паралельне тестування

Methods and techniques for the information and analytical systems of data protection and conversion assessment

The goal of the research is to create an algorithm for analyzing vulnerabilities discovered and to enhance the data protection technique based on system penetration testing as a means of evaluating data security. The primary responsibility is to modify established security assessment techniques to fit the evolving technical landscape, namely cloud technologies and security system requirements. The issue of data protection evaluation of electronic documents is discussed in the article, and specifically, an A/B test was conducted.

The synthesis method for specifications and requirements in the process of it project reengineering

In this study, the aim is to create and improve a methodology for synthesizing requirements and specifications for the re-engineering of IT projects with maximum efficiency and business orientation. The main task is to adapt outdated IT systems to the changing technical environment, in particular to cloud technologies and security system requirements. To achieve these goals, the proposed methodology uses the analysis of archaic systems, the reverse engineering method, expert surveys, documentation analysis, and black-box modeling.