Problems of information security of the firm (manufacture) and a way of their decision
Problems of information security of the firm (manufacture) are considered. Their decision assumes studying of forms, ways and methods of revealing and the danger prevention in information sphere, and also the optimal control of system of maintenance of information security and ...
SOC. Inefficiency of Implementation
The paper analyzes the main shortcomings and problems of implementing a situational center for monitoring information security (Security Operation Center).
1. Muniz J., McIntyre G., Al Fardan N. Security Operations Center: Building, Operating, and Maintaining your SOC // Cisco Press. Nov 2, 2015. URL:
. ciscopress.com/store/security-operations-center-building-operating-and-maintai ...
Using Gaming Technologies in the Education of Information Security Specialists
The paper analyzes the basic gaming technologies that are possible for useful use in the process of education information security specialists. The game processes and tools that allow students to acquire the necessary professional skills are considered. A comprehensive course on the application of gaming technologies is proposed that simulates the activities of specialists ...
Political technologies and international conflicts in the information space of the Baltic Sea region
... to join efforts in solving the challenging social problems that cannot be overcome without either international cooperation among the countries or effective social partnership.
Kirilenko V. P., Alexeyev G. V.
information security, Baltic Sea common information space, media, national interests, diplomacy, information operations, Baltic region, international cooperation
Training of Students of Nautical Directions in the Field of Information Security
The article analyzes the system of training students of Maritime University in the field of information security. Determination of the content of competence of graduates of the Maritime University in the field of protection of information flows on the ship-to preserve and ensure the integrity and confidentiality of information. Formulation of tasks,...
Methodology for processing the results of expert assessment of information security threats
The paper analyzes the possibilities of assessing information security threats based on the methodology of the FSTEC of Russia in terms of processing the results of the work of the expert group. A method for translating linguistic variables into numerical values based on the Harrington desirability function ...
Subject-specialized competence of a technical school teacher in the field of information security of automated systems
The article deals with the subject competence of a technical school teacher in the field of information security of automated systems. Having analyzed the pedagogical activity of a technical school teacher, the authors substantiated the urgency of the subject competence formation, defined the professional competencies, included in its structure, and characterized ...
SOC. Starts and loses
The paper analyzes the main shortcomings and problems of opposition to the methods of social engineering a situational center for monitoring information security (Security Operation Center).
Strelnikov R. V.
SOC, information security monitoring center, information security, social engineering
Adaptation of laboratory work for undergraduate students of the «Information Security» direction of Physics and Mathematics Institutes to the conditions of lockdown
... format in technical disciplines, during the pandemic, through the development and use of automated information systems in the form of training programs and software simulators.
Vetrov I. A., Pyanov S. I.
pandemic, lockdown, laboratory work, information security, training program, software simulator