z-logo
open-access-imgOpen Access
The Nature of Information Security of Living and Non-Living Objects
Author(s) -
С. В. Лысенко
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d1006.1184s19
Subject(s) - synergetics (haken) , hacker , natural (archaeology) , subconscious , computer science , analogy , cognitive science , epistemology , management science , psychology , engineering , computer security , medicine , philosophy , physics , alternative medicine , archaeology , pathology , quantum mechanics , history
The author sees synergetics as a very interesting scientific approach to cognition. It seems to be particularly effective in combining the theories of legal and natural sciences, for the simultaneous study of the laws of society and the universe. For the purpose of his study of the possibilities of this theory, the author will use synergetics in defining information processes, and especially in the field of information security. Therefore, considering the conceptual foundations of synergetics, the emphasis will be shifted not so much to the study of the mechanisms of self-organization of the information society as to the exploration of its management capabilities. This is especially important in the context of the coexistence of organizational and self-organizing components, the reduction of the role of anthropogenic factor, the ability to exist in full entropy and to predict bifurcation periods. In this article, the author will try to investigate the natural genesis of information accumulation, natural ways of storing information and known storage devices. However, by comparing the natural and the artificial, ways of transmitting and stealing information from natural and technical storage devices will be considered. An analogy will be made between psychological intervention in the human mind (hypnosis, magic) to obtain information from the brain or subconscious mind and modern hacking attacks for the same purposes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here