The objectives of this review were to analyze the ways of spreading rodents, what kind of danger and harm they pose, as well as what methods are used to combat them. The article provides brief information about the distribution of mouselike rodents and the influence of factors on the distribution and dynamics of populations. The issue of transmission and storage by rodents of an infection that poses a danger to humans and their pets is considered. The methods of combating mouse-like rodents are also analyzed and the most used active substances that are part of rodenticidal agents are identified. The number of rodents can vary significantly, so the seasonal dynamics in a period unfavorable for the life of the population is at low levels, and with the improvement of habitat conditions and food supply, the number of animals increases significantly. Analyzing the factors influencing the rodent population, it is possible to predict the number of animals and determine the optimal timing of deratization work. Currently, there are a significant number of rodenticidal drugs, the effectiveness of which has been confirmed in practice.
The purpose of the work is to study the features of information security when working with GIS by analyzing scientific publications. The main research methods are synthesis and methods of system, structural-logistic, functional analysis. The regulatory framework was compiled by the "Information Security Doctrine of the Russian Federation", Moscow, 2000, GOST R 54593-2011, "The concept of protection of computer equipment and automated systems from unauthorized access to information", 1992. The basic concepts in the field of information security are considered, the current state of the development and use of geoinformation systems (GIS) in various fields of the information field, including veterinary medicine, is analyzed. The classification of GIS according to various characteristics and its structure is given. The properties of information as an object of protection are considered, the patterns of creation of protected information systems are determined, the principles of ensuring the information security of the state are disclosed, attention is paid to information competition. In order to protect information, the necessity of monitoring risks/potential threats and creating a database based on geoinformation systems with a single secure system for entering and processing primary source data is emphasized. Solving the problem of creating conditions for information security requires mandatory comprehensive application of legislative, software, technical and organizational measures at the state level.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.