SWOT-анализ с позиций информационной безопасности
Гудков Ю.И., Шепитько Г.Е., Прокофьев М. Н.
Some provisions of SWOT analysis and assessment of its productivity in business are criticized.
М. : МФЮА, 2014
Один из подходов к построению информационной инфраструктуры организации на базе гибридной облачной среды
, , , Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
, , et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
, , et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
, , , Безопасность в техносфере 2018 Т. 7 № 5 С. 35-42
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among ...
Added: October 2, 2019
, , et al., Automatic Control and Computer Sciences 2017 No. 51 (8) P. 992-999
A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for ...
Added: April 23, 2019
ОБЕСПЕЧЕНИЕ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ПРАВ ЛИЧНОСТИ, ОБЩЕСТВА И ГОСУДАРСТВА ПРИ ИСПОЛЬЗОВАНИИ ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫХ ТЕХНОЛОГИЙ
, Труды Института государства и права Российской академии наук 2016 № 3(55) С. 76-88
The article explores the concept of information security in the information space, the reasons for possible violations of individual rights, society and the state in this area. Main attention is paid to violations of the rights of the individual, society and the rights of the state. Such offenses are partly related, for example, to the ...
Added: November 25, 2016
, Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
, , , Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
, , Безопасность информационных технологий 2014 № 1 С. 65-66
В работе предлагается построение модели данных об управлении проектом на уровне его структурных моделей с использованием ER-нотации, применяемой при проектировании баз данных. Построенная модель дополняется логическими и функциональными связями, соответствующими различным методам управления проектами и может рассматриваться как семантическая сеть. ...
Added: February 16, 2016
, Международное правосудие 2022 № 4(44) С. 51-72
Information privacy is the protection of personal data and the foundation of privacy on the whole. Information privacy and information security are two concepts that constantly interact with each other. The relationship of the two notions is dialectical and constitutes a dilemma that does not have an explicit legal solution, but requires a search of ...
Added: September 22, 2022
Experience in the Formation of Competencies in the Field of Information Technology Security in the Educational Programs of MIEM NRU HSE
, , , , in : ITM Web of Conferences (International Forum “IT-Technologies for Engineering Education: New Trends and Implementing Experience” (ITEE-2019). Vol. 35.: EDP Sciences, 2020. Ch. 01005. P. 1-9.
The paper discusses the development and testing of a model of competencies in information security which ensures the effective interaction of society, business, the labor market and education in the digital economy. The proposed model is based on the requirements of employers for the training of a modern engineer. In accordance with the developed competency ...
Added: December 18, 2020
, , В кн. : Транспорт России: проблемы и перспективы – 2015. Материалы Юбилейной Международной научно-практической конференции 24-25 ноября 2015 г. Т. 2.: СПб. : Институт проблем транспорта РАН, 2015. С. 21-25.
Роль и место информационной безопасности в системе безопасности транспортной системы России ...
Added: July 13, 2017
, , Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models. In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
, Информационное право 2022 № 1 (71) С. 31-34
Purpose. The article will analyze the Russian legislation about the operation of self-driving cars, as well as the prospects for its development. The main theoretical and practical difficulties of legal regulation of the operation of self-driving cars on public roads will be identified. Also the ways to overcome them will be proposed. Attention will also ...
Added: May 20, 2022
, , , Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
, М. : Московский институт государственного управления и права, 2017
Added: January 31, 2017
An algorithm for embedding information in digital images based on discrete wavelet transform and learning automata
, , Multimedia Tools and Applications 2021 Vol. 80 No. 7 P. 11217-11238
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the ...
Added: December 24, 2020
, , Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
, Закупки и право 2023 № 1 С. 42-49
Network addresses (IP addresses) and autonomous system numbers (ASN) are considered as Internet resources. Using the systemic research method, the author analyzes the legal framework governing legal relations in the sphere of their turnover as objects of procurement to meet state and municipal needs. Recommendations are formulated for improving the legislation on public procurement, taking into account the ...
Added: July 19, 2023
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
, , Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
, , Проблемы информационной безопасности. Компьютерные системы 2019 № 4 С. 0-0
The paper considers error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers. Comparison of asymptotic representations of transmitted binary signal and for large transmitted block’s volume is presented in ...
Added: December 29, 2019
, , Проблемы информационной безопасности. Компьютерные системы 2016 № 1 С. 70-75
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. It is shown in research  that CRC value could be represented as a sum of special-way formed random vectors over k-dimension vector space GFk(2) over a two-element 0,1-field (GF(2)).If the message or errors are modeled using independent random ...
Added: December 5, 2015
, , Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP. As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Сравнительный анализ программного обеспечения для анализа рисков информационной безопасности в соответствии с ГОСТ Р ИСО/МЭК 27005-10
, , , Информационные технологии и вычислительные системы 2019 Т. 69 № 2 С. 75-83
Information security risks analysis methods are considered in accordance with GOST R ISO / IEC 27005-10. A comparative analysis of Ra2 software, Vsrisk software and MSAT software are carried out based on the selected criteria. ...
Added: July 3, 2019