Cybersecurity as a method of combating unauthorized influence in the field of information security
| dc.contributor.author | Burykin, I. | |
| dc.date.accessioned | 2022-02-10T13:35:42Z | |
| dc.date.available | 2022-02-10T13:35:42Z | |
| dc.date.issued | 2021 | |
| dc.description | Burykin I. Cybersecurity as a method of combating unauthorized influence in the field of information security / I. Burykin ; sci. advisor I. Muntian // Black Sea Science 2021. Information Technology, Automation and Robotics : рroc. of the Intern. Competition of Student Scientific Works / Odessa Nat. Acad. of Food Technologies ; eds. B. Yegorov, M. Mardar, S. Kotlyk [et al.]. – Odessa : ONAFT, 2021. – P. 304-312 : fig. – Ref.: 14 tit. | ru_RU |
| dc.description.abstract | The article describes the main problems, the protection of user’s data, methods of combating unauthorized impact in the field of information security. Comparison of antivirus programs. This work demonstrates that at the moment there are still many people who can be cyberattacked in obtaining important information. | ru_RU |
| dc.identifier.uri | https://card-file.ontu.edu.ua/handle/123456789/19658 | |
| dc.language.iso | en_US | ru_RU |
| dc.subject | cybersecurity | ru_RU |
| dc.subject | password | ru_RU |
| dc.subject | protection | ru_RU |
| dc.subject | data | ru_RU |
| dc.subject | hacking | ru_RU |
| dc.subject | phishing | ru_RU |
| dc.subject | antivirus | ru_RU |
| dc.title | Cybersecurity as a method of combating unauthorized influence in the field of information security | ru_RU |
| dc.type | Article | ru_RU |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- Black_Sea_Sci_21_ Inf_tech_Burykin.pdf
- Розмір:
- 4.61 MB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Вантажиться...
- Назва:
- license.txt
- Розмір:
- 1.71 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: