security

Accounting and Analytical Problems of Cultural Heritage Security in Polish-ukrainian Cross-border Cooperation

The safety of cultural heritage in a cross-border dimension depends significantly on the influence of accounting and analytical factors, as they form the basis for the perception of its objects for their proper preservation and constant monitoring of the state and risks of irreversible changes. This issue is especially important in Polish-Ukrainian cross-border cooperation, where historical realities have led to the destruction and destruction of many cultural heritage sites.

Problems of privacy and security in cyber physical systems of intellectual houses

Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny.

Моделі якості послуг телекомунікаційних мереж

The quality of service models of telecommunication networks was considered. The features of providing of quality of service in the telephone and computer networks was explored. On the basis of this research it sets, that the metropolitan telephone networks are characterized by a higher accuracy, dependability and security by comparison to the computer local area networks. Substantial advantage of computer local area networks above the metropolitan telephone networks is providing a higher speed of the user information transfer, although defect there is an instability of this speed.

Non-alignment strategy: politics and theory (Research Article)

The complex study of the state non-alignment strategy is done. The theoretical and methodological basis of non-alignment strategy is analyzed, the problem of definition this phenomenon is investigated, the main aspects of neutrality strategy tendencies are clarified. The historical aspects of non-alignment policies are developed.

Method of Multiplexing of Timer Signal Structures Based on Ofdm Technology

The method of multiplexing of timer signal structures. based on OFDM technology was considered. This technology is used in many data transmission standards, both in wired channels — asymmetric digital subscriber line (ADSL), and in wireless networks — the standards of IEEE 802.11a and HiperLAN/2. OFDM is characterized by high spectral efficiency, resistance to radio frequency interference, low level of multi-path distortion.

Seismic system for monitoring and forecasting local earthquakes in the Dnepropetrovsk region

Summarizes the results of preliminary studies to ascertain the nature of earthquakes and seismic safety in the provision of technologically-risk areas Krivoy Rog iron ore and coal basins Pavlograd. The possibilities of highly sensitive seismic stations UK15, established in Dnepropetrovsk (n. Mirnij), check local and remote Kryvyi Rih and Pavlogradskij earthquakes.

Comparative Analysis of the European Security Strategy(2003) and Global Strategy of the European Unity (2016)

In this article, the authors carried out a comparative analysis of the European Security Strategy (2003) and Global Strategy of the European Union (2016) in order to track the evolution of perception of threats and challenges to the international system. This comparison answers a number of scientific questions. In particular: Are security risks in Europe, published in 2003, still relevant? Have the methods and means of combating difficulties changed for 13 years? Which methods were decisive? Is the EU’s security strategy, despite some cosmetic changes, still relevant?

Using Kali Linux and Metasploitable for Penetration Testing for Studying Purposes

This paper comprises information about penetration testing methodology, its methods and ways of implementation. The current free and open-source software has been analyzed. It has been done the example of penetration testing in academic field for studying purposes on the base of Kali Linux and Metasploitable2 Linux. This tests and techniques purpose proactive methods of defense and must help to improve security of computer systems and corporate networks.

Energy diplomacy as an important aspect of state's foreing policy: European experience for Ukrainians

The article considers a notion of energy diplomacy and peculiarities of its conduction, defines primary tasks for development of energy diplomacy in the foreign policy of Ukraine. With the help of historical, systemic, and structural functional methods, it is revealed that interstate collaboration in the form of energy diplomacy pursues the national interest of a state through applying a wide range of classical and specific foreign policy actions, and creates additional means of counteracting global contemporary challenges connected with the energy sector.