Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems. Man-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of human activity automation is only an intermediate link on the way to excluding human intervention. This direction is the most relevant for systems that have a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by a person (for example, transport systems). The second group includes the sphere of information security. There is a need to move to the next level of excluding the human factor – introducing adaptive systems that will transfer the process of information protection in a completely different plane. The organization of adaptive information security systems is based on applying existing methods of adaptation from other areas of scientific knowledge in relation to information security issues. Features of such application of the generalized principles of adaptation reflect the specifics of the subject area without violating generally accepted norms. This article discusses the general principles of adaptive systems. It investigates the existing approaches to the organization of adaptive information security systems as well.
Security of network systems has become a necessity, as more and more important information is stored and used online. The spread of web applications opens up new attack vectors. Traditional security mechanisms, such as firewalls, are not designed to protect web applications and therefore do not provide adequate protection. Current attacks cannot be prevented only by blocking ports 80 (HTTP) and 443 (HTTPS). Preventative measures (such as web application firewall rules) are not always possible. Signature methods for detection are always behind the actual event. Protocol-enforced network firewalls usually provide the first line of defense, delaying most major attacks on the network perimeter. They mainly work on the network, session, and transport layers of the reference network model (OSI). Developers have significantly expanded the capabilities of network firewalls to control the integrity of a wide range of top-level protocols, such as DNS, FTP, HTTP, SMTP, and TFTP. Standard firewalls can help restrict or allow access to network ports. Although application proxy firewalls exist, they cannot understand the specific content of all web applications run by an enterprise. The purpose of this article is to study the features of using machine learning in web application protection. Methods of web application security and learning neural networks were studied. The result of this work is a theoretical overview of the neural network security of a web application.
Building human potential with necessary competencies is possible only with the introduction of continuing education, which will form the basis for the development of information society. This is why e-learning exists. It allows us to improve the quality of education through the use of rapidly expanding global educational resources and helps adapt to rapidly changing environmental conditions and modernizing production. Reducing the volume of classroom work, increasing independent practical work, the possibility of remote learning, the use of virtual models open up new opportunities in the educational process and motivation for educational activities. Education, as a condition for the development of society, remains one of the main tasks of mankind. Due to its importance, education, as a process of knowledge transfer, is developing and undergoing significant changes. E-learning is rapidly gaining popularity recently and being introduced in educational institutions of various levels. The presence of a gadget and the Internet, together with the desire to learn, makes it possible to obtain the necessary knowledge anywhere in the world. This article analyzes the advantages and disadvantages of e-learning, its opportunities and prospects. The authors consider "Moodle", one of the most popular and widespread in the e-learning environment, which has already covered not only the main educational process of the university, but also provided the opportunity to organize pre-university and postgraduate studies.
The human well-being directly depends on the economic state and continuous increasing the volume of output. Specialists of different scientific fields are studying the possibilities of growing the efficiency of production processes. Increasing the volume of output is related to the widespread automation of the manufacturing. The motor functions of workers are decreased on the background of the introduction of automated labor: static repetitive moves are prevailed; also it is associated with work on a personal computer. At the same time, blood supply of the body is impaired; the working efficiency is decreasing. Analysis of the basic factors affecting labor productivity is presented in this paper. These factors are age and sex signs, the level of physical activity of workers, working conditions, etc. Results of this research presents that regular physical exercises are main factor for increasing labor productivity of company workers (study was carried out based on the worker's data of Public Corporation "Tyumen OilResearch Center", Tyumen (TORC)). This company is mainly engaged in scientific research. The production activity of personnel has a physical activity low level in the workplace under such conditions. Also, it is shown that systematic physical load of workers leads to lower number of colds. In this regard, the number of days of incapacity for work is reduced; it increases the production process efficiency. Thus, it is necessary to popularize a healthy lifestyle and systematic physical exercises to improve the wellbeing and health of employees.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.