|
|
|
D. V. Smirnov,A. A. Grusho,M. I. Zabezhailo,E. E. Timonina
Pág. 64 - 71
The problem of constructing an architecture and methods of searching for insider activity signs in process-real-time conditions has been investigated. The problem is solved in the following conditions. The source of "raw" data is Big Data, from which dat...
ver más
|
|
|
|
|
|
|
V. O. Piskovski,A. A. Grusho,M. I. Zabezhailo,A. V. Nikolaev,V. V. Senchilo,E. E. Timonina
Pág. 48 - 52
The article considers the task to protect information when an adversary uses methods of collecting valuable information on indirect signs in the information environment available to attackers. It is assumed that all personal data in the considered inform...
ver más
|
|
|
|
|
|
|
A. A. Grusho,N. A. Grusho,M. I. Zabezhailo,E. E. Timonina
Pág. 61 - 66
In the paper the methods of estimation of security of the distributed information systems in the conditions of assumptions of security with usage of language of diagrams of information security are developed. The principle of prevention of damage which c...
ver más
|
|
|
|
|
|
|
A. A. Grusho,M. M. Vorobiev,A. V. Nikolaev,V. O. Piskovski,V. V. Senchilo,E. E. Timonina
Pág. 67 - 74
The problem of integration of heterogeneous information systems is relevant in connection with creation of a common information space in digital economy. In the world an experience of creation and operation of such systems is accumulated.In article the a...
ver más
|
|
|
|
|
|
|
Alexander Grusho,Alexander Zatsarinny,Elena Timonina
Pág. 46 - 50
It is considered in the article the implementation issues of one of the digital economy basic directions related to information security concerning the protection of information in distributed ledgers. Any information system has to be constructed on the ...
ver más
|
|
|
|
|
|
|
A. A. Grusho,M. I. Zabezhailo,D. V. Smirnov,E. E. Timonina
Pág. 43 - 50
Authentication data, such as password, key word, passport number, etc., authentication material, such as biometric fingerprint, faces, etc., authentication objects, such as phone, passport, token, etc., can be spotted, forged and transferred to the malef...
ver más
|
|
|
|