Model of critical infrastructure safety management
The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.
Подобные документы
The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
статья, добавлен 28.02.2016Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021Анализ Virtual Desktop Infrastructure – инфраструктуры виртуальных рабочих столов, формы виртуализации настольных систем, в которой все элементы рабочего стола пользователя размещены в центре обработки данных. Описание схемы организации рабочего процесса.
доклад, добавлен 28.05.2017Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
статья, добавлен 22.02.2023Proposing of the risk management models for IT projects based on Markov chains. Analysis of tools of the buffer management concept, principles of agile methodologies, and knowledge management to address the issues connected with use of Morkovian model.
статья, добавлен 30.07.2017- 8. Trusted digital repositories in context: definitions, diagnoses, and directions for better practice
The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.
статья, добавлен 29.09.2023 A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012- 10. Express Mali
The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.
дипломная работа, добавлен 30.06.2015 Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
статья, добавлен 30.08.2022Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
книга, добавлен 08.03.2014Обзор библиотеки ITIL (Information Technology Infrastructure Library), которая является передовым опытом информационных технологий. Исследование структуры управления службой технической поддержки. Изучение взаимосвязи управления инцидентами и проблемами.
статья, добавлен 03.12.2018The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
статья, добавлен 15.09.2012The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
контрольная работа, добавлен 07.08.2017Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
статья, добавлен 30.08.2016Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.
книга, добавлен 08.03.2014Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
статья, добавлен 28.09.2016Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
статья, добавлен 27.01.2019An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
статья, добавлен 30.04.2018The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.
книга, добавлен 08.03.2014