The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory col...
Abstract Cyber-attacks have grown in importance to become a matter of national security. A growing ...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
This article is directed to discuss one of the urgent information security problems in communication...
Current reliable strategies for information security are all chosen using incomplete information. Wi...
The object of the research is the system of information security of the state. Investigated proble...
Contemporary realities dictate that technologization, digitalization (transition of the economy and ...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of...
Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The aim of the study is to increase the effectiveness of information security management for state i...
The article is dedicated to issues in certification of antivirus software and industrial cyber secur...
Recent advances in technology and new software applications are steadily transforming human civiliza...
This paper studies information security for information communication technology (ICT) users in Russ...
Abstract Cyber-attacks have grown in importance to become a matter of national security. A growing ...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
This article is directed to discuss one of the urgent information security problems in communication...
Current reliable strategies for information security are all chosen using incomplete information. Wi...
The object of the research is the system of information security of the state. Investigated proble...
Contemporary realities dictate that technologization, digitalization (transition of the economy and ...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
The object of research is the system and schemes of conformity assessment (certification) of cyberse...
Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of...
Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The aim of the study is to increase the effectiveness of information security management for state i...
The article is dedicated to issues in certification of antivirus software and industrial cyber secur...
Recent advances in technology and new software applications are steadily transforming human civiliza...
This paper studies information security for information communication technology (ICT) users in Russ...
Abstract Cyber-attacks have grown in importance to become a matter of national security. A growing ...
Today in Russia the active work is going on the implementation of a relatively new mechanism of stat...
This article is directed to discuss one of the urgent information security problems in communication...