Declared technologies base

TRANSFER OF INNOVATIONAL TECHNOLOGIES

COMPUTER TERRORISM: THE PREVENT PRACTICE, COUNTER, INVESTIGATION


Purpose of the development: The theoretical rationale and methodology for the development of a comprehensive analysis of the state of computer terrorism in the digital telecommunications network Khmelnitsky region by identifying at early stages of the groups of threats and risks, defining the construction and operation of the network, as well as the creation of new, effective security systems that minimize potential losses.

Recommended application field: Information and telecommunication sector, the fight against cyber-terrorism.

Technical characteristic: The object of study - information and telecommunications sector Khmelnitsky region,  The subject of the study - the methods and techniques of research on the state of information and telecommunications sector in the Khmelnitsky region and monitoring of its vulnerability. Methods of Research - peer-review, the method of analysis of hierarchies and methods of mathematical modeling.

Advantages over analogues: The results will be known in the field of science to which the project

The development stage readiness: The working documentation is developed

Description of the development:
()
The urgency of preservation of information resources for law enforcement agencies, military command and control (headquarters, command centers, process control systems, military agencies and scientific information), as well as for the analogous structures of the civil sector is shown in earlier studies by us. In this paper, based on an analysis of domestic and foreign literature examined and classified the main sources of threats to the basic properties of the information in traditional and electronic forms. The main activities and facilities used for the storage of information. Demonstrated the need for high-quality solutions in practice the following tasks: - Assessment of the situation; - Risk analysis; - Formation of protective systems; - Assess the effectiveness of the complex. Obtained during the execution of the program is to ensure the protection of information and telecommunications infrastructure hardware, software and systems will greatly enhance the reliability of the system, prevent leakage, breaches of confidentiality, integrity and availability of information and observation, will provide its entry into a single information space of the state. According to the results of the work of the Scientific and Technical Council of the Center of Research HmTsNTEI crimes in the sphere of intellectual property. On the recommendation of the Center launched dissertation research on the subject (computer crime within the scope of Inteleca tualnoi-owned)

corresponds technical description
Conforms to technical characteristic

Possibility of transfer abroad:
Licence's sale

Photo

Country Ukraine

For additional information turn to:
E-mail: gal@uintei.kiev.ua

or fill out the form:
Organization name :
Address :
Settlement account :
Bank :
MFO :
OKPO code :

Scientific organization tutor's data :
Surname :
Name :
Patronymic :
Scientific degree :
Phone :
Fax :
E-mail :
Cooperation proposals (joint patent, joint enterprise, assembly sale and so on :
country: