2021
DOI: 10.1007/978-3-030-85043-2_67
|View full text |Cite
|
Sign up to set email alerts
|

Increasing Information Protection in the Information Security Management System of the Enterprise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…A review of related scientific publications. Existing developments in the field of regional or national security technologies are dedicated to the development of new approaches for diagnosing and monitoring various types of threats, including ecological-economic [21], informational [22], and financial [23].…”
Section: Perform Experimental Verification Of the Proposed Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…A review of related scientific publications. Existing developments in the field of regional or national security technologies are dedicated to the development of new approaches for diagnosing and monitoring various types of threats, including ecological-economic [21], informational [22], and financial [23].…”
Section: Perform Experimental Verification Of the Proposed Approachesmentioning
confidence: 99%
“…Therefore, each existing approach [21][22][23][24][25][26][27][28][29] is unique and addresses a specific problem, not specifically focused on the features of predicting the security level of a country based on safety index assessments.…”
Section: Perform Experimental Verification Of the Proposed Approachesmentioning
confidence: 99%
“…The information technology leap in the development of the world economy is changing the paradigm of the functioning of the banking sector [1]. Key innovations in fintech, including the introduction of open banking and hyper-personalization, are undeniably impacting the banking industry.…”
Section: Problem Descriptionmentioning
confidence: 99%
“… the appearance, both in our country and abroad, of numerous scientific and theoretical publications devoted to the theory and practice of creating high-speed, reliable, survivable and fault-tolerant computer systems and components operating in the Theoretical and cryptographic problems of cybersecurity _________________________________________________________________________________ SRC; in particular, the elements of the theory of ensuring fault tolerance and the classification of the CS functioning on the basis of the use of the SRC are being developed [7][8][9];  mass distribution of mobile device processors, which require high data processing performance with low energy consumption; the use of the SRC when performing arithmetic operations of addition and multiplication of numbers ensures high performance due to the absence of interdigit transfers in the process of performing arithmetic operations; at the same time, during the operation of mobile devices, the use of the SRC can significantly reduce energy consumption [10];  banking structures are of great interest, where there is a need to reliably and reliably process large amounts of data in real time, i.e. high-performance computing tools are required for highly reliable calculations with possible self-correction of errors, which is typical for corrective codes in the SRC [11];  increasing the density of the placement of elements on a single chip doesn't in all cases allow for high-quality and complete testing of computer components; in this case, the importance of ensuring fault-tolerant functioning of the CS increases; preliminary research results have shown that with the help of the SRC it is possible to organize faulttolerant operation of real-time CS [12];  the need to use specialized CS to perform a huge number of operations on multidimensional numerical structures in real time, require a high speed of integer addition and multiplication operations (tasks of matrix multiplication, tasks of the scalar product of vectors, Fourier transform, etc.) [10,13];  at present, the widespread introduction of microelectronics in all spheres of human life has significantly increased the relevance and importance of previously rare, but now widespread, such mass scientific and practical problems as digital signal and image processing, pattern recognition, cryptographic transformations, processing and storage of multi-bit information etc.…”
Section: Introductionmentioning
confidence: 99%