Articolul precedent |
Articolul urmator |
511 12 |
Ultima descărcare din IBN: 2023-12-05 00:20 |
SM ISO690:2012 ŞTAHOVSCHI, Ada. Strategia și problemele securității informaționale din zonele transfrontaliere și metodele de protecţie a sistemelor informaţionale. In: Dezvoltarea economico-socială durabilă a euroregiunilor şi a zonelor transfrontaliere, 9 noiembrie 2018, Iași, România. Iași, România: Performantica, 2018, Vol.33, pp. 470-475. ISBN 978-606-685-616-4. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Dezvoltarea economico-socială durabilă a euroregiunilor şi a zonelor transfrontaliere Vol.33, 2018 |
||||||
Conferința "Dezvoltarea economico-socială durabilă a euroregiunilor şi a zonelor transfrontaliere" Iași, România, Romania, 9 noiembrie 2018 | ||||||
|
||||||
JEL: F52 | ||||||
Pag. 470-475 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
In this article, the author describes the main informational problems faced bycountries of transfrontalareas and the methods of protection of the information system.The current stage is characterized by an increase in the information society's potential due to technological development. Under these conditions, the activity of information systems is dictated by a qualitative management of security and protection of IT systems. The information society dictates the regulation of rights for the development of electronic commerce and the implementation of security measures. Increasing the dependence of contemporary society on the globalization of information systems and communication infrastructures leads to increasing the vulnerability of the person, society and the state to the more and more acute threats in the informational-technological and informational-media domains. In the informational age, cyber space is a comfortable platform for the preparation and execution of cybercrime, cyber-terrorism acts and other actions that directly or indirectly affect national state security. Violation of the security of the information systems of public authorities and other institutions may compromise the confidentiality and integrity of this information and, as a result, cause financial or material damage, including damage to state security. |
||||||
Cuvinte-cheie Security, information system, cyber space, informational potential |
||||||
|