polytechnic university 1, no. 7 (2019): 38–45. https://doi.org/10.5281/zenodo.3402729.

Full text
Abstract:
The article defines the essence of personnel security, examines approaches to its definition, examines and suggests key components of personnel security, their subspecies (labour safety, technological safety, administrative security, aesthetic safety, anti-conflict security, career safety), defines the component "anti-conflict security". The personnel security threats, their classification, on the basis of which have been proposed a set of measures to minimize threats to personnel security of industrial enterprises and organizational directions to strengthen the personnel component o
APA, Harvard, Vancouver, ISO, and other styles
8

Прядко, И. П., and С. А. Мудрак. "Food security and its main components." Экономика и предпринимательство, no. 10(123) (November 15, 2020): 1097–105. http://dx.doi.org/10.34925/eip.2020.123.10.218.

Full text
Abstract:
Целью настоящей работы выступает анализ состояния российского агрокомплекса в начале XXI в. - в период экономических санкций и падения промышленного производства, этими санкциями вызванного. Чтобы определить вектор развития российского Агропрома, а вместе с ним и социального развития российского села, авторы обращаются к истории русского села в XIX-XX вв., к фактам непростых отношений между традиционным крестьянским миром и индустриальной цивилизацией, промышленным городом. Для достижения целей исследования авторами используется метод ретроспективного анализа источников, анализируются данные с
APA, Harvard, Vancouver, ISO, and other styles
9

Havas, Karyn, and Mo Salman. "Food security: its components and challenges." International Journal of Food Safety, Nutrition and Public Health 4, no. 1 (2011): 4. http://dx.doi.org/10.1504/ijfsnph.2011.042571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meyer, Helen. "Security gap uncovered in ActiveX components." Computers & Security 15, no. 6 (1996): 516. http://dx.doi.org/10.1016/s0167-4048(97)83130-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Feiten, Linus, Matthias Sauer, Tobias Schubert, Victor Tomashevich, Ilia Polian, and Bernd Becker. "Formal Vulnerability Analysis of Security Components." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, no. 8 (2015): 1358–69. http://dx.doi.org/10.1109/tcad.2015.2448687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Doroudi, Fariborz, and Zeinab Jamshidi. "Measuring Information Security Components in Accessing and Using Digital Libraries." Journal of Information Processing and Management 37, no. 1 (2021): 117–33. https://doi.org/10.5281/zenodo.14035000.

Full text
Abstract:
Information security is one of the effective factors in protecting and utilizing digital libraries, which can contribute to improving the status of these libraries. This research examines the accessibility of information security in the digital libraries of Qom County. Digital libraries are defined as those that organize digital documents based on their mission and with the help of specialists, providing information services to their members. The research method is analytical survey-based, and the study population includes both public and academic digital libraries in Qom County (comprising fi
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Zhijian, Zihan Shen, Hongfei Wang, and Qianjia Zou. "Ethereum Security Based on Blockchain Framework and its Algorithms and Components." Highlights in Science, Engineering and Technology 60 (July 25, 2023): 128–37. http://dx.doi.org/10.54097/hset.v60i.10348.

Full text
Abstract:
With the increasing amount and trading volume, account security has become an issue that people have to consider. The security of Ethereum is discussed in four different aspects. This paper reviews the application of cryptography in Ethereum, including the importance of relevant hash algorithms and digital signature techniques for securing data. The basic structure of the Merkle Tree and the role of its modified data structure, performed in the security mechanism of Ethereum are also analyzed. This paper also analyzes the related Merkle Proof algorithm. Additionally, the definition and working
APA, Harvard, Vancouver, ISO, and other styles
14

Lebedeva, Marina M. "Humanitarian and Social Components of International Security." RUDN Journal of Political Science 24, no. 2 (2022): 187–99. http://dx.doi.org/10.22363/2313-1438-2022-24-2-187-199.

Full text
Abstract:
Since the second half of the XX century, the importance of social and humanitarian resources has been increasing. This process intensified in the XXI century, which is reflected in the sphere of international security. The study analyzes the mechanisms through which the social and humanitarian resources affect international security problems, solving or escalating them. If the Copenhagen School began to include the social and humanitarian phenomena in the security sphere, this research focuses on how social and humanitarian resources are used in the security sphere (including in the military f
APA, Harvard, Vancouver, ISO, and other styles
15

Fasae, Felicia Bosede Kehinde. "Human and Technology Components in Data/Information Security." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 93–107. http://dx.doi.org/10.37745/ejcsit.2013/vol12n293107.

Full text
Abstract:
This paper reviewed the relationship between human and technology components in data/information security, looking into how humans and technological components affect the security of data/information. The paper considered information resources, importance of data/information, data/information security, human factors in data/information security, technological components in data/information security, importance of human and technology components in data/information security, and risk assessment. The paper concluded that effective management of humans and technology is indispensable in order to
APA, Harvard, Vancouver, ISO, and other styles
16

Neustroiev, Y. "COMPONENTS OF ECONOMIC SECURITY OF THE STATE." Investytsiyi: praktyka ta dosvid, no. 4 (March 2, 2021): 56. http://dx.doi.org/10.32702/2306-6814.2021.4.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rybalchenko, O. M. "PSYCHOLOGICAL THREATS ARE COMPONENTS OF PERSONAL SECURITY." Habitus, no. 32 (2021): 104–9. http://dx.doi.org/10.32843/2663-5208.2021.32.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Conrad, Jennifer, Gautam Kaul, and M. Nimalendran. "Components of short-horizon individual security returns." Journal of Financial Economics 29, no. 2 (1991): 365–84. http://dx.doi.org/10.1016/0304-405x(91)90007-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Khachatryan, Robert, and Frida Hakobyan. "Educational Security as a Component of National Security Protection." Public Administration, no. 5 (October 3, 2017): 99–106. https://doi.org/10.5281/zenodo.5546240.

Full text
Abstract:
The article touches upon fundamental definitions, concepts and components of educational security. It also discusses internal and external threats to educational security as well as the importance of educational security from the perspective of the RA national security protection. The protection of educational security is significant for the country's stable economic development, national security protection, national competitiveness, country's intellectual, religious, scientific and professional capital and workforce, literacy and functional literacy of the population.
APA, Harvard, Vancouver, ISO, and other styles
20

Микола Володмирович Кордон. "ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY." Intermarum history policy culture, no. 5 (January 1, 2018): 332–40. http://dx.doi.org/10.35433/history.111824.

Full text
Abstract:
Ukraine's energy security is part of its national security. Nuclear power plays the largest role in Ukraine among the four components of the electric power industry, which accounts for almost 60% of all electricity generated. Ukraine belongs to the countries that advocate further development of nuclear energy. An important task for Ukraine is to increase the share of renewable energy. The sun and the wind must work for the economy. Energy saving remains a problem for Ukraine. Ukraine has enormous potential in energy efficiency, so it (energy efficiency) needs to be strengthened.There are huge
APA, Harvard, Vancouver, ISO, and other styles
21

Eisenstein, Marie A., and April K. Clark. "Political Tolerance, Psychological Security, and Religion: Disaggregating the Mediating Influence of Psychological Security." Politics and Religion 7, no. 2 (2014): 287–317. http://dx.doi.org/10.1017/s1755048314000054.

Full text
Abstract:
AbstractThis research focuses on the variable “psychological security” as a mediating influence for religion, and its influence on political tolerance. While the composite variable of "psychological security" (typically measured by dogmatism, self-esteem, and trust) has been part of many studies of political tolerance, insufficient attention has been paid to the influence of these separate indicators. This is problematic because certain religious beliefs, practices, and/or affiliations may contribute differentially to the particular components of psychological security that are linked with gre
APA, Harvard, Vancouver, ISO, and other styles
22

Fahmida, Rahman, and Arozullah Mohammed. "REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 01–21. https://doi.org/10.5281/zenodo.4400051.

Full text
Abstract:
This paper deals with protecting all-optical networks (AON) from security attacks at the physical level. It firstly presents an overall high level protocol for establishment, management and on-the-fly restoration of optimal secure lightpaths established by applying constraint-based open shortest path first (OSPF) source routing using proposed security databases of components. Secondly it presents a protocol for using fiber diversity between adjacent nodes to protect against attacks on fiber links. Thirdly it presents analytical models of propagation of security attacks on optical amplifiers an
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Mansour, Abdul Majeed. "Security in Islam - its Components, Importance, and Threats -." Islamic Sciences Journal 12, no. 8 (2023): 260–88. http://dx.doi.org/10.25130/jis.21.12.8.12.

Full text
Abstract:

 
 
 
 ABSTRACT
 
 The importance of this topic for society is to take into account its components, and warn of its threats, and its importance to the security man who contributes primarily to the establishment and application of security, and being a role model for society, and may be a valid building block in its realization. This research was authored and called (Security in Islam - Its Importance, Constituents and Threats).That is the goal of all societies and countries to have security and safety, and to live in peace, and the religion of Islam confirms the
APA, Harvard, Vancouver, ISO, and other styles
24

Mohammed, Jassem Al-Sarraf. "Cyber Security and its role in achieving the future visions of the State of Kuwait." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 60–70. https://doi.org/10.5281/zenodo.7923877.

Full text
Abstract:
<strong>Abstract:</strong> This field research deals with the role of cyber security in achieving the future visions of the State of Kuwait. Specifically, this research attempts to answer the main question of the research, which: What is the role of cyber security in achieving the future visions of the State of Kuwait? In this field study, both approaches are used: The qualitative approach and the quantitative approach, and the questionnaire tool was used, and one of the most important results was the existence of a correlation between the state&rsquo;s visions and the basic components of cybe
APA, Harvard, Vancouver, ISO, and other styles
25

Svilicic, Boris, Igor Rudan, Vlado Frančić, and Mateo Doričić. "Shipboard ECDIS Cyber Security." Pomorstvo 33, no. 2 (2019): 176–80. http://dx.doi.org/10.31217/p.33.2.7.

Full text
Abstract:
The Electronic Chart Display and Information System (ECDIS) plays a central role in safe navigation of ships. The ECDIS is basically a software package running on a general operating system that could be comprised of the third-party components. This paper presents an analysis of cyber security weaknesses of a shipboard ECDIS raising from the ECDIS software’s third-party components. The analysis is based on the cyber security testing of the shipboard ECDIS using an industry vulnerability scanner. Detected vulnerabilities are analysed regarding the protection measures implemented on the ship. Th
APA, Harvard, Vancouver, ISO, and other styles
26

Cherchyk, Artur Olehovych. "ESSENCE AND MECHANISM COMPONENTS OF FOREST ENTERPRISES ECOLOGICAL AND ECONOMIC SECURITY PROVISION." SCIENTIFIC BULLETIN OF POLISSIA 2, no. 3(11) (2017): 108–12. http://dx.doi.org/10.25140/2410-9576-2017-2-3(11)-108-112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Iryna, Zaichko. "ASSESSMENT OF THE ROLE OF THE BUDGET COMPONENT IN FINANCIAL SECURITY." ISSN 2353-8406 Knowledge, Education, Law, Management 2019 № 3/4 (27/28) (December 15, 2019): 205–13. https://doi.org/10.5281/zenodo.3833701.

Full text
Abstract:
Abstract: The presentation of opinions and statements of financial security in the modern national and world economy is considered. It has been established that the term &laquo;financial security&raquo; has been used relatively recently and its development is conditioned by threats in the financial system of Ukraine. The analysis of the formulation&nbsp;of financial security from the point of view of ensuring equilibrium, resource-functional approach, stability of the financial system, protection of financial interests, a component of economic security in the context of regulatory and legal re
APA, Harvard, Vancouver, ISO, and other styles
28

Hrybinenko, Olha. "Conceptual models of economic security as a polystructural system." Economics: time realities 2, no. 48 (2020): 22–29. https://doi.org/10.5281/zenodo.3976834.

Full text
Abstract:
The article substantiates the economic security phenomenon as a polystructural system and defines the basic properties and isolation of modern economic security models. It is proved that an important condition for choosing a model of economic security is the type of socio-economic system that develops in a society, depending on which several conceptual models of economic security are distinguished. Based on the systematic approach and the study of the hierarchical structure of the economic security system, its main features are defined: integrity and divisibility; emergence; synergy between th
APA, Harvard, Vancouver, ISO, and other styles
29

Hordiienko, Serhii. "Components of security of Ukrainian statehood by sphere of its existence." Legal Ukraine, no. 9 (October 30, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-9(213)-1.

Full text
Abstract:
The paper identifies the components of Ukraine’s security in the spheres of its life: politics, economics, the military, etc. In the modern world, the driving force of the economy is qualitatively new knowledge, so the structure of the economy as innovative can be reduced to the following formula: general economy = economics of science + scientific and technological economics + economics of material production. Economics, in our opinion, can be schematically represented as follows: economics of science (information =&gt; information resources =&gt; innovation =&gt; qualitatively new knowledge
APA, Harvard, Vancouver, ISO, and other styles
30

MYRTA, Rexhina. "National and Civil Security in Kosovo – Premises, Components, Challenges, and Risks." Jus & Justicia 18, no. 1 (2024): 39–64. http://dx.doi.org/10.58944/kgny9883.

Full text
Abstract:
This paper explores the complex landscape of national and civil security in Kosovo, focusing on the premises, main components, challenges, and risks associated with establishing a secure and stable environment in Europe’s youngest nation. Kosovo’s journey towards statehood and security is hindered by a myriad of factors including political instability, economic underdevelopment, and the lingering effects of ethnic tensions. The research delves into the intricate dynamics between national security measures and human security needs, emphasizing the impact of political instability on the broader
APA, Harvard, Vancouver, ISO, and other styles
31

Rastogi, Rahul, and Rossouw von Solms. "IT Security for SCADA." International Journal of Cyber Warfare and Terrorism 5, no. 3 (2015): 19–27. http://dx.doi.org/10.4018/ijcwt.2015070102.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the underlying physical process. In response to this critical issue, various governments across the world have recognized the issue of SCADA security and have initiated the creation of a regulatory framework for mandating SCADA security in their respectiv
APA, Harvard, Vancouver, ISO, and other styles
32

KHALIDI, AHMAD S. "Security in a final Middle East settlement: some components of Palestinian national security." International Affairs 71, no. 1 (1995): 1–18. http://dx.doi.org/10.2307/2624007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Choi, Sung Ja, Sang Soo Choi, and Gang Soo Lee. "A Study on Utilization of CC Security Function Components in IT Security Products." KIPS Transactions:PartC 12C, no. 2 (2005): 207–16. http://dx.doi.org/10.3745/kipstc.2005.12c.2.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ma, Yuanyuan, Mu Chen, and Tao Zhang. "Virtualization Construction of Security Components of Edge IoT Agent Based on Security Requirements." Journal of Physics: Conference Series 1617 (August 2020): 012076. http://dx.doi.org/10.1088/1742-6596/1617/1/012076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

DOVHAN, O. "Modern information structures as components of information security." INFORMATION AND LAW, no. 2(14) (August 19, 2015): 111–20. http://dx.doi.org/10.37750/2616-6798.2015.2(14).272705.

Full text
Abstract:
The article considers the modern information structures as components of information security. The structural organization of information security management system must be adequate to the general system of public administration – must be multilevel and territorially distributed with coordinated action of its components.
APA, Harvard, Vancouver, ISO, and other styles
36

Varenyk, Victoria M., Iryna M. Miro, and Zoia S. Pestovska. "THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS." Academy Review 1, no. 62 (2025): 149–63. https://doi.org/10.32342/3041-2137-2025-1-62-11.

Full text
Abstract:
A higher education institution is both a social institution and a commercial enterprise in the educational services market. Ensuring the economic security of private higher education institutions involves identifying risks and threats to this security (especially as they cannot rely on state support), which justifies the purpose and objectives of the paper. To ensure economic security, it is necessary to develop a certain concept, management mechanism, model, or set of measures. However, it is essential first to identify, measure, and assess the relevant risks, dangers, and threats. Threats to
APA, Harvard, Vancouver, ISO, and other styles
37

Salamat, Adel. "The Role of Judicial Components in Economic Security." Management 5, no. 1 (2022): 1. http://dx.doi.org/10.31058/j.mana.2022.51001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hrybinenko, O. "INTERNATIONAL ECONOMIC SECURITY: DETERMINANTS AND COMPONENTS OF DEVELOPMENT." Ekonomika ta derzhava, no. 12 (December 30, 2019): 121. http://dx.doi.org/10.32702/2306-6806.2019.12.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Pantoja, Javier Mascorro, Ricardo Luna Carlos, Ilda Díaz Ramos, et al. "CREATION OF DIGITAL SECURITY COMPONENTS FROM ELECTROENCEPHALOGIC SIGNALS." Journal of Engineering Research 2, no. 14 (2022): 2–6. http://dx.doi.org/10.22533/at.ed.3172142206071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Quester, George H. "Components of a Course on National Security Policy." Teaching Political Science 14, no. 3 (1987): 110–19. http://dx.doi.org/10.1080/00922013.1987.9942618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ronad, Amith. "INDUSTRIAL IOT NETWORKS: ARCHITECTURE, COMPONENTS, AND SECURITY CONSIDERATIONS." INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY 16, no. 1 (2025): 2163–82. https://doi.org/10.34218/ijcet_16_01_155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Scherb, Igor. "KEY MARKERS OF COMPONENTS OF ECONOMIC SECURITY OF THE STATE." Regional’ni aspekti rozvitku produktivnih sil Ukraїni, no. 25 (2020): 56–65. http://dx.doi.org/10.35774/rarrpsu2020.25.056.

Full text
Abstract:
Introduction. The article substantiates and proves the objective necessity of forming a system of vectors for assessing economic security, taking into account the transformational challenges of our time; certain trends in economic security and their key markers, which reflect modern transformation processes, namely: economic, technological, educational trends, socio-political, demographic and environmental. The proposed trends in economic security correspond to modern economic realities and develop the provisions of the concept of national economic security, taking into account new external ec
APA, Harvard, Vancouver, ISO, and other styles
43

TITENKO, Z.M. "The mechanism of managing the financial security of the enterprise." Market Relations Development in Ukraine №11(258)2022 119 (February 9, 2023): 85–90. https://doi.org/10.5281/zenodo.7624520.

Full text
Abstract:
in approaches to the study of financial security, which is explained by changes both on a global and local scale. Financial security is an important component of an enterprise&#39;s economic security, along with such components as intellectual, personnel, technical&ndash;technological, informational, political&ndash;legal, environmental, and security. In modern conditions, Ukrainian enterprises face the problem of ensuring financial and economic security through the introduction of an appropriate management mechanism and effective application of its components. The financial security of enterp
APA, Harvard, Vancouver, ISO, and other styles
44

Cibulnyk, N. Yu. "Informational and legal characteristics of the main components of the state security sector." Uzhhorod National University Herald. Series: Law 1, no. 80 (2024): 607–12. http://dx.doi.org/10.24144/2307-3322.2023.80.1.93.

Full text
Abstract:
The article is devoted to the study of the informational and legal characteristics of the main components of the national security sector of the state. It is noted that the category “national security” reflects the qualitative state of the regulation of social relations in the state and emphasizes the fact that the security of the state consists in ensuring national identification. It has been established that the provision of state security is structured through the differentiation of national security by sector-specific (includes: military security, public security, state security, cyber sec
APA, Harvard, Vancouver, ISO, and other styles
45

BAK, Nataliia. "FINANCIAL SECURITY OF TERRITORIAL COMMUNITIES IN UKRAINE: CONTENT, COMPONENTS, THREATS." WORLD OF FINANCE, no. 1(58) (2019): 98–110. http://dx.doi.org/10.35774/sf2019.01.098.

Full text
Abstract:
Introduction. The process of fiscal decentralization contributes to the transformation of territorial communities and local authorities into full-fledged members of the system of financial inter-connections. Territorial communities have individual financial interests. The need to protect them is at the heart of creating a safe environment for the functioning of territorial communities. However, financial security of territorial communities as separate economic units is not given enough attention to Ukraine. Instead, a more general notion is explored which isfinancial security of the regions. P
APA, Harvard, Vancouver, ISO, and other styles
46

Suraev, Egor Petrovich, Victoriia Vyacheslavovna Egorova, and Alexey Sergeevich Panov. "Platform for Automatic Fuzzing of OS Components." Proceedings of the Institute for System Programming of the RAS 36, no. 3 (2024): 167–88. http://dx.doi.org/10.15514/ispras-2024-36(3)-12.

Full text
Abstract:
Automation of security analysis processes plays an important role in software development, because it allows vulnerabilities to be detected and fixed at an early stage. This article presents the development outcomes of an automated fuzz-testing platform, as well as its integration with a platform for processing and storing the results of various security analysis tools. The developed platform integrates security analysis tools into a single testing system embedded in the continuous integration process. The proposed platform not only simplifies and speeds up the testing and analysis processes,
APA, Harvard, Vancouver, ISO, and other styles
47

Usman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris, and Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS." International Journal of Software Engineering and Computer Systems 9, no. 2 (2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.

Full text
Abstract:
The Internet of Things (IoT) describes the connection of bodily devices as "things" that can communicate with other systems and devices through the Internet and exchange statistics (data or information), facilitating the exchange of data with other systems and devices. These devices have sensors, software, and various components designed to exchange data seamlessly within the IoT network. Securing and protecting the data transmitted over the Internet from unauthorized access is imperative to ensuring the integrity and confidentiality of the information. IoT Smart health monitoring systems, int
APA, Harvard, Vancouver, ISO, and other styles
48

BĂLĂCEANU, Ioan. "THE OPERATIONAL COMPONENTS OF THE DEFENSE, NATIONAL SECURITY, AND PUBLIC ORDER INTEGRATED SYSTEM." Review of the Air Force Academy 14, no. 1 (2016): 71–76. http://dx.doi.org/10.19062/1842-9238.2016.14.1.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

SUKHANOVA, Alla V. "MAIN COMPONENTS AND PRINCIPLES OF ECONOMIC SECURITY OF AGRARIAN ENTERPRISES." Ukrainian Journal of Applied Economics, no. 2 (2019): 97–103. http://dx.doi.org/10.36887/2415-8453-2019-2-11.

Full text
Abstract:
Introduction. The functioning of agricultural enterprises in a competitive and natural environment causes the existence of specific threats, overcoming which necessitates the creation of an economic security mechanism. The Purpose. The purpose of the article is to identify problems of agricultural enterprises functioning, to protect producers from the effects of destructive influences, to ensure stable and maximally effective development of enterprises in the future. Results. It is established that the structural composition of the economic security system is formed by intra-production and non
APA, Harvard, Vancouver, ISO, and other styles
50

Khalina, Veronika, and Ilona Bilanchuk. "COMPONENTS OF FINANCIAL AND ECONOMIC SECURITY OF SUBJECTS OF GOVERNMENT." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 31(59) (2023): 42–47. http://dx.doi.org/10.25264/2311-5149-2023-31(59)-42-47.

Full text
Abstract:
The article defines the components of financial and economic security of economic entities. It was noted that the formation of the system of financial and economic security of economic entities depends on many factors of the external and internal environment, the main among which are: war, unfavourable macro-economic conditions, underdevelopment of markets, information danger, unfair competition, reduction of investment attractiveness, outflow of qualified personnel, etc. It is understood that the system of financial and economic security of the entity consists of a combination of interrelated
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!