Methods and means of information protection
Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
Подобные документы
Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
статья, добавлен 09.01.2024Analysis of the need for sensors to detect the working environment and collect the necessary information to perform specific tasks in industrial robotics. Object detection algorithm using background subtraction methods for the operation of a robotic arm.
статья, добавлен 01.02.2019The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.
статья, добавлен 29.07.2017Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
статья, добавлен 29.09.2023Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
презентация, добавлен 21.06.2015Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.
статья, добавлен 19.08.2020In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.
статья, добавлен 21.03.2024Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
статья, добавлен 04.09.2022Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.
учебное пособие, добавлен 08.03.2014Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
статья, добавлен 22.07.2022Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
статья, добавлен 25.03.2016Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
статья, добавлен 23.06.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.
статья, добавлен 13.02.2016Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.
статья, добавлен 11.07.2022The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
статья, добавлен 21.04.2020Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
статья, добавлен 08.02.2013An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014