scholarly journals INTERNET INFORMATION TECHNOLOGIES (VARIETIES) - NEW FEATURES OR...

Author(s):  
O. Dvoryankin

The article is about new information technologies of the Internet, such as anonymizers, intranet, extranet, proxy servers and overlay networks in particular. Their features, types, characteristics, positive and negative sides are also presented. Special attention is paid to personal information security. 

2021 ◽  
pp. 28-35
Author(s):  
Vadim Shevtsov ◽  
◽  
Nikita Kasimovsky ◽  

IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.


2019 ◽  
Vol 5 (4) ◽  
pp. 448-451
Author(s):  
L. Aripzhanova ◽  
M. Mukhitdinova

The article deals with the use of the Internet in teaching a foreign language. With the advent of the information age, both the scheme of knowledge transfer and the model of the learning process are changing sharply, which requires the improvement of professional training from the position of activation of cognitive processes.


Author(s):  
Iulian Marius COMAN

Technology has become the Intelligence Community’s new reliability, as well as its new challenge. The new transnational adversaries – international terrorists foremost among them – the flood of new information technologies, the easing of export controls on encryption technology and global access to the Internet, has led the security agencies to charting new directions in identifying, gaining access to and successfully exploiting target communications, through cooperation with all related bodies.


Author(s):  
Gerardo Reyes Ruiz ◽  
Samuel Olmos Peña ◽  
Marisol Hernández Hernández

New technologies have changed the way today's own label products are being offered. Today the Internet and even more the so-called social networks have played key roles in dispersing any particular product in a more efficient and dynamic sense. Also, having a smartphone and a wireless high-speed network are no longer a luxury or a temporary fad, but rather a necessity for the new generations. These technological advances and new marketing trends have not gone unnoticed by the medium and large stores. The augmented reality applied to interactive catalogs is a new technology that supports the adding of virtual reality to a real environment which in turn makes it a tool for discovering new uses, forms, and in this case, spending habits. The challenge for companies with their private labels in achieving their business objectives, is providing customers with products and services of the highest quality, thus promoting the efficient and streamlined use of all resources that are accounted for and at the same time promoting the use of new information technologies as a strategic competitive.


Author(s):  
Rasoul Namazi

This chapter studies the influence of the Internet and new Web 2.0 technologies on the process of democratization in authoritarian regimes. The objective is to show that the new information technologies are not necessarily helpful to dissident movements and have even some negative impacts on the process of democratization. The author questions the capacity of Internet to transmit political information discusses how the new technologies contribute to the depoliticization of societies by creating passive citizens in authoritarian regimes. This chapter also shows how authoritarian regimes use new information technologies as instruments of control and repression and questions the effectiveness of the new cyber-activism by explaining the structure of the Internet and discussing the capacity of the new technologies in creating political community.


Author(s):  
Dariusz Prokopowicz

In recent years, The number of companies that have been collecting personal information for marketing purposes has grown. Then, they have been reselling it to other companies, banks, institutions. In this way, enterprises, financial and public institutions create huge collections of nonpublic data that are valuable information for taking marketing enterpises. By targetting appropriately profiled product and service offer at a selected group of receivers; trading partners and potential clients, a greater effectiveness used in the marketing strategy is achieved suitably Thereupon, multifaceted and informational personal data base, which are built in institutions, enterpises and social networking sites, become a valuable source of informaton used for the marketing purposes. The development of information processing and dissemination techniques through the Internet is determined by the many conveniences for beneficiaries, customers and users of services offered by the Internet. On the other hand, the development of information technologies on the Internet carries the risk of loss or theft of information by an unauthorized entities. The process of facilitating information online generates a number of threats related to identity theft, capturing nonpublic data by hackers, and accomplishing conversion of funds in the electronic system banking. In response to these threats, specific entities expand security systems for remote facilitating of information and making transactions via the Internet.


2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


2013 ◽  
Vol 29 (3) ◽  
pp. 314-344 ◽  
Author(s):  
Jose M. Such ◽  
Agustín Espinosa ◽  
Ana García-Fornes

AbstractPrivacy has been a concern for humans long before the explosive growth of the Internet. The advances in information technologies have further increased these concerns. This is because the increasing power and sophistication of computer applications offers both tremendous opportunities for individuals, but also significant threats to personal privacy. Autonomous agents and multi-agent systems are examples of the level of sophistication of computer applications. Autonomous agents usually encapsulate personal information describing their principals, and therefore they play a crucial role in preserving privacy. Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness, autonomy, and the like. This article introduces the problem of preserving privacy in computer applications and its relation to autonomous agents and multi-agent systems. It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research.


2021 ◽  
Author(s):  
Elena Zaborova

The paper aims to analyze positive and negative characteristics of Internet information, consider the peculiarities of social and historical change of knowledge, and identify the specifics of the phenomenon of human academic literacy. In the modern information and digital age, the role and importance of information is increasing at a rate that has allowed scientists to describe the situation as the information explosion. The dramatic increase in the volume of information was made possible by the fact that a wide range of users with their personal information materials have gained access to the Internet. The speed of obtaining information has also increased; it is transmitted in real-life mode. These and many other characteristics of modern information flows can undoubtedly be assessed as positive trends, but the negative aspects of information processes are also increasing. The abundance of information gives rise to its excess and the problem of its selection. The availability of information does not guarantee its reliability; there is a lot of false, distorted information in the Internet. Analyzing whether the wide access and abundance of Internet information implies increasing academic literacy, the author concludes that people tend to become much more informed, but the path to academic literacy is becoming longer. Academic literacy is what a person learned in the course of education and what became the basis for his/her daily life and self-awareness. The excess of information creates a problem of qualitative selection, which requires additional time. The abundance of unreliable, fake information requires its careful verification. Public morals are the most important element of academic literacy, but there are virtually no filters in the Internet that block immoral information, cruelty, Internet trolling. As a result, learning by processing Internet information makes the process of creating academic literacy much more challenging and complex. Keywords: information age, information, digital technologies, academic literacy


2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


Sign in / Sign up

Export Citation Format

Share Document