Evaluation of means of registration of references to information subject to protection Means for registering calls to information subject to…
Centralized security management of corporate information systems is based on the concept of global security management GSM (Global Security Management).…
The Internet of Things is a computing network that has: main nodes – connected objects; servers for managing connected objects;…
In systems with a high degree of security, specialists who maintain a complex of information system automation tools during operation…
Currently, technologies for building virtual secure private networks (VPNs) are attracting more and more attention from large companies (banks, departments,…
Protection against unauthorized entry is designed to prevent unauthorized persons from accessing the protected computer. This group of funds, as…
Means of delimitation and access control work only when the actual values of the password code are not available to…
It is known that information is transmitted by a field or substance. This is either an acoustic wave (sound), or…
To formulate the problem, we consider some initial conditions. Such conditions for us will create a model of the expected…
Authentication service This service in relation to virtual networks is called the object authentication service (single-level) and provides confirmation of…