Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
Подобные документы
Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020Импортирование, экспортирование и связывание внешних файлов в Microsoft Access. Программные формы и отчеты. Доступ программы к сети. Работа с таблицами и макросами в Access. Программирование баз данных с помощью модуля Visual Basic for Applications.
реферат, добавлен 23.11.2014The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014Особенности реляционной системы управления базами данных (СУБД) Microsoft Access, входящей в состав пакета Microsoft Office. Использование языка программирования Visual Basic for Applications, общего для всех приложений Office, при разработке программ.
презентация, добавлен 07.12.2016Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
статья, добавлен 22.07.2022Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
статья, добавлен 08.06.2024Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
статья, добавлен 27.05.2021The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
реферат, добавлен 20.03.2016Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
статья, добавлен 20.03.2024Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.
статья, добавлен 05.04.2019Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016Таблицы Microsoft Access. Формы документов Visual Basic. Передвигание данных в текстовых полях к первой записи. Вычисление средних значений данных за четырехлетние периоды. Содержание программы сортировки. Структура файлов, использованных в проекте.
курсовая работа, добавлен 22.08.2011Сущностные характеристики Access — системы управления базами данных. Основные особенности создания приложений без программирования с использованием макросов Access. Сущность форм и отчетов WYSIWYG. Аналіз задач, которые можно решать с помощью Access.
доклад, добавлен 28.10.2011Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.
статья, добавлен 29.10.2020