2019 Wave Electronics and Its Application in Information and Telecommunication Systems (WECONF) 2019
DOI: 10.1109/weconf.2019.8840618
|View full text |Cite
|
Sign up to set email alerts
|

Research of Vulnerabilities of Information Processing Processes Systems of Critical Information Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Due to the orientation of this study on data processing processes in quality management in high-tech industries, it is advisable to make the most of the existing proven processes from areas close to close requirements for the complexity of the processes performed, their repetitiveness and security requirements. For example, a civil aviation area where a fairly general process of processing information is used in automated systems [12,13].It is expected to consist of the following stages:…”
Section: Methodsmentioning
confidence: 99%
“…Due to the orientation of this study on data processing processes in quality management in high-tech industries, it is advisable to make the most of the existing proven processes from areas close to close requirements for the complexity of the processes performed, their repetitiveness and security requirements. For example, a civil aviation area where a fairly general process of processing information is used in automated systems [12,13].It is expected to consist of the following stages:…”
Section: Methodsmentioning
confidence: 99%
“…Other security research fields are content leakage prevention mechanisms, user terminal security systems, cryptography, intrusion detection, cyber-attack detection, and information system security. However, researchers have found that human interaction with these systems is the real cause of most breaches [26,27]. This human factor is called an agent, which purposely exploits weaknesses of the system or unintentionally uncovers vulnerabilities either by using the system, or by using mobile devices that can leak and exploit sensitive information to other people [27].…”
mentioning
confidence: 99%