The role of social networks in information warfare

Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

Подобные документы

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.

    статья, добавлен 13.02.2016

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    презентация, добавлен 10.06.2016

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

  • Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

    статья, добавлен 13.02.2016

  • Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.

    статья, добавлен 11.07.2022

  • Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.

    статья, добавлен 27.05.2021

  • Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.

    статья, добавлен 23.06.2016

  • Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.

    статья, добавлен 14.01.2017

  • A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

    лекция, добавлен 23.05.2016

  • Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.

    статья, добавлен 05.04.2019

  • Exploring the state of foreign experience in the use of modern web technologies at medical libraries and the current state of the information service in Ukrainian medical libraries using Internet technologies. Role of mobile technologies in libraries.

    статья, добавлен 03.02.2018

  • Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

    статья, добавлен 25.12.2016

  • Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.

    книга, добавлен 08.03.2014

  • Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.

    статья, добавлен 18.09.2020

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    реферат, добавлен 05.01.2014

  • Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.

    реферат, добавлен 24.03.2015

  • The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.

    статья, добавлен 07.12.2016

  • The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.

    статья, добавлен 30.04.2018

  • Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.

    статья, добавлен 01.02.2024

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга, добавлен 18.09.2012

  • Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.

    статья, добавлен 06.05.2018

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа, добавлен 17.03.2016

  • Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.

    статья, добавлен 28.12.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.