Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixin...
Saved in:
Main Author: | S. A. Lesko |
---|---|
Format: | Article |
Language: | Russian |
Published: |
MIREA - Russian Technological University
2020-12-01
|
Series: | Российский технологический журнал |
Subjects: | |
Online Access: | https://www.rtj-mirea.ru/jour/article/view/255 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Scenario modeling of Information and Political Threats in the Internet
by: V. V. Borshchenko
Published: (2020-05-01) -
Threats to information security of state corporations of the Russian Federation
by: I. A. Loskutov, et al.
Published: (2022-11-01) -
Analysis and features of the functioning of protected automated systems of internal affairs bodies under the influence of threats of unauthorized access
by: A. O. Yefimov, et al.
Published: (2023-05-01) -
Network security systems
by: M. A. Ganzhur, et al.
Published: (2022-11-01) -
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)