Cyber security and data privacyThe importance of cyber
security and
data privacy is described in the paper. Common threats
Ensuring information security of the OSTIS ecosystem with knowledge bases instead of
data, requires the formation of new approaches to ensuring information
security Voice data security from leaking through technical channels evaluation methodologyVoice
data security from leaking through technical channels evaluation methodology
Особенности частных охранных предприятий в системе внутренней безопасности страныThe analysis of the activities of private
security companies (PSCs) allowed us to assess
Overview of Five Techniques Used for Security and Privacy Insurance in Smart Cities to maintain
data security and user privacy. These two criteria can or directly represent the strengths
Internet security advice how to
secure your
data and your computer on the Internet is presented in the paper.
Controlling data security in social networks, and social interaction. With over 4.5 billion active users globally, the
security of personal
data shared
Information security requirements for a small business company Security Architecture model was used to effectively mitigate the considered threats. Using the information