Zadereyko А. Development of algorithm to protect user communication devices
against data leaks / A. Zadereyko, Y. Prokop, O. Trofymenko, N. Loginova, О.
Plachinda // Eastern-European Journal of Enterprise Technologies. – V. 1/2 (109)
– Technology Center, 2021. – Р. 24-34.
Sovereignty of the state is this political-legal
property of the state, sense of that consists in its right independently to
decide internal and external political questions without intervention from other
states, organizations, persons.
In practice
the providing of information security for personal computer (PC) users is a set
of problems, closely associated with the usage of program-technical facilities
intended for different purposes.
Today it is possible to tell with
special confidence that the phrase "Who possesses information, that owns the
world" it was not only prophetical, but also defining foreign and domestic
policy of the leading states of the world in the field of regulation of the
information streams circulating in all spheres of life of modern society.
The phrase “who owns information owns the world” became not only prophetic, but defined external and
internal policy of states in the world in the field of information flows
regulation, circulating in all spheres of society.
Today, it is not necessary to prove to anyone that the success of any human
activity, including such specific, as the investigation and detection of crime,
directly depends on its level of security in the amount of accurate information
sufficient for the task. Qualified collecting, analyzing information about
objects from various sources, its correct interpretation and application are key
to the disclosure of the crimes.
Today one of the most actual problems in the context of implementation of
interaction of the state and society is creation projects in the virtual
environment the Internet: electronic government (EGovernment) and electronic
control by the state and public processes (EGovernance) (Government Internet
Portal- e-Government and e-Governance.
The development of information technologies and continuous growth of the
number of global Internet users generate a lot of violations in the field of
copyright.
СОВРЕМЕННЫЕ ТЕХНОЛОГИИ И СИСТЕМЫ МЕЖДУНАРОДНОЙ ЗАЩИТЫ АВТОРСКИХ
ПРАВ: СОБЛЮДАЯ ДИСТАНЦИЮ МЕЖДУ ИНФОРМАЦИОННОЙ СВОБОДОЙ И ЕЁ ЗАЩИТОЙ
В статье проанализировано взаимодействие международной системы защиты авторских прав
владельцев интеллектуальной собственности.
Рассмотрены вопросы сохранения устойчивого баланса между информационной свободой и её должной защитой.
Read >>>
ПРОБЛЕМНЫЕ АСПЕКТЫ ПРАВОВОЙ ЗАЩИТЫ АВТОРСКОГО ПРАВА В СЕТИ
ИНТЕРНЕТ И ПУТИ ИХ РЕШЕНИЯ
В статье рассмотрена проблематика соблюдения авторских прав владельцев информации, размещаемой в глобальной сети Интернет.
Предложены пути решения этой проблемы посредством внесения изменений в действующее законодательство Украины
Read >>>
In the conditions of consequences of financial crisis and unstable bank
activity in Ukraine, active development of numerous systems "electronic payments" can
quite be considered as alternative to traditional ways of calculations between
natural and legal entities in almost any sector of economy.
In Ukraine, systems of "electronic payments" started developing at the
beginning of the 2000 and today in the conditions of financial crisis and
unstable bank activity began to be considered as alternative to traditional ways
of calculations between physical and legal entities.
ДЕЯКІ АСПЕКТИ ПРИСКОРЕНОГО СТАРІННЯ ЕЛЕКТРОЛІТИЧНИХ
КОНДЕНСАТОРІВ
В статті розглянуто питання покращення надійності радіоелектронної апаратури за рахунок використання методики прискореного старіння її компонентів, зокрема електролітичних конденсаторів.
Читати >>>
ТЕХНИЧЕСКИЕ АСПЕКТЫ ОБЕСПЕЧЕНИЯ БЕЗОПАСНОСТИ РАБОТЫ ПОЛЬЗОВАТЕЛЕЙ В
БЕСПРОВОДНЫХ СЕТЯХ WI – FI
Аннотация: В статье рассмотрены основные принципы конфигурации беспроводных сетей Wi-Fi с точки зрения организации их максимальной безопасности для пользователей.
Swift development of technologies of transmission and exchange of
information causes the inevitable increase of the informative loading on the
users of informative projects in a network the Internet. It begins to cause
numerous inconveniences of all greater amount of their users.
Problem positioning of mobile phones involves the automatic determination of
their location within cellular networks. Thus, the term "location" follows
understood not find geographic coordinates - latitude and longitude (which, in
principle, also possible), and the unambiguous identification of the position of
the mobile phone owner terrain (e-card).
Problem positioning of mobile phones involves the automatic determination of
their location within cellular networks. Thus, the term "location" follows
understood not find geographic coordinates - latitude and longitude (which, in
principle, also possible), and the unambiguous identification of the position of
the mobile phone owner terrain (e-card).
One of the biggest challenges in
creating the automated control systems of complex objects and technological
processes is the task of improving the accuracy of measurements.
|