Носители информации и утечка данных: анализ международного опыта
Închide
Articolul precedent
Articolul urmator
620 0
SM ISO690:2012
БРЕДИНСКИЙ, Анатолий. Носители информации и утечка данных: анализ международного опыта. In: Securitatea informaţională, Ed. 10, 19 aprilie 2013, Chișinău. Chisinau, Moldova: Departamentul Editorial-Poligrafic al ASEM, 2013, Ediția 10, pp. 33-36. ISBN 978-9975-75-640-2.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Securitatea informaţională
Ediția 10, 2013
Conferința "Securitatea informaţională"
10, Chișinău, Moldova, 19 aprilie 2013

Носители информации и утечка данных: анализ международного опыта


Pag. 33-36

Брединский Анатолий
 
Государственный университет физического воспитания и спорта
 
 
Disponibil în IBN: 2 mai 2019


Rezumat

One of the key problems of information protection is protection of devices with confidential data. The process must be based on the complexity principle: protection of devices has to be performed as a unified system of measures. Such an approach aims to prevent and neutralize possible threats by means of all resources available as an integrated whole.

Cerif XML Export

<?xml version='1.0' encoding='utf-8'?>
<CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'>
<cfResPubl>
<cfResPublId>ibn-ResPubl-76748</cfResPublId>
<cfResPublDate>2013</cfResPublDate>
<cfVol>Ediția 10</cfVol>
<cfStartPage>33</cfStartPage>
<cfISBN>978-9975-75-640-2</cfISBN>
<cfURI>https://ibn.idsi.md/ro/vizualizare_articol/76748</cfURI>
<cfTitle cfLangCode='RU' cfTrans='o'>Носители информации и утечка данных: анализ международного опыта</cfTitle>
<cfAbstr cfLangCode='EN' cfTrans='o'><p>One of the key problems of information protection is protection of devices with confidential data. The process must be based on the complexity principle: protection of devices has to be performed as a unified system of measures. Such an approach aims to prevent and neutralize possible threats by means of all resources available as an integrated whole.</p></cfAbstr>
<cfResPubl_Class>
<cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId>
<cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId>
<cfStartDate>2013T24:00:00</cfStartDate>
</cfResPubl_Class>
<cfResPubl_Class>
<cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId>
<cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId>
<cfStartDate>2013T24:00:00</cfStartDate>
</cfResPubl_Class>
<cfPers_ResPubl>
<cfPersId>ibn-person-25345</cfPersId>
<cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId>
<cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId>
<cfStartDate>2013T24:00:00</cfStartDate>
</cfPers_ResPubl>
</cfResPubl>
<cfPers>
<cfPersId>ibn-Pers-25345</cfPersId>
<cfPersName_Pers>
<cfPersNameId>ibn-PersName-25345-1</cfPersNameId>
<cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId>
<cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId>
<cfStartDate>2013T24:00:00</cfStartDate>
<cfFamilyNames>Брединский</cfFamilyNames>
<cfFirstNames>Анатолий </cfFirstNames>
</cfPersName_Pers>
</cfPers>
</CERIF>