Keyword "SECURITY" found in the following publications:
FACTORS INFLUENCING TOURIST DECISION-MAKING DURING COVID-19: AN EMPIRICAL STUDY
 The results of the research conducted by the authors made it possible to identify current trends and develop clear ...
REFLECTED RISKS OF NETWORK COMMUNICATIONS (THE RUSSIAN YOUTH ONLINE SURVEY RESULTS)
The author revises the latest risks and threats associated with technologization of the information and communication sphere, and ...
HOW BLOCKCHAIN TECHNOLOGIES AFFECTED OUR LIFE
Blockchain technologies have recently begun to develop very actively in the world market. Every year this technology exceeds ...
MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. ...
IT INFRASTRUCTURE RISKS AND METHODS FOR THEIR SOLUTION
Changes in global trends in IT infrastructure in business do not stand still, and one of the developing ...
SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION
Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
DIGITAL SECURITY IN TODAY'S WORLD
For several decades, the engine of modern society has been technological progress. Its innovations, new and constantly improving means ...
NATIONAL IDENTITY AND SECURITY AS A BASIS FOR THE DEVELOPMENT OF THE TOURISM INDUSTRY
With the development of civil society, the urgency of the concept of national security is growing. Within this concept, ...
NETWORK SECURITY INCIDENTS IN THE DIGITAL ECONOMY SYSTEM
The modern period of development is closely related to the digital transformation of various industries and the implementation ...
The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have open-source code. Their mechanisms for ...
MODERN PRINCIPLES OF THE SOCIAL PROTECTION OF POPULATION
The paper summarizes the principles of the social protection of the population, viewed from different perspectives; the main principles, reflecting ...
The article considers the concept of "house" as a core element of "security perimeter" (the term by A. Leroy-Gourhan) on ...
REVIEW OF SOME DATA TRANSFER PROTOCOLS FROM THE POSITION OF INFORMATION SECURITY
The article identifies and describes the main problems in the field of recreational fishing: the The article discusses ...
ORGANIZATION OF SUPPORT OF AGRICULTURAL PRODUCTION IN MARKET CONDITIONS
The role of the agro-industrial sector of the Kyrgyz economy in ensuring the food security of the country, the ...
The subject of the article is the economic security of industrial production in the subject of the Russian Federation. ...
PREVENTING INFORMATION SECURITY INCIDENTS
Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection ...
ANALYSIS AND DEFINITION OF INFORMATION SECURITY RISKS
Any information requires an effective system of protection and is to ensure the sustainable development and functioning of ...
The article substantiates the importance of the existing level of trust in the security of financial technologies, which can ...
The most relevant and widespread type of information that almost all organizations of the Russian Federation work with ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most ...
ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals ...
IMPORTANCE OF INDUSTRIAL POLICY IN THE PROVISION OF ECONOMIC SECURITY IN THE REGION
The subject of this research is the modern and promising directions of industrial policy in the regions. The article ...
The article analyzes the state of technical provision of the agricultural industry, studies its development problems, and suggests some ...
THE USE OF MANDATORY METHODS OF ENHANCED SOFTWARE PROTECTION IN DIGITAL EDUCATION SERVICES
Many firms and corporations are concerned about the protection of the personal data of their employees or relatives. Loss ...
INFORMATION SECURITY AS A SERVICE IN THE NEW REMOTE WORLD
The year 2020 in the Russian Federation led to changes in the work of companies, government ...
Recently, there has been a significant increase in both the number of crimes related to fraudulent actions in the ...
PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine ...
ANALYSIS AND COMPARISON OF BIOMETRIC METHODS OF IDENTIFICATION OF A PERSON
Biometric methods of identity identification have been actively developing in the world market over the past decade. These ...
FINANCIAL AND ECONOMIC SECURITY OF AGRICULTURAL ENTERPRISES IN THE CONDITIONS OF DIGITIZATION
In this article, research and generalization of theoretical foundations in the field of financial and economic ...
SOCIAL SURVIVAL IN A REGIONAL ARMED CONFLICT
The article discusses the features of social survival in the context of a regional conflict. The object of analysis is ...
The research is devoted to the problem of investment information security industry. The authors identify the investments into ...
The article presents the results of the study of empirical manifestations of the position of the subject of ...
In the era of global upheavals associated with local wars, the migration crisis, the growing activity of radical parties ...
POSSIBLE THREATS AND ATTACKS ON THE USER VOICE IDENTIFICATION SYSTEM
Times change. Technologies are used that not only simplify our lives, but also help us to effectively use all ...
The article examines the phenomenon of "prompt injection" in the context of contemporary large language models (LLMs), elucidating a significant ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
RUSSIA'S POSITIONS IN THE INTERNATIONAL TRADE OF FOOD AND AGRICULTURAL PRODUCTS
The article investigates the positions of Russia in the international trade of food and agricultural products. The possible areas for ...
In the development of information technology, software and data protection on web services are of great importance. To ...
US-CHINA RELATIONS IN ECONOMIC AND SECURITY ASPECTS
This study is intent to identify and assess the economic and security importance to US and China by examining ...
THE POLICY OF IMPORT SUBSTITUTION OF RUSSIA ON THE EXAMPLE OF THE MACHINE-BUILDING INDUSTRY *
In this paper, the authors consider the problems of the import substitution policy in the Russian Federation. The authors note ...
Today, the development of a scientifically based concept of economic security management at the territorial level is facing serious difficulties. ...
Recently, there has been a significant increase in both the number of crimes related to fraudulent actions in the ...
SOCIAL SECURITY OF STUDENT YOUTH AS A SUBJECTIVE PERCEPTION OF RISKS
 The article emphasizes the relevance of studying the problems of social security in the context of the deepening socio-economic ...
PROBLEMS OF CLOUD SERVICES AND METHODS OF PROTECTION AGAINST RISKS AND THREATS
More and more people are starting to use cloud services for storing, editing and transferring data via the ...
METHODS OF REMOTE WORK AND WAYS TO PROTECT IT
The topic of remote work with the arrival of the pandemic was an unusual way of working for ...
ANALYSIS OF THE GROWTH OF CYBERATTACKS OF THE INFORMATION SECURITY MARKET OF THE RUSSIAN FEDERATION
The IT sphere is progressing without stopping, which is why information security employees have to regularly progress along ...
Today, the stock market has high financial and investment potential. This market transforms the savings of individuals and ...
DEVELOPING A METHOD FOR CREATING A RESISTANT TO AUTOMATIC RECOGNITION AND GUESSING CAPTCHA
The relevance of the problem considered in the article is due to the growing number of web resources of ...
- Advances in information and communication technologies have led to a global information society and the emergence of a new digital ...
ABOUT ENSURING SECURITY IN THE FIELD OF THE INTERNET OF THINGS
The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made ...
Ensuring the safety of children, taking into account the growing threats of a terrorist nature, is an important component ...
The article discusses some approaches to improving the efficiency of the regional management system in the direction of increasing ...
Electronic document management is the fastest and most high-quality way of transmitting information in production in modern working conditions. ...
MODELING THE STRATEGY FOR MANAGING THE FINANCIAL SECURITY OF AN ENTERPRISE
This article conducts a study and generalization of theoretical and practical foundations in the field of choosing a strategy ...
SOCIAL CHALLENGES AND EUROPEAN INTEGRATION OF THE WESTERN BALKANS
The sub-region of the Western Balkans includes Serbia, Montenegro, Bosnia and Herzegovina, Albania and Northern Macedonia. Social challenges of ...
OVERVIEW OF REMOTE ACCESS VIRUSES FOR MOBILE DEVICES
The current level of prevalence of mobile devices makes them available to everyone. Many important files are stored on ...
Currently, there are a fairly large number of different methods, the use of which allows to one degree or ...
ANALYSIS OF SYMMETRIC ENCRYPTION METHODS, PROBLEMS AND WAYS OF THEIR POSSIBLE SOLUTION
Person needs to constantly communicate, and he does this on the street with friends, acquaintances, making phone calls, ...
STRATEGIC VECTOR OF REGIONAL FOOD SECURITY
Important component of a complex of economic actions for increase of level of regional food security is design of optimum ...
The article discusses such key issues of the development of the agrarian economy of the Republic ...
FORECASTS FOR THE FORMATION OF AVAILABILITY AND AFFORDABILITY OF AGRICULTURAL PRODUCTS
The problem is raised related to the need to coordinate supply and demand in the agro-food market for ...
ANALYSIS CODE SIMILARITY AND SEARCH FOR ITS BORROWINGS
This article discusses an actual problem in the field of programming — the borrowing of code and the possibility ...