ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Education
Computing
Architecture and Urbanism
Administration - Business
Social Sciences
Economy
Communication
Computing
Literature
all records (70)

Languages
English
Spanish
Portuguese
French

Countries
Indonesia
Ukraine
USA
Canada
Brazil
South Africa
United Kingdom
Australia
Romania
Austria
all records (69)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
80.377  Articles
1 of 8.039 pages  |  10  records  |  more records»
Businesses operating in the Global Financial Services Industry (GFSI) know the importance of protecting information assets from ever-growing security threats and risks. This paper aims at shedding light on the relationships between four relevant contextua... see more

Based on the analysis of the interaction of the logical chain of the source of threats - threats - the implementation of threats (attacks) - vulnerabilities - objects - effects (loss) - countermeasures developed an ontological scheme for ensuring informat... see more

Typical organization and establishment procedures of open source monitoring by special units of Ukrainian Armed Forces for information threats detection and evaluation purposes are considered in this article. Analysis of existing approaches for informatio... see more

Development of modern information society stipulated to the origin of new threats to the state information security in a military sphere. Effective counteraction to the threats in a military sphere depends on prior conduction of their qualitative assessme... see more

The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the mo... see more

The object of research is the information infrastructure of Ukraine. One of the most problematic places is the lack of an assessment and monitoring system for the development of information infrastructure. It was revealed that the main drawbacks of the ex... see more

To protect informational systems against cyber threats (attacks) risks must be constantly evaluated and assessed their existence in the global information space affect the confidentiality, integrity and availability of information resources. Upon the anal... see more

The object of research is the information infrastructure of Ukraine. One of the most problematic places is the lack of an assessment and monitoring system for the development of information infrastructure. It was revealed that the main drawbacks of the ex... see more

1 of 8.039 pages  |  10  records  |  more records»