To see the other types of publications on this topic, follow the link: Security current.

Journal articles on the topic 'Security current'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security current.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Full text
Abstract:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If
APA, Harvard, Vancouver, ISO, and other styles
2

Kuzoma, Vitalii. "GLOBAL FOOD SECURITY: SECURITY FACTORS AND CURRENT TRENDS." Energy saving. Power engineering. Energy audit., no. 6(196) (August 25, 2024): 38–49. http://dx.doi.org/10.20998/2313-8890.2024.06.04.

Full text
Abstract:
The issue of ensuring global food security remains one of the leading and decisive issues for all countries in the world, without exception. The implementation of the goals of sustainable development, which have become a strategic priority for society, has separated the problems of overcoming hunger and ensuring the health of the population as key and the main priority for the further existence of humanity. The article examines the essence of the category "food security" from various scientific and methodological positions and conducts a comprehensive review of the prominent trends that accomp
APA, Harvard, Vancouver, ISO, and other styles
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Full text
Abstract:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current st
APA, Harvard, Vancouver, ISO, and other styles
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO, and other styles
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
APA, Harvard, Vancouver, ISO, and other styles
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
APA, Harvard, Vancouver, ISO, and other styles
8

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kudabayeva, A. Zh. "Current trends in food security." BULLETIN of the L.N. Gumilyov Eurasian National University.Political Science. Regional Studies. Oriental Studies. Turkology Series. 143, no. 2 (2023): 36–44. http://dx.doi.org/10.32523/2616-6887/2023-143-2-36-44.

Full text
Abstract:
The problem of food security has always been relevant and was studied by academics from the economic, environmental, social, and gender approaches, however rising prices, and in some cases food shortages, have triggered a new interest in this area of research. This problem is being addressed at the level of the state and international organizations. However, the approach to the task of these actors is different. If international organizations approach the problem of the food security from the standpoint of the international norm “the right to food”, relying on the postulates of neoliberalism,
APA, Harvard, Vancouver, ISO, and other styles
10

P., K. Paul, and S. Aithal P. "Cloud Security: An Overview and Current Trend." International Journal of Applied Engineering and Management Letters (IJAEML) 3, no. 2 (2019): 6. https://doi.org/10.5281/zenodo.3514577.

Full text
Abstract:
Cloud security is also called as cloud computing security. It is the set of policies, technologies,  applications, and control utilized for virtual  infrastructure which  includes hardware, software,  and application. The field is closely related to database security, web security, network security,  etc. In other words, cloud security is very close to computer security, IT security or information  security. Day  by  day  the  IT  infrastructure  becomes  a  common  need  of  every  individual  and&n
APA, Harvard, Vancouver, ISO, and other styles
11

Tagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protectio
APA, Harvard, Vancouver, ISO, and other styles
13

Martin Otieno. "An extensive survey of smart agriculture technologies: Current security posture." World Journal of Advanced Research and Reviews 18, no. 3 (2023): 1207–31. http://dx.doi.org/10.30574/wjarr.2023.18.3.1241.

Full text
Abstract:
Smart agriculture, enabled by advanced technologies such as internet of things, artificial intelligence and data analytics, offers immense potential for optimizing farming practices and increasing agricultural productivity. However, as the adoption of smart agriculture systems continues to grow, it brings forth various security issues that need to be addressed to protect farming operations, data integrity, and privacy. This paper provides an overview of the security issues in smart agriculture, including vulnerabilities in internet of things devices, lack of standardized security protocols, li
APA, Harvard, Vancouver, ISO, and other styles
14

Martin, Otieno. "An extensive survey of smart agriculture technologies: Current security posture." World Journal of Advanced Research and Reviews 18, no. 3 (2023): 1207–31. https://doi.org/10.5281/zenodo.8435117.

Full text
Abstract:
Smart agriculture, enabled by advanced technologies such as internet of things, artificial intelligence and data analytics, offers immense potential for optimizing farming practices and increasing agricultural productivity. However, as the adoption of smart agriculture systems continues to grow, it brings forth various security issues that need to be addressed to protect farming operations, data integrity, and privacy. This paper provides an overview of the security issues in smart agriculture, including vulnerabilities in internet of things devices, lack of standardized security protocols, li
APA, Harvard, Vancouver, ISO, and other styles
15

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Full text
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud
APA, Harvard, Vancouver, ISO, and other styles
16

Horovyi, S. S., and V. Yu Priamitsyn. "CURRENT ISSUES OF LEGAL SECURITY OF CYBER SECURITY OF UKRAINE." Juridical scientific and electronic journal, no. 6 (2021): 120–22. http://dx.doi.org/10.32782/2524-0374/2021-6/32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

GABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mukhtarov, Farrukh Mukhammadovich. "ANALYSIS OF CURRENT INFORMATION SECURITY POLICY." Research Focus 1, no. 1 (2022): 33–39. https://doi.org/10.5281/zenodo.7063575.

Full text
Abstract:
this article analyzes scientific literature related to the development of information security policy, provision of perimeter protection, as well as norms, standards and laws of the Republic of Uzbekistan in the field of information security. At the same time, the work of independent laboratories in the field of information security and statistical data for the past years were reviewed.
APA, Harvard, Vancouver, ISO, and other styles
19

Yassir, Ammar, and Alaa A. "Current Computer Network Security Issues/Threats." International Journal of Computer Applications 155, no. 1 (2016): 1–5. http://dx.doi.org/10.5120/ijca2016912255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

STEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.

Full text
Abstract:
The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's ca
APA, Harvard, Vancouver, ISO, and other styles
21

Barnes, Richard. "Current Legal Developments UN Security Council." International Journal of Marine and Coastal Law 26, no. 2 (2011): 343–53. http://dx.doi.org/10.1163/157180811x560539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Gu, Jiantao, Jinghong Fu, and Tao Wu. "Analysis of Current Wireless Network Security." International Journal of Education and Management Engineering 2, no. 10 (2012): 34–38. http://dx.doi.org/10.5815/ijeme.2012.10.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Plastun, Vladimir N. "Central Asia: The Current Security Issues." Oriental Studies 19, no. 4 (2020): 124–28. http://dx.doi.org/10.25205/1818-7919-2020-19-4-124-128.

Full text
Abstract:
The article discusses the security problems of the Central Asian region, closely related to the ongoing war in Afghanistan. The author sets out his understanding of the term “state security”, which includes the problems of the armed forces and security agencies, primarily responsible for the fight against terrorism and separatism. However, there is also an understanding of the current state of the economy, interethnic relations, the preservation of natural resources, and the balance of interests in international relations. In particular, an assessment is given of the mutual relations between t
APA, Harvard, Vancouver, ISO, and other styles
24

Tod, J. J. R. "UK perspectives of current security arrangements." RUSI Journal 139, no. 1 (1994): 31–35. http://dx.doi.org/10.1080/03071849408445782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

VASILOIU, Raluca-Elena. "Cyber Security – Current and Future Trends." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 20–32. http://dx.doi.org/10.19107/ijisc.2024.01.02.

Full text
Abstract:
During recent years, many researchers and professionals have revealed the endangerment of wireless communication technologies and systems from various cyberattacks, these attacks cause detriment and harm not only to private enterprises but to the government organizations as well. The attackers endeavor new techniques to challenge the security frameworks, use powerful tools and tricks to break any sized keys, security of private and sensitive data is in the stale mark. There are many advancements being developed to mitigate these attacks. In this conjunction, this paper gives a complete account
APA, Harvard, Vancouver, ISO, and other styles
26

A.N. KOSTENKO. "Russia's National Security and Current Challenges." Military Thought 33, no. 002-003 (2024): 1–10. http://dx.doi.org/10.21557/mth.98437687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Guoxing, Ji. "Current Security Issues in Southeast Asia." Asian Survey 26, no. 9 (1986): 973–90. http://dx.doi.org/10.1525/as.1986.26.9.01p0414t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Poole, Vernon, and Dean Adams. "Current developments in open systems security." Computers & Security 14, no. 5 (1995): 420. http://dx.doi.org/10.1016/0167-4048(95)97125-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zharovska, Iryna. "National and information security (current update)." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 7, no. 27 (2020): 56–61. http://dx.doi.org/10.23939/law2020.27.056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lubenets, Serhii, Igor Harchenko, and Yevhen Pavlenko. "Current problems of international information security." 17, no. 17 (June 30, 2023): 42–48. http://dx.doi.org/10.26565/2310-9513-2023-17-04.

Full text
Abstract:
The problems and areas of ensuring effective international information security are considered, which are based on the analysis of the current state of global cybercrime, the existing main directions of global cyberattacks and the development of possible methods and means of countering them, with the use of current research and reporting materials of specialized international companies specializing in the problems of international information security security and the development of appropriate comprehensive tools for its provision. The subject of research in the article is the issue of ensuri
APA, Harvard, Vancouver, ISO, and other styles
31

Sokolovska, O. "GLOBAL NUCLEAR SECURITY: CURRENT POLICY EMPHASIS." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(57) (May 31, 2023): 128–34. http://dx.doi.org/10.20535/2308-5053.2023.1(57).280813.

Full text
Abstract:
The article presents an analysis of the understanding of global nuclear security in terms of political accents. The relevance is explained by the processes that are currently taking place all over the world, taking into account the military operations in Ukraine. In addition, the global nuclear order is changing, the climate is changing, your oil price volatility, and the increasing problem of energy security. This speaks of the relevance and importance of turning to the study of issues of the future use of nuclear energy. The nuclear future requires significant efforts to strengthen internati
APA, Harvard, Vancouver, ISO, and other styles
32

Karmanov, M. V. "Current problems of measuring migration security." News of the Kabardin-Balkar Scientific Center of RAS 5, no. 115 (2023): 116–24. http://dx.doi.org/10.35330/1991-6639-2023-5-115-116-124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ydyrys, S. S., A. Duisenbekuly, and G. A. Pazilov. "Current aspects of ensuring food security." Problems of AgriMarket, no. 3 (September 30, 2023): 24–33. http://dx.doi.org/10.46666/2023-3.2708-9991.02.

Full text
Abstract:
Food security is one of the key components of the country’s economic stability and food supply. A scientific approach to considering this issue requires the search and implementation of effective forms and mechanisms of state regulation and support of the agro-industrial complex and agricultural producers in order to saturate the domestic food market. The goal is to analyze the current situation and develop measures to strengthen the food security of Kazakhstan. Methods – analysis, synthesis, establishment of comparative advantage, forecasting, gener- alization, study of scientific works of fo
APA, Harvard, Vancouver, ISO, and other styles
34

Vilks, Andrejs, Aldona Kipane, Inga Kudeikina, Karina Palkova, and Janis Grasis. "Criminological Aspects of Current Cyber Security." Law, State and Telecommunications Review 14, no. 2 (2022): 94–108. http://dx.doi.org/10.26512/lstr.v14i2.41411.

Full text
Abstract:
[Purpose] To analyze the criminological features of the sensitivity of security in the cyber space on the basis of theoretical and empirical bases. [Methodology] In order to evaluate the criminological aspects of the phenomenon under study, theoretical guidelines, special literature, opinions of national and foreign specialists, research papers and periodicals are analyzed. The following scientific research methods have been used in the development of the study: content analysis, analytical, inductive and deductive approaches, as well as systematic analysis of documents, generalization and for
APA, Harvard, Vancouver, ISO, and other styles
35

O'RINOV, NODIRBEK TOXIRJONOVICH, JAMOLIDIN KOMOLDINOVICH ABDURXMANOV, and MUSLIMBEK ULUG'BEK O'G'LI OLIMOV. "Security levels of current biometric identification." Euro Afro Studies International Journal, (EASIJ.COM), 3, no. 6 (2021): 103–18. https://doi.org/10.5281/zenodo.5048324.

Full text
Abstract:
The problem of minimizing the possibility of obtaining unauthorized access to information is investigated. The concept of the authentication process and its types are considered. Described are static and dynamic biometric authentication methods based on the use of biometric characteristics such as fingerprint, iris, retina, hand geometry, face geometry, face thermogram, voice and handwriting. The advantages of dynamic methods of biometric authentication are revealed. Based on the results of the analysis of these methods, it was proposed to use facial expressions as a biometric characteristic.
APA, Harvard, Vancouver, ISO, and other styles
36

Rašek, Antonín. "Current State of Security in Europe." Czech Journal of International Relations 33, no. 1 (2024): 5–13. http://dx.doi.org/10.32422/cjir.1443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mohammed, Mustafa Khan. "Studying The Effectiveness of Current Cybersecurity Measures." European Journal of Advances in Engineering and Technology 7, no. 9 (2020): 94–99. https://doi.org/10.5281/zenodo.13950900.

Full text
Abstract:
The defense-in-depth approach is a fundamental approach that organizations have widely adopted due to the nature of sophisticated cyber threats used by cybercriminals to compromise data or damage IT systems. The current cyber threat landscape is an overgrowing field that requires multiple techniques and tactics to counteract them. The rise of cyberattacks has forced organizations to comply with one universal non-negotiable thing, which is cyber security, to ensure confidentiality, integrity, and availability of data and IT systems. Organizations employ various cyber security measures to ensure
APA, Harvard, Vancouver, ISO, and other styles
38

Avdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Stanislav Vasilyevich Rozenko, Evgeny Aleksandrovich Kiselev, Igor Vyacheslavovich Kuleshov, and Aleksey Vital'yevich Morozov. "Current Directions of Legal Ensuring National Security." Cuestiones Políticas 39, no. 69 (2021): 373–85. http://dx.doi.org/10.46398/cuestpol.3969.23.

Full text
Abstract:
The article reveals the problematic issues for ensuring financial security in the context of globalization in global financial systems. The modern stage of development of state financial systems is characterized by difficulties in ensuring national financial security. Despite the urgency of this problem, the international community is focusing on ensuring economic security during the formation of universal and regional legal instruments, leaving out of sight issues of legal and practice-oriented guidance in financial security. The article examines the main directions of implementation of state
APA, Harvard, Vancouver, ISO, and other styles
39

Mutorovna, Nabiyeva Nilufar. "JMEISSN: 2751-1707VOLUME03 ISSUE111FOOD SAFETY AND ITS CURRENT ISSUES." Journal of Management and Economics 3, no. 11 (2023): 1–7. http://dx.doi.org/10.55640/jme-03-11-01.

Full text
Abstract:
in the article the activities of the food industry and is dedicated to ensure food security discuss further improvement of this system. Brief information on further optimization of the existing security mechanism of the food industry are given. Food industry food manufacturer directory of the network modernization and support is one of the main tasks carried out in the republic of.
APA, Harvard, Vancouver, ISO, and other styles
40

Shavkatjonov, Mardon Zokirjon o'g'li Sholdarov Dilshod Azimiddin o'g'li. "PERSONAL FINANCIAL SECURITY: CURRENT PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 3 (2023): 286–88. https://doi.org/10.5281/zenodo.7751835.

Full text
Abstract:
The relevance of the topic lies in the fact that in modern conditions of the implementation of the innovative economy in recent years, the role of the formation of a financial security system at all levels has sharply increased, whether it is macroeconomic security, the security of enterprises in various fields and industries, or the financial security of an individual. It is considered one of the main components of the concept of personal security, that is, the protection of a person from danger factors at the level of their personal interests and needs, which has many varieties.
APA, Harvard, Vancouver, ISO, and other styles
41

Edwards, Elizabeth. "Pricing lending in the current market: securing the capital — security value sensitivities." Briefings in Real Estate Finance 2, no. 2 (2002): 129–38. http://dx.doi.org/10.1002/bref.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Pligin, Vladimir Nikolaevich. "Current issues of administrative responsibility: security aspects." Вопросы безопасности, no. 4 (April 2024): 1–12. https://doi.org/10.25136/2409-7543.2024.4.72636.

Full text
Abstract:
The object of the study is the administrative responsibility, considered from the point of view of ensuring security. The author identifies the levels of scientific study of administrative responsibility in the context of security, which include: the administrative responsibility for violations of the requirements of certain types of security; the administrative responsibility in the field of security, its individual types; the administrative responsibility in the structure of the mechanism of legal influence, as one of the elements of the regulatory mechanism; the administrative responsibilit
APA, Harvard, Vancouver, ISO, and other styles
43

Dauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.

Full text
Abstract:
Information security is a crucial aspect of modern digital infrastructure. This study explores the fundamentalprinciples of information security, its importance, key threats, and best practices for securing digital assets. It provides athorough analysis of current security challenges, presenting statistical data to illustrate trends in cybersecurity. The studyconcludes with recommendations for enhancing security measures.
APA, Harvard, Vancouver, ISO, and other styles
44

Tripathi, Anshu, and Umesh Kumar Singh. "Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape." International Journal of Computer Applications 51, no. 17 (2012): 41–47. http://dx.doi.org/10.5120/8137-1882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Pataridze-Vyshynska, Marina. "Current status of agricultural enterprise financial security." Herald of Ternopil National Economic University, no. 4(94) (December 3, 2019): 29–41. http://dx.doi.org/10.35774/visnyk2019.04.029.

Full text
Abstract:
Introduction. The agrarian sector is an important strategic branch of the national economy that ensures food security and food independence of our country. The presence of risks and threats pose a risk to the entity. In this context, the relative importance of security should be emphasized, since the possibility of threats and their suddenness can hardly be ruled out if the subject seeks dynamic development, but can minimize their impact by planning and developing a security strategy. The study is aimed at assessing the financial security of Ukrainian agricultural enterprises, outlining threat
APA, Harvard, Vancouver, ISO, and other styles
46

Lyon, Andrew B., and John L. Stell. "Analysis of Current Social Security Reform Proposals." National Tax Journal 53, no. 3, Part 1 (2000): 473–514. http://dx.doi.org/10.17310/ntj.2000.3.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Sharma, Avinash. "Current Status of Food Security in India." Indian Journal of Pure & Applied Biosciences 8, no. 1 (2020): 293–302. http://dx.doi.org/10.18782/2582-2845.7980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bondarchuk, Yulyia. "European energy security: current issues and chalenges." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 256–65. http://dx.doi.org/10.31861/mediaforum.2018.6.256-265.

Full text
Abstract:
The article highlights the current state of energy security of the European Union. The strategic approaches, as well as the directions of EU policy in the area of counteraction to the challenges of the European energy security, are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
49

Banovic, Bozidar. "Organized crime as a current security threat." Medjunarodni problemi 68, no. 2-3 (2016): 172–92. http://dx.doi.org/10.2298/medjp1603172b.

Full text
Abstract:
Scientific and professional community, and political subjects, both at national and at the international level have a unique position that organized crime is now one of the most dangerous security threats. However, such consent does not exist in terms of conceptual determination, identification, dimensions and of choice of methods to counter organized crime. The first part of this article describes the main trends in the conceptual definition of organized crime, social and political context of the use of this term and the subjects who have contributed to it becoming one of the main concepts of
APA, Harvard, Vancouver, ISO, and other styles
50

Filippova, Anastasia. "Current security issues in the information society." SHS Web of Conferences 109 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110901014.

Full text
Abstract:
That scientific research highlights specific items of modernization in the field of public society information security. Taking into account professional and public orientation, government support is aimed at promotion of human recourse, provision of information support. Currently human mind is one the most valuable item. In this regard, jurists are responsible for explanation of political, economic and legal points. Moreover, it is rather important to reveal an experienced specialist in it. Among the new challenges and threats, the problem of information security is the main one. Information
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!