Articolul precedent |
Articolul urmator |
363 0 |
Căutarea după subiecte similare conform CZU |
341.7:004.056.5 (1) |
Дипломатическое право. Посольское право (54) |
Информационные технологии. Вычислительная техника. Обработка данных (4219) |
SM ISO690:2012 RYBALCHENKO, Lyudmila. Protection of the citizens’ rights in terms of informatization issues in the conditions of digital transformations. In: Strategii și politici de management în economia contemporană, Ed. 8, 24-25 mai 2023, Chişinău. Chişinău: Departamentul Editorial-Poligrafic al ASEM, 2023, Ediţia 8, pp. 362-365. ISBN 978-9975-147-99-6 (PDF).. DOI: https://doi.org/10.53486/icspm2023.53 |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Strategii și politici de management în economia contemporană Ediţia 8, 2023 |
||||||
Conferința "Strategii și politici de management în economia contemporană" 8, Chişinău, Moldova, 24-25 mai 2023 | ||||||
|
||||||
DOI:https://doi.org/10.53486/icspm2023.53 | ||||||
CZU: 341.7:004.056.5 | ||||||
Pag. 362-365 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
Digital space is an integral part of the state and society. This indicates the necessity of its guaranteed protection. Significant increase of the dependence of the country from the information technologies and willingness of the competitors and criminals to use the global network as the place to create various threats in the economic, political, military and social spheres should be counteract and created strategic measures for strengthen and protection of the network from the intervention of criminals. The biggest threat is the internal criminals, who enjoy confidence in the organizations where they work, and have access to the vital systems and data. Criminals, by providing their activity, such as theft of the secret data or intellectual property, can cause financial losses or damage to the reputation of the organization. They also can cause threat to destructive cyber activity if they will use a special knowledge or access to conduct the attack or facilitate it in order to disable, degrade or destroy the critical services of the organizational network. |
||||||
Cuvinte-cheie digital transformation, Information Society, data protection, information security, cyberthreats |
||||||
|