Results 21 to 30 of about 35,083 (135)

Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each ...
V. A. Sizov   +2 more
doaj   +1 more source

CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS

open access: yesРадіоелектронні і комп'ютерні системи, 2020
The subject of study in the article is the platforms used to organize the educational process in the context of distance learning. The following platforms are selected: learning content management systems (open source systems and individual development),
Артем Григорович Тецький   +1 more
doaj   +1 more source

METHODOLOGY FOR INVESTIGATING THE PROBABILITY-TIME CHARACTERISTICS OF NETWORK ATTACKS IN THE SIMULATION MODELLING SOFTWARE ENVIRONMENT

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2018
. Objectives An analysis of open access literature sources and normative documents on the problem of information protection in automated systems was carried out.
Irina G. Drovnikova   +3 more
doaj   +1 more source

Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework

open access: yesJournal La Multiapp
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions.
Kamil Ryanto, Vitri Tundjungsari
semanticscholar   +1 more source

Methodological approach to quantitative assessment of the security of open operating systems AS of the Internal Affairs Bodies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the ...
A. I. Yangirov   +3 more
doaj   +1 more source

Influence of the human-machine-environment system on reliability automated systems IAB of the Russian Federation

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The article examines the influence of the “man-machine-environment” system on the reliability of automated systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +4 more
doaj   +1 more source

Enhanced Security Framework for Internet Banking Services

open access: yesJournal of Information Technology and Computing, 2021
This research, Enhanced Security Framework for Internet Banking Services is aimed at developing a suitable framework, a system based on consolidating two algorithms, improved RSA with LSB steganography capable of providing secure transmission of customer
O. Sarjiyus, B. Y. Baha, E. J. Garba
semanticscholar   +1 more source

Designing a Future Study Model: Examining Bank Employees’ Attitudes Towards Job Security in the Era of Blockchain Technology (Horizon 2031) [PDF]

open access: yesJournal of Asset Management and Financing
Blockchain technology has emerged as a crucial factor impacting the banking sector. This study aimed to design and elucidate a future research model that explored bank employees’ attitudes towards job security in the context of blockchain technology by ...
Saeid Ghazi Nezhad   +2 more
doaj   +1 more source

Transposition Cipher as a Solution for a Better Bank Verification Number (BVN) Security in Communication Channel

open access: yesInternational Journal of Innovative Science and Research Technology
BVN stands for Bank Verification Number, which is a biometric identification used in Nigeria to verify identity of bank customers, a transposition cipher is an encryption method that recognizes data sent via a communication channel in such a way, no one ...
U. M, H. A., A. I, Muhammad Shehu, Z
semanticscholar   +1 more source

Access control model in ICS

open access: yesБезопасность информационных технологий
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS).
Muhannad O. Zaid Alkilani   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy