?
Технология обеспечения информационной безопасности крупных музейных и выставочных комплексов
Научно-технические ведомости Санкт-Петербургского государственного политехнического университета. Информатика. Телекоммуникации. Управление. 2015. № 6 (234). С. 14-24.
Bogdanov A., Малыгин И. Г.
The paper substantiates the role and importance of information security in the spiritual life of the society, analyses the specifics of the security of large museum complexes, as information systems. We have described the composition and the structure of an integrated information system for ensuring the safety of a museum. Models for operating and managing an information security system have been considered.
Priority areas:
business informatics
Language:
Russian
Silakov D., Programming and Computer Software 2012 Vol. 38 No. 5 P. 276-280
The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development ...
Added: September 25, 2015
A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices
Ometov A., Zeman K., Masek P. et al., IEEE Access 2021 No. 9 P. 54625-54638
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices’ security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. This paper analyzes the security mechanisms ...
Added: August 26, 2021
Elin V., Информационное право 2017 № 4 (54) С. 28-33
Purpose: the article analyzes the organizational and legal mechanisms of the European Union in the sphere of ensuring information security in terms of cloud computing technology, revealed a number of aspects of regulation of informational relations in connection with the growing practice of cloud services and identified key problems of legal regulation of this sphere ...
Added: February 1, 2018
М. : Проспект, 2021
В сборнике представлены конкурсные работы 19-й научно- практической конференции, посвященной вопросам текущего и перспективного использования современных ИКТ для решения задач управления крупными и целевыми проектами, построения информационных систем для органов государственной власти, местного самоуправления и рассмотрения процессов цифровой трансформации социально-экономического развития общества. ...
Added: August 30, 2021
Zharova A. K., Elin V., Вестник Академии права и управления 2017 № 1 (64) С. 69-78
Despite the fact that the Institution of the Protection of Confidential Information in the Russian Federation has existed since the middle of the 20th century, since the time when in the Constitution of the USSR was established a rule on the right of citizens to confidential information, the issue of the correlation of personal data ...
Added: January 17, 2018
Elin V., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 111-120
According to the analysis of policy documents of the Russian Federation and foreign countries in the field of information security is concluded that the existing approach in Russia does not fully meet the requirements of modern society. The necessity of building sub-sector information law, the crucial questions in the field of legal protection of information ...
Added: March 18, 2015
Zharova A. K., Труды Института государства и права Российской академии наук 2016 № 3(55) С. 76-88
The article explores the concept of information security in the information space, the reasons for possible violations of individual rights, society and the state in this area. Main attention is paid to violations of the rights of the individual, society and the rights of the state. Such offenses are partly related, for example, to the ...
Added: November 25, 2016
СПб. : Издательство Политехнического университета, 2014
Сборник научных трудов Всероссийской научно-практической конференции с международным участием «Комплексная защита объектов информатизации и измерительные технологии», Санкт-Петербургский государственный политехнический университет, 16-18 июня 2014 года ...
Added: June 30, 2017
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Baranov P., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 152-159
The article's task is to analyze risk management methods both presented in written sources such as technical literature, standards, recommendations and experienced on practice. The analysis' goal is to propose a classification, highlight strong and weak 2 spots concerning practical appliance for information security (IS) purposes. The second goal is to propose ways of implementation ...
Added: March 17, 2015
Baranov A., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 9-16
The basic principle of this article is structured representation of computer technologies. Application of this principle shows that any independent part of information computing system could be represented as a set of connection hardware units and different computers with specialized roles in the system. The items of the set, in turn, are operated through an ...
Added: November 4, 2016
Baranov P., СПб. : Санкт-Петербургский государственный политехнический университет, 2014
Сборник составлен по материалам 23-ей научно-технической конференции "Методы и технические средства обеспечения безопасности информации", Санкт-Петербург 30 июня - 03 июля 2014 года, посвященный решению проблем кибербезопасности, относящихся к чрезвычайно актуальной, динамически развивающейся отрасли обеспечения безопасности обработки и передачи информации в системах критического назначения, к которым принято относить системы управления финансами, связью, транспортом и ядерной энергетики. ...
Added: March 17, 2015
Elin V., М. : Московский институт государственного управления и права, 2017
Added: January 31, 2017
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2017 № 2 С. 39-45
The paper considers certain probability-theoretic models of packet mode-transferred information distortions. Attention is drawn mainly to distortions, including possible interferences influencing multiple transfer cycles. Distortions are modeled by a consequential impacts that are defined by dependent random variables. K-dimensioned values of CRC, respectively allow representation as a sum of k-dimensioned independent random variables.
In some cases ...
Added: September 11, 2017
Suvorov A., Матанцева М. О., Plotnikova E. G., Безопасность в техносфере 2018 Т. 7 № 5 С. 35-42
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among ...
Added: October 2, 2019
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Isaev E., Dumsky D., Samodurov V. et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Elin V., Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
Opredelenov V. V., Бузина Ю. В., Угольников М. В. et al., М. : [б.и.], 2017
Методические рекомендации созданы с целью систематизации теоретических знаний, практических навыков и нормативно-правового регулирования в области создания и ведения (эксплуатации) сайтов учреждений культуры музейного типа. ...
Added: August 10, 2017
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
Baranov P., Baranov A., Проблемы информационной безопасности. Компьютерные системы 2017 № 4
The article analyzes possibilities of errors in telecommunication protocols using packet data transmission. Probabilistic model of a prolonged-action additive interference is represented as a sequence of executions of independent interference blocks with definite length. The paper shows that in certain conditions concerning a polynomial of degree k, used for creation of CRC code, with block ...
Added: February 26, 2018
Baranov A., Информационная безопасность 2016 № 4 С. 58-60
Если десять лет назад о том, что такое электронная подпись, знали десятки, максимум сотни челове по всей России, то сегодня с ней знакомы миллионы. За эти годы мы накопили достаточно опыта, чтобы решить все технические вопросы. Решена даже проблемы визуализации в разных операционных системах, которая вначале представлялась катастрофичной. И вот, когда все технические аспекты кажутся ...
Added: January 17, 2017