2018
DOI: 10.20535/2411-1031.2018.6.2.153495
|View full text |Cite
|
Sign up to set email alerts
|

Fundamentals methodology of formation cyber competences at security sector experts and Ukraine defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…We, as authors, cannot disagree with Danyk et al (2019), who confirm this opinion and classify threats to computerized accounting information systems into two categories: active and passive threats. Active threats include computer fraud and computer sabotage.…”
Section: Discussionmentioning
confidence: 87%
“…We, as authors, cannot disagree with Danyk et al (2019), who confirm this opinion and classify threats to computerized accounting information systems into two categories: active and passive threats. Active threats include computer fraud and computer sabotage.…”
Section: Discussionmentioning
confidence: 87%
“…Cyber influence is marked by active actions in cyberspace, i.e., measures of destructive influence on automated control systems, communication systems, navigation and control of weapons, computer networks, or socio-technical systems of the enemy. Modern information technologies are built in such a way that breaking into open information systems with certain skills will be easy (Danyk, 2019).…”
Section: Resultsmentioning
confidence: 99%