The most dangerous threats faced by organizations are insider attacks. Because insiders are aware of the structure of the system, handling insider attacks is the most important task in the modern world. The article is devoted to the problem of insider threats in the modern world. Questions explaining the essence of insider threats will also be considered.Наиболее опасными угрозами, с которыми сталкиваются организации, являются инсайдерские атаки. Поскольку инсайдеры осведомлены о структуре системе, обработка инсайдерских атак - самая важная задача в современном мире. Статья посвящена проблеме инсайдерских угроз в современном мире. Также будут рассмотрены вопросы объясняющие суть инсайдерских угроз
The subject of the article is one of the fundamental principles of audit activity, which, at the sam...
The article presents approaches to the definition of economic security of the enterprise - what it i...
In this paper, we look at several cybersecurity issues, as well as the importance of preserving info...
The article defines the essence of corporate security, the supply of information protection, located...
In this article, we will consider the sources of threats to an economic entity, the types of such th...
In given article it's presented an estimation of risks of information actives of the automated syste...
This article deals with the problem of information security. The article gives the definition and ty...
The article is about the approaches of providing data security in inner networks of corporations. Th...
The article deals with some aspects of information security by enhancing the effectiveness of counte...
В данной статье проведен обзор четырех основных моделей управления доступом. Рассмотрены принципы фу...
The article is devoted to the protection of market manipulation and the misuse of insider informatio...
In this article the author examines approaches to the concept of information security, identifies th...
В статті висвітлено основні підходи до розмежування понять: небезпека, загроза та ризик. Розглянуто ...
The article examines a system of measures that is in demand in modern conditions, aimed mainly at co...
The article describes common threats that come from XSS attacks and SQL injection and possible damag...
The subject of the article is one of the fundamental principles of audit activity, which, at the sam...
The article presents approaches to the definition of economic security of the enterprise - what it i...
In this paper, we look at several cybersecurity issues, as well as the importance of preserving info...
The article defines the essence of corporate security, the supply of information protection, located...
In this article, we will consider the sources of threats to an economic entity, the types of such th...
In given article it's presented an estimation of risks of information actives of the automated syste...
This article deals with the problem of information security. The article gives the definition and ty...
The article is about the approaches of providing data security in inner networks of corporations. Th...
The article deals with some aspects of information security by enhancing the effectiveness of counte...
В данной статье проведен обзор четырех основных моделей управления доступом. Рассмотрены принципы фу...
The article is devoted to the protection of market manipulation and the misuse of insider informatio...
In this article the author examines approaches to the concept of information security, identifies th...
В статті висвітлено основні підходи до розмежування понять: небезпека, загроза та ризик. Розглянуто ...
The article examines a system of measures that is in demand in modern conditions, aimed mainly at co...
The article describes common threats that come from XSS attacks and SQL injection and possible damag...
The subject of the article is one of the fundamental principles of audit activity, which, at the sam...
The article presents approaches to the definition of economic security of the enterprise - what it i...
In this paper, we look at several cybersecurity issues, as well as the importance of preserving info...