COMBATING EXTERNAL INFORMATION THREATS IN UKRAINE
نویسندگان
چکیده
منابع مشابه
Combating Threats to Collective Attention in Social Media: An Evaluation
Breaking news, viral videos, and popular memes are all examples of the collective attention of huge numbers of users focusing in large-scale social systems. But this selforganization, leading to user attention quickly coalescing and then collectively focusing around a phenomenon, opens these systems to new threats like collective attention spam. Compared to many traditional spam threats, collec...
متن کاملMitigating External Threats in Wireless Local Area Networks
As computer networks become more critical to enterprises, it is inevitable that efficient security policies are designed, case in point: wireless networks, in order to effectively ensure the confidentiality, availability, and integrity of the data traversing these networks. The primary objective of this paper is to appropriately simulate an enterprise network, and evaluate the threats, and poss...
متن کاملInformation Systems Threats and Vulnerabilities
Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...
متن کاملCombating Information Hiding Using Forensic Methodology
Advancement in disk technology led to the development of hard disks of terra byte sizes. Users have the option to divide the storage into a number of partitions based on the nature of uses. In case of Master Boot Record partitioning scheme, whenever a partition is created, the complete track containing MBR/EMBR of the storage media is reserved to store boot information and partition table infor...
متن کاملBattle for Information : Combating Internet Censorship
The Internet has become ubiquitous across the globe with more people getting connected to it, at more places, and through increasingly varied network-enabled devices. Unfortunately, Internet users face constant threats to their online security and privacy: repressive regimes deprive them of open access to the Internet, corporate networks monitor their online behavior, advertising companies coll...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Investytsiyi: praktyka ta dosvid
سال: 2020
ISSN: 2306-6814
DOI: 10.32702/2306-6814.2020.2.141