2020
DOI: 10.33764/2618-981x-2020-6-2-99-104
|View full text |Cite
|
Sign up to set email alerts
|

Features of Intelligent Information Security Management Systems for Critical Information Infrastructure Objects

Abstract: The article discusses the problem of using intelligent systems in managing information security of critical information infrastructure objects. Currently, the development of information technologies reached the point of transition to widespread use of various intelligent systems. At the same time, their application is also noted in the sphere of ensuring the security of significant objects of critical information infrastructure of the Russian Federation. Cybersecurity parameter management systems have a specia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…On the other hand, attackers who violate user privacy data are usually service providers themselves or other relevant individual users, which makes it difficult for attackers to identify. Since the founding of the People's Republic of China in 1987, China has been making continuous efforts to establish and improve legal protection policies for various rights, including actively building a judicial protection system for individual privacy [13][14][15][16]. However, the legal protection of minors' privacy rights is still in the initial stage of development.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, attackers who violate user privacy data are usually service providers themselves or other relevant individual users, which makes it difficult for attackers to identify. Since the founding of the People's Republic of China in 1987, China has been making continuous efforts to establish and improve legal protection policies for various rights, including actively building a judicial protection system for individual privacy [13][14][15][16]. However, the legal protection of minors' privacy rights is still in the initial stage of development.…”
Section: Introductionmentioning
confidence: 99%