{"title":"社交网络中的保密信息保护技术","authors":"K. S. Irza, D. Guy","doi":"10.31673/2409-7292.2021.021314","DOIUrl":null,"url":null,"abstract":"The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Technology of protection of confidential information in social networks\",\"authors\":\"K. S. Irza, D. Guy\",\"doi\":\"10.31673/2409-7292.2021.021314\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2021.021314\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.021314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Technology of protection of confidential information in social networks
The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.