Results 211 to 220 of about 1,014,505 (247)
Some of the next articles are maybe not open access.

METHODOLOGY OF INFORMATION PROTECTION

Herald of Khmelnytskyi National University. Economic sciences, 2020
As you know, the larger the business, the more difficult it becomes to control. In the beginning, its owner or director can keep everything under control, and with its development it becomes difficult for one person to organize all the processes. What aspects should be paid attention to, what past should be excluded, and what is new should be added to ...
A. MEISH, O. MATVIYCHUK
openaire   +1 more source

WORLD INFORMATION WARS. PROTECTION OF INFORMATION SECURITY

Science & World, 2022
This article reveals the concept and essence of information security and information wars, as well as their main features.
Roza Dimova   +2 more
openaire   +1 more source

CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION

Science & World, 2022
The article discusses the methods of cryptographic protection of information. Methods of cryptographic protection of information are special methods of encryption, encoding or other transformation of information that make its contents inaccessible without presenting the cryptogram key and reverse transformation.
Irina Gorodinskaya, Irina Zolotareva
openaire   +1 more source

Protection of Valuable Information in Information Technologies

Automatic Control and Computer Sciences, 2018
This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
A. A. Grusho   +3 more
openaire   +1 more source

Protecting Privacy of Information

Journal of Information Systems Management, 1986
One of the greatest challenges facing today's automated business is the protection of data, one often-ignored aspect of which is privacy of information. Because data exists in many forms on many types of media, managers must be familiar with the threats to privacy and must implement security controls that are adequate against all types of risk.
openaire   +1 more source

Protection of Information

2016
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire   +1 more source

Information Protection: Organization, Roles, and Separation of Duties

2000
The corporate auditing department should be responsible for ensuring compliance with the information protection and security policies, standards, procedures, and guidelines. They should ensure that the organizational business units are operating in a manner consistent with policies and standards, and ensure any audit plan includes a compliance review ...
openaire   +1 more source

Protecting ownership of proprietary information

Computers & Security, 1989
This article presents an effective approach to the use and protection of intellectual property (a catch-all term for patents, trademarks, copyrights and trade secrets) in a manner that will prevent most losses. It will also provide direction for preventing the use of proprietary information by others who may do so in a manner that may be contrary to ...
Rolf Moulton, Robert P. Bigelow
openaire   +1 more source

Information security of information protection activities

INFORMATION TECHNOLOGIES AND MANAGEMENT IN HIGHER EDUCATION AND SCIENCES. PART 2, 2022
S. О. Klimovych, О. S. Pushtaryk
openaire   +1 more source

Home - About - Disclaimer - Privacy