Analysis of information security threats related to the use of metadata documents
The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
Подобные документы
Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Theoretical aspects of the "Manuskryptorium" that enables easy access to informational resources, including written archival documents. Highlight and analyzed some issues on technical capabilities of users as well as aspects of a single electronic.
статья, добавлен 27.07.2016- 103. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
статья, добавлен 26.01.2021Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.
статья, добавлен 11.07.2022In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.
статья, добавлен 18.08.2018Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
лекция, добавлен 28.12.2013Recommendations on the application of the system of advance passenger information and registration of passenger data (API/PNR). Use as a tool to counter cross-border threats. The role of biometrics in the connection between the document and its owner.
статья, добавлен 20.07.2024- 112. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
статья, добавлен 30.04.2018The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.
статья, добавлен 28.12.2017The most common cyber threats in the educational environment. Analysis of the peculiarities of cyberattacks on educational institutions in times of war. Justification of the important factor in securing the educational space from cyber threats.
статья, добавлен 04.12.2023Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
статья, добавлен 21.01.2022The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
книга, добавлен 08.03.2014Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
практическая работа, добавлен 29.11.2014Analytical modeling of typical documents about education, for integration in a computerized learning environment KoHaC. Scheme of the analytical modeling training documentation. The components of the analytical apparatus of a computerized training system.
статья, добавлен 14.09.2016The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022