The objective of the study is to identify the key factors of the stability of state information in the face of terrorist threats based on the review of existing research in this area, and to identify the main approaches to ensure the stability of state information in the face of terrorist threats. Based on the analysis of scientific works, the factors of the state’s resistance to cyberterrorism are identified and the main approaches are organized to ensure the stability of state information in the face of terrorist threats. The results of the study provide an understanding of the key factors needed to achieve the legal, technical, organizational, and operational areas of state resilience to cyber threats. Further researc...
The increase in the number of cases of failure of information and telecommunication networks due to ...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information s...
In this day and age, information security is becoming a priority not only in the system of internati...
The article examines the stability and resilience of the information infrastructure under the influe...
The object of the research is the system of information security of the state. Investigated proble...
INFORMATION IN THE ASPECT OF SECURITY THREATS AND CHALLENGESIn the article, the author descri...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terr...
Information security is a component of the state national security. In this regard, the urgent issue...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information s...
In this day and age, information security is becoming a priority not only in the system of internati...
The article examines the stability and resilience of the information infrastructure under the influe...
The object of the research is the system of information security of the state. Investigated proble...
INFORMATION IN THE ASPECT OF SECURITY THREATS AND CHALLENGESIn the article, the author descri...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
The main purpose of the study is to determine the key aspects of the mechanisms of state management ...
Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terr...
Information security is a component of the state national security. In this regard, the urgent issue...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information s...