Tag: data protection

System of evolutionary forecasting of synergistic effect of mergers and acquisitions of enterprises

Purpose. This model, by introducing arithmetic blocks for calculating the numerical values ​​of the income dynamics of populations in the…

Applied system for assessing information security risks

Purpose. An applied information security risk assessment system using CVSS values ​​(versions 2.0 and 3.0) of indicators presented in the…

Applied Anomaly Detection System

Purpose. An applied anomaly detection system that, due to cyber-attack databases, rules and standards, allows to expand the functionality of…

Damage assessment system in case of leakage of state secrets

Purpose. The “System for Analysis and Assessment of the Amount of Potential Damage to National Security of the State in…

Cryptographic module for the formation and verification of an electronic digital signature with recovery based on the use of elliptic curves

Purpose. This software module can be further integrated into websites, mobile and software applications, as well as into information and…

Cryptographic module for the formation and verification of electronic digital signatures using additional cryptographic algorithms

Purpose. The cryptographic protection module can be used to ensure the integrity and confidentiality of information. Scope. The cryptographic protection…

Cryptographic module of homomorphic procedure of encryption and decryption of information based on the use of additional parameters

Purpose. The software module can be further integrated into websites, mobile and software applications, as well as into information and…

Chaotic signal generation device for information security systems

Purpose. To create chaotic signals for information security systems. Application area. Computer technologies, information security, electronics, telecommunications. Advantages. High generation…

Technology for creating an optical quantum logic element for controlling qubits with polarization coding in information security and cyber defense systems

Purpose. For the construction of optical quantum computers, the creation of optical quantum cryptography systems, and will also improve the…

Technology for creating optical vector-vortex beams for quantum communication and information systems

Purpose. Improving the method of generating vector-vortex beams using topological defects in the orientation of the optical indicatrix in liquid…