As a result of the spread of malicious information and spam in the Network, unauthorized access, disclosure, distortion, modification, destruction of both personal data of an individual user and digital data that make up the infrastructure of an entire state are possible. Therefore, ensuring information security is today one of the most important tasks of a society that seeks to preserve the current state of its territory of residence in the conditions of various external influences. Within the framework of information protection, a set of measures is implemented to ensure the security of data while maintaining their availability, confidentiality and integrity. The article deals with the problems of ensuring information security in the cont...
The article is devoted to the analysis of security problems in the modern world. The authors conside...
In this article, the theory of information security is written as a context of national security. Ar...
The article is devoted to a comprehensive analysis of the problem of ensuring information security o...
As a result of the spread of malicious information and spam in the Network, unauthorized access, dis...
The article explores problems related to the directions of public policy in the field development of...
In this age of increasing digitalisation, information security is becoming one of the most important...
The items of information technologies and their role in the protection and maintenance of national s...
Continuous expansion of the scope of network information technologies application permanently create...
Continuous expansion of the scope of network information technologies application permanently create...
The digitalization of the economy and the digitalization of management in a modern state imply not o...
In the age of the information society, determined by the evolution of digital technology, informatio...
The article considers a comprehensive legal approach to ensuring the information security of the ind...
The article substantiates that the information impact carried out using the technologies of control ...
The modern development of information technologies leads to the need to protect information. In this...
Protection of information and knowledge in organization in the context of the tumultuous development...
The article is devoted to the analysis of security problems in the modern world. The authors conside...
In this article, the theory of information security is written as a context of national security. Ar...
The article is devoted to a comprehensive analysis of the problem of ensuring information security o...
As a result of the spread of malicious information and spam in the Network, unauthorized access, dis...
The article explores problems related to the directions of public policy in the field development of...
In this age of increasing digitalisation, information security is becoming one of the most important...
The items of information technologies and their role in the protection and maintenance of national s...
Continuous expansion of the scope of network information technologies application permanently create...
Continuous expansion of the scope of network information technologies application permanently create...
The digitalization of the economy and the digitalization of management in a modern state imply not o...
In the age of the information society, determined by the evolution of digital technology, informatio...
The article considers a comprehensive legal approach to ensuring the information security of the ind...
The article substantiates that the information impact carried out using the technologies of control ...
The modern development of information technologies leads to the need to protect information. In this...
Protection of information and knowledge in organization in the context of the tumultuous development...
The article is devoted to the analysis of security problems in the modern world. The authors conside...
In this article, the theory of information security is written as a context of national security. Ar...
The article is devoted to a comprehensive analysis of the problem of ensuring information security o...