Assessing spatial and temporal changes in the landscape vulnerability in the Kaliningrad region as an element of sustainable spatial planning
... local levels and creates problems for using advanced international experience in problem solving. This study aims to establish a methodology for a comprehensive assessment of the Kaliningrad region’s territory according to the degree of landscape vulnerability to the anthropogenic impact in spatial and temporal aspects. In practical terms, this study demonstrates the possibility of introducing environmental approaches into the system of regional spatial planning in view of the geoecological, economic,...
Features of preparation of an active audit of information security of the process control system
... other systems are indicated. The features of determining the parameters of a secure audit of multi-level APCS are considered.
Vetrov I. A., Podtopelny V. V.
audit, risk, information systems, automated information system of technological processes, vulnerability
5-11
Cloud Service Analysis of Operating Systems and Applications
The presence of a large number of vulnerabilities in modern operating systems and software that pose a threat to information security determines the need to study them when training specialists in the field of information security. The article discusses the principles of building a ...
ASTP Information Security Audit Issue
... M., Barbasa M. CANopen Implementation Applications to Industrial Networks. Research Studies Press, 2000.
Khvatov D. A., Kovtun A. I., Podtopelny V. V.
audit, risk, information systems, automated information system of technological processes, vulnerability
67-75