Assessing spatial and temporal changes in the landscape vulnerability in the Kaliningrad region as an element of sustainable spatial planning
... local levels and creates problems for using advanced international experience in problem solving. This study aims to establish a methodology for a comprehensive assessment of the Kaliningrad region’s territory according to the degree of landscape vulnerability to the anthropogenic impact in spatial and temporal aspects. In practical terms, this study demonstrates the possibility of introducing environmental approaches into the system of regional spatial planning in view of the geoecological, economic,...
Vulnerability assessment of coastal systems in the Kaliningrad region using the coast vulnerability index (CVI)
... the coastal zone. However, there is a lack of research dedicated to assessing the vulnerability of the coastal area. The practical significance of this study lies in the potential for further utilization of its results to evaluate and analyze the vulnerability of the coastline of the Kaliningrad region and make decisions on implementing a series of measures to protect and preserve the coastal zone. For the study, the Coastal Vulnerability Index (CVI) methodology was selected, which is considered ...
Features of preparation of an active audit of information security of the process control system
... other systems are indicated. The features of determining the parameters of a secure audit of multi-level APCS are considered.
Vetrov I. A., Podtopelny V. V.
audit, risk, information systems, automated information system of technological processes, vulnerability
5-11
Cloud Service Analysis of Operating Systems and Applications
The presence of a large number of vulnerabilities in modern operating systems and software that pose a threat to information security determines the need to study them when training specialists in the field of information security. The article discusses the principles of building a ...
ASTP Information Security Audit Issue
... M., Barbasa M. CANopen Implementation Applications to Industrial Networks. Research Studies Press, 2000.
Khvatov D. A., Kovtun A. I., Podtopelny V. V.
audit, risk, information systems, automated information system of technological processes, vulnerability
67-75