захист

Using CAPTCHA technology: pros and cons. Ways to secure from spam-bots attacks.

This paper is devoted to CAPTCHA technology. Algorithms of creation and work of captcha are described. The scheme of how captcha works is also included. The means of encoding and ‘complication’ of decoded text are described. The main ways of automatic captcha’s recognition are described. Also, it is given in examples options of CAPTCHA’s tests. The programing means that do not require user’s actions are considered. By the way, pros and cons of testing captcha are analyzed. In addition, the main problems that may occur during developing captcha are analyzed.

The Protection of Wooden Constructing Materials and Structural Elements of Buildings Against Biological Damage

The methods of wooden building materials protection from biological damage were analysed. Constant technical monitoring is the main preventive measure against damage of structural elements of the wooden buildings. The most effective methods from biological damage are chemical treatment, capillary infiltration, diffusion treatment and impregnation under pressure.

Data Protection With Intellectual Support of Organizational and Technical and Operational Management

For the successful use of modern information technologies, it is necessary to effectively manage not only the network, but also information systems security (ISS), the information system on the level of the system must operate autonomously implementing the management structure of information security events, planning the composition of modular ISS and audit.

Системна, нормативна, комплексна моделі захисту інформаційних технологій

Розроблено системну, нормативну, комплексну моделі захисту інформаційних технологій на основі концепції об’єкт – загроза – захист – управління.