Application of international standards in information security activities of Russian commercial organizations

Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

Подобные документы

  • The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.

    статья, добавлен 26.06.2018

  • Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.

    диссертация, добавлен 01.09.2018

  • A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.

    статья, добавлен 15.04.2014

  • The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.

    статья, добавлен 28.02.2016

  • Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.

    статья, добавлен 28.09.2016

  • The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.

    статья, добавлен 27.09.2016

  • Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.

    реферат, добавлен 24.12.2013

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций, добавлен 08.03.2014

  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья, добавлен 09.01.2024

  • Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.

    статья, добавлен 29.07.2017

  • Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.

    книга, добавлен 08.03.2014

  • New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.

    материалы конференции, добавлен 08.03.2014

  • The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.

    статья, добавлен 22.09.2022

  • Basic protocols and Internet search them. Search Tools in WWW. Thematic catalogs. Characteristics of automatic indexes. World Wide Web Worm. Review of Russian search engines. Features search through directories and search engines in a pure form.

    реферат, добавлен 30.06.2014

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    статья, добавлен 06.05.2018

  • Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.

    презентация, добавлен 21.06.2015

  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций, добавлен 20.10.2016

  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья, добавлен 22.12.2016

  • In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.

    статья, добавлен 21.03.2024

  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие, добавлен 08.03.2014

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья, добавлен 13.08.2023

  • Assessment of the impact of digitalization on society, economy and business. Ensuring the protection of individual data and commercial secrets. The use of artificial intelligence in everyday life. Integration of digital tools into the management system.

    статья, добавлен 13.11.2023

  • Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

    статья, добавлен 04.09.2022

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.