Results 211 to 220 of about 1,014,505 (247)
Some of the next articles are maybe not open access.
METHODOLOGY OF INFORMATION PROTECTION
Herald of Khmelnytskyi National University. Economic sciences, 2020As you know, the larger the business, the more difficult it becomes to control. In the beginning, its owner or director can keep everything under control, and with its development it becomes difficult for one person to organize all the processes. What aspects should be paid attention to, what past should be excluded, and what is new should be added to ...
A. MEISH, O. MATVIYCHUK
openaire +1 more source
WORLD INFORMATION WARS. PROTECTION OF INFORMATION SECURITY
Science & World, 2022This article reveals the concept and essence of information security and information wars, as well as their main features.
Roza Dimova +2 more
openaire +1 more source
CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION
Science & World, 2022The article discusses the methods of cryptographic protection of information. Methods of cryptographic protection of information are special methods of encryption, encoding or other transformation of information that make its contents inaccessible without presenting the cryptogram key and reverse transformation.
Irina Gorodinskaya, Irina Zolotareva
openaire +1 more source
Protection of Valuable Information in Information Technologies
Automatic Control and Computer Sciences, 2018This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
A. A. Grusho +3 more
openaire +1 more source
Protecting Privacy of Information
Journal of Information Systems Management, 1986One of the greatest challenges facing today's automated business is the protection of data, one often-ignored aspect of which is privacy of information. Because data exists in many forms on many types of media, managers must be familiar with the threats to privacy and must implement security controls that are adequate against all types of risk.
openaire +1 more source
2016
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
Information Protection: Organization, Roles, and Separation of Duties
2000The corporate auditing department should be responsible for ensuring compliance with the information protection and security policies, standards, procedures, and guidelines. They should ensure that the organizational business units are operating in a manner consistent with policies and standards, and ensure any audit plan includes a compliance review ...
openaire +1 more source
Protecting ownership of proprietary information
Computers & Security, 1989This article presents an effective approach to the use and protection of intellectual property (a catch-all term for patents, trademarks, copyrights and trade secrets) in a manner that will prevent most losses. It will also provide direction for preventing the use of proprietary information by others who may do so in a manner that may be contrary to ...
Rolf Moulton, Robert P. Bigelow
openaire +1 more source
Information security of information protection activities
INFORMATION TECHNOLOGIES AND MANAGEMENT IN HIGHER EDUCATION AND SCIENCES. PART 2, 2022S. О. Klimovych, О. S. Pushtaryk
openaire +1 more source

