Results 1 to 10 of about 35,083 (135)
Evaluating the threat to national information security [PDF]
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development.
Hanna Yarovenko
doaj +2 more sources
Exploring the Impact of AI-Based Cyber Security Financial Sector Management
Cyber threats are attempts to secure unauthorized access to, change, or delete private information, to demand money from victims, or to disrupt business. Cybercrime includes everything from identity theft, malware threats, email and online fraud, to bank
Shailendra Mishra
doaj +2 more sources
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.Method.
I. G. Drovnikova, A. D. Popova
doaj +2 more sources
Exploring the Techniques of Information Security Certification [PDF]
If the information system is intruded or attacked by hackers, leaked personal data or serious economic loss may occur; the threats may be serious security problems.
Abel C. H. Chen
semanticscholar +1 more source
DEA-Analysis Of The Effectiveness Of The Country’s Information Security System [PDF]
The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole.
Hanna Yarovenko +2 more
doaj +1 more source
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov +3 more
doaj +1 more source
A Survey on SQL Injection Attacks Types & their Prevention Techniques
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan +2 more
doaj +1 more source
The Relationship between Information Security Awareness and the Intention to Violate Information Security with the Mediating Role of Individual Norms and Self-control [PDF]
Introduction: while the role of information in today’s world cannot be denied, and since most activities and processes depend on information, the violation of information security is a critical concern.
Hamid Reza Peikari, Babak Banazdeh
doaj +1 more source
Security Model for a Central Bank in Latin America using Blockchain
Banking institutions in Latin America are the target of increasingly sophisticated and advanced cyber-attacks and threats, which increase every year and leave substantial economic losses, due to the high level of global interconnection and digitization ...
R. Romero +5 more
semanticscholar +1 more source
IDENTIFICATION OF THREATS TO FINANCIAL INSTITUTIONS’ ECONOMIC SECURITY AS AN ELEMENT OF THE STATE FINANCIAL SECURITY REGULATION [PDF]
Government structures should start financial security regulation at the macro-level with the definition of a list of threats, which impact on participants in the financial market can destabilize their activities and lead to negative trends in the ...
Nataliia Zachosova, Nataliia Babina
doaj +1 more source

