dc.contributor.author | Korol, Yana | en |
dc.contributor.author | Melnyk Olesya | en |
dc.contributor.author | Король, Я. О. | uk |
dc.contributor.author | Мельник, О. Д. | uk |
dc.date.accessioned | 2024-03-21T14:06:24Z | |
dc.date.available | 2024-03-21T14:06:24Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Король Я. О. Analysis and implementation of user authentication means [Electronic resource] / Я. О. Король, О. Д. Мельник // Матеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р. – Електрон. текст. дані. – 2022. – Режим доступу: https://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16128. | uk |
dc.identifier.uri | http://ir.lib.vntu.edu.ua//handle/123456789/40535 | |
dc.description.abstract | The concepts of authentication, authorization and identification are considered, their types are considered and their shortcomings are pointed out. The implementation of the system of authentication and authorization for programs that will have limited access in use. | en |
dc.language.iso | en_US | en_US |
dc.publisher | ВНТУ | uk |
dc.relation.ispartof | Матеріали LI науково-технічної конференції підрозділів ВНТУ, Вінниця, 31 травня 2022 р. | uk |
dc.relation.uri | https://conferences.vntu.edu.ua/index.php/all-fbtegp/all-fbtegp-2022/paper/view/16128 | |
dc.subject | authentication | en |
dc.subject | automated systems | en |
dc.subject | security | en |
dc.subject | information technology | en |
dc.title | Analysis and implementation of user authentication means | en |
dc.type | Thesis | |
dc.identifier.udc | 519.87 | |
dc.relation.references | On the Basic Principles of Cyber Security of Ukraine: Law of Ukraine of June 21, 2018 № 2469-VIII
URL: https://zakon.rada.gov.ua / laws / show / 2163-19 (access date: 20.02.2021) . | en |
dc.relation.references | Applying Cyber Kill Chain® Methodology to Network Defense: GAINING THE ADVANTAGE
Lockheed Martin. Access mode: https: // www. lockheedmartin.com/content/dam/lockheedmartin/rms/documents/cyber/Gaining_the _Advantage_Cyber_Kill_Chain.pdf. | en |
dc.relation.references | Nosenko KM, Pivtorak OI, Likhouzova TA Review of attack detection systems in network traffic:
Interdepartmental scientific and technical collection "Adaptive automatic control systems", 2014. 67-75p. | en |
dc.relation.references | Arsenyuk IR Application of fuzzy logic to assess the quality of graphic raster images./ IR Arsenyuk, OV
Silagin, SO Kukunin // Proceedings of the IX International scientific-practical conference "Internet-EducationScience ”(ION-2014). - Vinnytsia: UNIVERSUM-Vinnytsia, 2014. - P. 223 – 225 | en |