Partisans go cyber: the hacker ethic and partisans’ legacy

Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.

Подобные документы

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья, добавлен 23.02.2016

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья, добавлен 27.10.2020

  • Definition of the concept "сybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.

    презентация, добавлен 24.01.2017

  • Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.

    статья, добавлен 23.02.2016

  • A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - а semantic cyber-physical system approach.

    статья, добавлен 23.02.2016

  • The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.

    статья, добавлен 03.02.2021

  • The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.

    статья, добавлен 28.05.2023

  • The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.

    статья, добавлен 03.12.2020

  • Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.

    курсовая работа, добавлен 11.02.2017

  • The basic tendencies of development of mobile marketing in Ukraine are considered. The development of Internet marketing. The advantages of hybrid mobile applications, the essence of their use, as one of the modern means of communication for business.

    статья, добавлен 10.10.2018

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья, добавлен 20.03.2024

  • Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.

    статья, добавлен 27.05.2021

  • Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.

    статья, добавлен 29.04.2019

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа, добавлен 02.09.2016

  • Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

    статья, добавлен 17.12.2022

  • Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.

    статья, добавлен 01.12.2017

  • Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.

    презентация, добавлен 21.06.2015

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.

    статья, добавлен 21.03.2024

  • Forecasting the development of the statistical reporting network. Improving the accuracy of predicting the development of the Internet of things in the context of the dynamics of primary information flows. Deterministic models of mathematical programming.

    статья, добавлен 07.09.2022

  • Features green orientation of modern CAD systems on the example of Altera Quartus II and built-in utilities "PowerPlay Power Analyzer Tool". Optimization and evaluation of FPGA projects on energy consumption based on the activity signals of the scheme.

    статья, добавлен 23.02.2016

  • Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.

    курс лекций, добавлен 08.03.2014

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    статья, добавлен 22.12.2016

  • Estimation of input flow intensities measured by the number of devices connected to the CPS (accumulated, living things plus unliving things) as a function of accumulated product flows. Statistics on the number of non-living devices connected to the CPS.

    статья, добавлен 07.09.2022

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.