2019 IEEE East-West Design &Amp; Test Symposium (EWDTS) 2019
DOI: 10.1109/ewdts.2019.8884375
|View full text |Cite
|
Sign up to set email alerts
|

Elaboration of the Functioning Algorithm of Three - Dimensional Model of Computer System Safety

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…There are both external and internal threats, but for several decades, computer science and technologies has been developing rapidly and successfully precisely in the direction of creating antivirus systems and information protection systems from external intruders, not considering security incidents caused by internal violators (intruders) to be significant. According to Interstate Standard GOST R 53114-2008, information security incident is understood as any unforeseen or undesirable event that may disrupt the activity or information security [1][2][3]. Although the industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor.…”
Section: Introductionmentioning
confidence: 99%
“…There are both external and internal threats, but for several decades, computer science and technologies has been developing rapidly and successfully precisely in the direction of creating antivirus systems and information protection systems from external intruders, not considering security incidents caused by internal violators (intruders) to be significant. According to Interstate Standard GOST R 53114-2008, information security incident is understood as any unforeseen or undesirable event that may disrupt the activity or information security [1][2][3]. Although the industrial enterprises use various software and hardware systems and complexes to protect information; programs for cryptographic transformation of stored data, which protects assets and other valuable information from hacker attacks, it is difficult to exclude the influence of the human factor.…”
Section: Introductionmentioning
confidence: 99%
“…Ensuring the safety of children and adolescents is a task of increased urgency [1]. To solve it, it is necessary to develop special software -a security monitor that allows you to view, analyze and block a destructive website with malicious content even before it is loaded onto the computer of a young user, and also helps parents control the hobbies of their children [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the introduction of document approval systems into production has a positive impact on both the economic and environmental aspects. Printing and photocopying costs are significantly reduced, which minimizes the use of resources required for printing [1][2][3].…”
Section: Introductionmentioning
confidence: 99%