Attacks on computer systems
Published June 15, 2019
Published June 15, 2019
Published November 24, 2019
Modern information technologies need increasingly sophisticated information processing tools. Therefore, the need for such funds is constantly growing. The combination of computers and means of communication has had a significant impact on the principles of organization of computer systems. The model in which one computer performed all the necessary data processing...
Published January 19, 2020
The essence of functional programming can be defined as a way of creating programs in which the only action is to call the function, the only way to divide the program into parts is to enter the name of the function, and the only rule of composition is the operator of superposition of functions. The key concept in functional languages is expression...
Published May 03, 2020
The term computer network topology describes a way of organizing physical connections between computers and other network components. The choice of a particular topology affects the composition of the necessary network equipment, the possibility of expanding the network, and the way the network is managed. All networks are built on the basis of basic topologies...
Published November 10, 2020
Cryptographic methods are the most effective means of protecting information in a computer system. The most important indicator of the reliability of the cryptographic method of closing information is its strength - the minimum amount of cipher text that can be opened by statistical analysis. Thus, the strength of the cipher determines the amount of information that can be encrypted using one key...
Published January 01, 2021
The definitions of the object and subject of access have been introduced into information security. Each access subject can perform some operations on the object, which can be allowed or prohibited for a given subject or set of subjects. Therefore, there are methods for restricting access to information of the subject. Accessibility is usually determined at the operating system level and is determined by the operating system architecture...