2020
DOI: 10.1080/23311916.2020.1724597
|View full text |Cite
|
Sign up to set email alerts
|

Development of an automated system model of information protection in the cross-border exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
3
0
1
Order By: Relevance
“…In [12], EDS module algorithms for block data encryption (based on exponentiation transform) were considered, as well as in [13], the development using NPNS was considered. In [12,13], only software implementations of encryption and its testing with various test data are presented. As known, cryptosystems based on NPNS can be implemented in software, hardware-software and hardware.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In [12], EDS module algorithms for block data encryption (based on exponentiation transform) were considered, as well as in [13], the development using NPNS was considered. In [12,13], only software implementations of encryption and its testing with various test data are presented. As known, cryptosystems based on NPNS can be implemented in software, hardware-software and hardware.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Ocы үрдic шeңбeрiндe aқпaрaттық тeхнoлoгиялaрды дaмыту, зияткeрлiк тeхнoлoгиялaрды әзiрлeу, кәciпoрындaрдың бизнec-прoцecтeрiн жeтiлдiру шeңбeрiндe жoғaры зияткeрлiк иннoвaциялaрды ic жүзiндe қoлдaну жәнe хaлық рeтiндe пaйдaлaнылaтын әлeумeттiк жeлiлeрдi дaмыту cияқты прoцecтeр қaдaғaлaнaды. [2] Coңғы прoцecтeрдiң бiрi-aқпaрaттық дeрeктeрдi жинaу, өңдeу, тaлдaу жәнe caқтaу бoйыншa ұйымдaрдың қызмeтiн жeтiлдiрeтiн ұйымның aқпaрaттық қaуiпciздiгiнiң кeшeндi жүйeciнiң бөлiгi рeтiндe цифрлық тeхнoлoгиялaрды дaмыту.…”
Section: Oa уCaтoвaunclassified
“…Institute of Information and Computational Technologies, Almaty, Kazakhstan;2 Al-Farabi Kazakh National University, Almaty, Kazakhstan.E-mail: balia_79@mail.ruANALYSIS OF MODERN WEB RESOURCE PROTECTION SYSTEMSAbstract. An overview of the problems of protecting web resources from the actions of intruders is presented, the basic structure of the Web service is described, the features of the Web environment affecting the protection of the information provided are given, possible threats are systematized and analyzed, measures are developed to eliminate the identified vulnerabilities of web services.…”
mentioning
confidence: 99%
“…Different measures have been taken to develop cybersecurity in Kazakhstan, including the concept called "Cyber Shield of Kazakhstan," which is implemented to solve the problem of cyberattacks. In addition, governmental and nongovernmental organizations are working together to develop and enhance cybersecurity methods [5]. As part of the information security event, Kaspersky Lab experts studied Kazakhstan's most common cyber threats in 2022.…”
Section: Introductionmentioning
confidence: 99%