D. Holubnychyi, V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, Valentyn Lebediev, Vyacheslav Tretiak
{"title":"计算机网络安全信息功能模型","authors":"D. Holubnychyi, V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, Valentyn Lebediev, Vyacheslav Tretiak","doi":"10.1109/PICST54195.2021.9772172","DOIUrl":null,"url":null,"abstract":"Information security management allows the use of data in the system, while ensuring their security and the security of computing resources. Confidentiality, integrity and availability are three main components of information security that can always be invoked by a number of methods, but we will focus on the complexities of the computer system and network management. In addition, criteria for the safety of personnel, in particular their safety, will be developed.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Functional Model of Computer Networks Security Information\",\"authors\":\"D. Holubnychyi, V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, Valentyn Lebediev, Vyacheslav Tretiak\",\"doi\":\"10.1109/PICST54195.2021.9772172\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security management allows the use of data in the system, while ensuring their security and the security of computing resources. Confidentiality, integrity and availability are three main components of information security that can always be invoked by a number of methods, but we will focus on the complexities of the computer system and network management. In addition, criteria for the safety of personnel, in particular their safety, will be developed.\",\"PeriodicalId\":391592,\"journal\":{\"name\":\"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST54195.2021.9772172\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST54195.2021.9772172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Functional Model of Computer Networks Security Information
Information security management allows the use of data in the system, while ensuring their security and the security of computing resources. Confidentiality, integrity and availability are three main components of information security that can always be invoked by a number of methods, but we will focus on the complexities of the computer system and network management. In addition, criteria for the safety of personnel, in particular their safety, will be developed.