The hybrid and undisguised aggression against Ukraine by the Russian Federation over the past eight years has led to an understanding of the urgent need to arm the Armed Forces with the latest armament and military equipment, and has spurred a significant increase in domestic military developments. This, in turn, led to an increase in the need to test military products, and the receipt of test requests became widespread. This determines the relevance of the development and implementation of information support system for testing, the purpose of which is to automate test processes and improve the efficiency of the test organization as a whole. The article is a continuation of a series of publications that highlight the principles and approaches to the creation of information support system for testing samples of armament and military equipment, which is planned to be implemented at the State Scientific Research Institute of Armament and Military Equipment Testing and Certification. Based on the proposals on the functionality of the information system, a generalized structure of the information and reference database of armaments and military equipment has been developed. It is proposed to expand the current classifier of armament and military equipment while keeping the structure of the code, which provides coding and entering information into the database of modern and promising models of armament and military equipment of foreign production. It is assumed that the proposed structure of the information and reference database will provide functions to clarify and supplement the tactical and technical requirements for the tested model of armament and military equipment, which in turn will be the basis for developing programs and test methods, and will provide information needs for automated comparative assessment military-technical level of the studied product. It is expected that the introduction of an information system to support the testing of armament and military equipment can significantly increase the capacity of the test organization while ensuring the proper quality of the results.
У статті запропоновано методичний підхід до коригування норм витрат запасних частин для експлуатації авіаційної техніки (АТ) при переведенні її на експлуатацію за технічним станом. Коригування норм витрат здійснюється з метою уточнення потрібної номенклатури запасних частин АТ у відповідності з очікуваною потрібністю при експлуатації виробів за технічним станом. Пропонується для визначення необхідної кількості запасних частин АТ застосовувати розподіл виробів за методами експлуатації. Застосування запропонованого методичного підходу дозволить провести коригування норм витрат запасних частин для експлуатації АТ державної авіації України при переведенні її на експлуатацію за технічним станом, знизити експлуатаційні витрати за рахунок зменшення потреби у виробах, які можливо перевести на експлуатацію за методами до відмови та до передвідмовного стану, й знизити потрібні обмінні фонди запасних частин в експлуатуючих частинах.
Attacks, the initial stage of which is the actions of an attacker who use the methods of social engineering, are currently one of the most common types of attacks. When using social engineering, an attacker seeks to obtain confidential information and access to various segments of the enterprise of interest, through psychological influence and manipulation of users. In order to successfully carry out an attack with the help of social engineering, it is necessary to gain the trust of a "victim", which is successfully carried out via targeted (personalized) phishing. Due to the relative ease of implementation, there is a rapid increase in the use of targeted phishing attacks on both home PCs and computers of employees of big companies. Targeted phishing attacks are carefully thought out to influence a certain type of people, and it is almost impossible to teach users to distinguish them. This article describes the concepts and methods of targeted phishing, as well as solutions and ways to protect against this type of attack. In addition, this article is an attempt to teach users to recognize targeted phishing emails. The article provides examples of attacks using targeted phishing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.