The development of technologies and computing resources not only expanded the spectrum of digital services in all areas of human activity, but also defined the spectrum of targeted cyber attacks. The object of the study is the process of ensuring the safety of critical business processes that ensure the continuity of production and/or functioning of the company/organization/enterprise as a whole. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. Continuity of such business processes is a critical component of any company, organization or enterprise of any form of government, which critically affects the earning of profits or the organizati...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Abstract Economic globalization leads to complex decentralized company structures calling for the ex...
The purpose of the article is to determine the place, the role and features of cybernetic security a...
The development of technologies and computing resources has not only expanded the range of digital s...
This article is dedicated to the problem of information protection of an enterprise business process...
In the process of development of the security system of the information system, the risk assessment ...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The purpose of this thesis was to investigate the capability of the case company to meet the challen...
This paper has been written in order to provide a complete insight into computer criminal presenting...
The object of research is the process of assessing the safety of the economic and information intere...
International audienceBusiness processes are at the heart of companies and evolve constantly to cope...
The object of research is the process of assessing the safety of the economic and information intere...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Abstract Economic globalization leads to complex decentralized company structures calling for the ex...
The purpose of the article is to determine the place, the role and features of cybernetic security a...
The development of technologies and computing resources has not only expanded the range of digital s...
This article is dedicated to the problem of information protection of an enterprise business process...
In the process of development of the security system of the information system, the risk assessment ...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The purpose of this thesis was to investigate the capability of the case company to meet the challen...
This paper has been written in order to provide a complete insight into computer criminal presenting...
The object of research is the process of assessing the safety of the economic and information intere...
International audienceBusiness processes are at the heart of companies and evolve constantly to cope...
The object of research is the process of assessing the safety of the economic and information intere...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Abstract Economic globalization leads to complex decentralized company structures calling for the ex...
The purpose of the article is to determine the place, the role and features of cybernetic security a...