RU

Keyword: «information security»

Full text Read online
The authors describe types of information technologies, considering the stages of development in the world and Russia; show their increasing role in all spheres of life.
Full text Read online
One of the urgent problems for parents is a problem of controlling the access of children to computer. What are the main methods for solving such a problem? Do they have enough effectiveness? Is it possible to use the recourses of the operating system to solve this problem? What are the other methods for this purpose? The paper is devoted to the discussion of the main methods for children’s limitation to the computer in whole and to the Internet in particular.
Full text Read online
The article deals with network traffic filtering technology in a corporate environment, methods of user traffic shaping.
Full text Read online
The article describes the implementation of network traffic filtering technology in a corporate environment with using nDPI and iptables rules to protect the server.
Full text Read online
The article reveals the most urgent problems of ensuring information security and business continuity. The authors examine the advantages of IS-products pilot projects introduction, analyze the criteria for their selection. Special attention is paid to the cost approach to choosing a solution.