z-logo
open-access-imgOpen Access
Ensuring cyber protection of a computer network object of information activity
Author(s) -
A. M. Kotenko,
AUTHOR_ID,
M. S. Yasko
Publication year - 2021
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2021.046469
Subject(s) - computer security , computer science , network security , information security , information security management , information protection policy , network access control , object (grammar) , security information and event management , security service , computer security model , order (exchange) , logical security , cloud computing security , network security policy , business , cloud computing , operating system , finance , artificial intelligence
Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here