9,473 research outputs found

    The Science of Information Protection

    Get PDF
    Workshop on Education in Computer Security (WECS) 7The presentation of Information Protection material can be improved in two important ways. First, if the material is arranged in a systematic/scientific fashion it can show how all the various pieces fit together and it can also demonstrate completeness by showing that all threats are addressed. Second, if each protection technique is preceded by a clear description of the threat that it addresses learning is significantly enhanced because the protection technique is motivated. This paper presents an information threat model that 1) arranges the material in a scientific/systematic fashion and 2) facilitates a threat-first presentation of Information Protection techniques

    Methods of information protection in telecommunication systems

    Get PDF
    The manual covers the basics of information security in ITS. Examples of practical implementation of modern methods and means of providing security in local networks are given. Each example is designed as a laboratory work. Laboratory work contains basic information about methods of information protection in local networks, methodical instructions on the procedure for its implementation and requirements for the formulation of conclusions. The material is aimed at a wide range of researchers and pedagogical staff who deal with information security and ITS safety issues, as well as graduate students and undergraduates of higher education institutions who study the specialty "Information and Communication Systems Security" in specialty 125 "Cybersecurity" in the field of knowledge " Information Technology"

    Information Protection Tools for Android-based Mobile Devices

    Get PDF
    Presently, the issue of protecting information and personal data contained in mobile devices is of vital importance. The use of cutting-edge powerful smartphones presented by manufacturers as a substitute for personal computers, laptops and tablets, stresses the need for utilizing both built-in free information protection features and special antivirus software manufactured by recognized global developers. The article reveals the effectiveness of using built-in information protection tools for Android-based mobile devices and presents a comparative characteristic of similar tools applied with the help of up-to-date antivirus software. Keywords: mobile devices, information, personal data, cyber threats, Android-based, viruses, protection of information (information protection), smartphones, security

    Explosive Pulsed Plasma Antennas for Information Protection

    Get PDF

    Society-oriented cryptographic techniques for information protection

    Get PDF
    Groups play an important role in our modern world. They are more reliable and more trustworthy than individuals. This is the reason why, in an organisation, crucial decisions are left to a group of people rather than to an individual. Cryptography supports group activity by offering a wide range of cryptographic operations which can only be successfully executed if a well-defined group of people agrees to co-operate. This thesis looks at two fundamental cryptographic tools that are useful for the management of secret information. The first part looks in detail at secret sharing schemes. The second part focuses on society-oriented cryptographic systems, which are the application of secret sharing schemes in cryptography. The outline of thesis is as follows

    System Approach: Information Protection, Noise Immunity, Noise Stability

    Get PDF
    Опираясь на основные положения системного подхода, разработана модель защиты информации во взаимосвязи с помехозащищенностью и помехоустойчивостью. Помехозащищенность в низкочастотном диапазоне оценивают сформированным стабильным шумовым сигналом с помощью колец Гельмгольца. На основании помехоустойчивости оптимальным приемником устанавливают меру защиты речевой информации научно-обоснованным численным значением показателя разборчивости речи. Полноту оценки защищенности объектов информатизации обеспечивают в соответствии с требованиями научно-методических документов.=The model of protection of the information in interrelation with noise immunity and a noise stability by means of the system concept is developed. Noise immunity in low frequency range of frequencies estimate a stable noise signal by means of Helmholtz coils. The optimum receiver establishes a measure of protection of the speech information the scientifically-proved numerical value of an indicator of legibility of speech on the basis of noise stability. Requirements of scientifically-methodical documents realize completeness of an estimation of security in information objects
    corecore