Degree
|
Master of Psychology, Associate Professor, Senior Corporate Coach at InfoWatch JSC, Associate Professor: HSE Tikhonov Moscow Institute of Electronics and Mathematics (MIEM HSE) / Joint Department with InfoWatch |
---|---|
E-mail
|
Denisov@infowatch.com |
Location
|
Moscow |
Articles
|
The outlook for doud computingCloud computing features and development directions are considered. The underlying concept means that data are stored on and handled by Internet provider server as opposed to user computer. The issues of payment facilities and variety of services proposed, software and hardware implementation tools, service accessibility, security and compatibility with existing applications as well as the main approaches for the technology standards elaboration are discussed Read more...Automation of education quality management in institutions of higher educationImplementation of quality management standards in institutions of higher education concern computerbased systems. Transition from quality management system to quality management system of education defines necessity of essential improvement software. This article concerns such questions as primary approaches of education quality management, realization and automation all appropriate management functions. Read more...SAAS solutions of IT industry leadersSAAS solutions, provided by IT leaders cover following segments: communications, document processing, security, business management, analytics, record keeping, CRM, HRM, ERP, HelpDesk. Overview of Google APPS, IBM LotusLive Engage, Micro¬soft Office Live Workspace and Microsoft Dynamics CRM 4.0 allows to define opportunities, advantag¬es and disadvantages, as well as original solutions, used in appropriate cloud services. Practical aspects of SAAS using, implementing and supporting are considered at SoftLine company example. Read more...Security in the Internet: protection against external threatsToday using of the Internet involves various external threats, pose a risk to the finance, life, health
and mental status of users. Active «criminalization» of Internet space, as well as the rapid growth in
the number of users of children’s and youthful age led to the emergence of new threats requiring adequate
means of protection to which consideration of this article. Special attention is given to threats
such as ransomware, require payment to unlock the computer or decrypt files on your hard drive; fraud
using social network and e-mail, trolling and cyberbullying, i. e. aggressive actions of users with the
purpose of causing the victim moral damages; sexting and grooming, i. e. communicating with minors
on the topics of sex and dating for the purpose of sexual exploitation or blackmail. The main remedies
are: compliance with caution when communicating and posting any material on the network; a set of
software tools (backup, data encryption, antivirus protection, parental control, content filtering and
so forth); reference to the administration of resources and in law enforcement. In connection with the
ongoing trend of integration of social networks and cloud services are offered additional protection
measures such as the tightening of registration rules and content filtering in social networks and monitoring
Internet activity of users under the age of 14 years.
Read more...
Application of the competence model in teaching safe behavior on the InternetThe rapid development of the Internet, the emergence of new services related to the placement and
processing of data on the Internet necessitates the implementation of educational programs aimed at
training data protection and personal security on the Internet. Therefore, this article provides an analysis
of methods for assessing the level of safe behavior on the Internet, including Microsoft Computing
Safety Index, Networked Readiness Index and a number of others. The author substantiates the choice
and carries out the practical implementation of the original methodology developed by the Internet
development Fund and the Faculty of psychology of Lomonosov Moscow State University, which allows
to evaluate the four components of digital competence: knowledge, skills, motivation and responsibility
in relation to the four spheres of activity on the Internet: content processing, communication,
consumption, technosphere. According to the results of the study, an educational program is developed
that takes into account the identified features of digital competence of students, namely the
need to improve competence in the components of «Communication» and «Consumption», the need
to increase motivation for learning and responsibility for their actions. The implementation of the educational
program is based on the method of intensive training, focused on the formulation of students
rules of safe behavior on the Internet in relation to all areas under consideration, followed by
the consolidation of the knowledge gained in the development of relevant cases and practical tasks.
Read more...
Opportunities and prospects for the development of parental control applications as a means of ensuring the safety of children and adolescents on the InternetIn modern conditions of blurring the boundaries between the virtual and the real world, as well as
the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly
important. This is especially true for children and adolescents who are at high risk because
of their young age, lack of skills in safe behavior on the Internet, and lack of understanding of what
moral and/or physical harm this or that information can cause. Therefore, parental control applications
that extend and complement the capabilities of information security tools on the user's devices
are in increasing demand. Basically, such applications provide: monitoring and limiting time of operation of the device, monitoring and restricting access to sites (by age restrictions, by type of sites, by
forbidden words, black or white lists) and applications on the device, tracking the user's movements
(for mobile devices), monitoring online, generation of various reports and statistics on the use of the
device and Internet resources, remote control of the device. The article provides a comparative analysis
of such applications, discusses the functional features of some of them, provides recommendations
for the selection of parental control applications based on user requests, as well as determines
the prospects for their development.
Read more...
Main drivers and trends of DLP systems development in the Russian FederationThe rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the Russian Federation. To do this, we analyze statistics on information leaks, explore the prospects for implementing new features of DLP systems based on modern information technologies (BigData, IOT, artificial intelligence and machine learning), and consider ways and means of integrating DLP within complex information security systems (SSI) in accordance with the requirements of the main regulatory and methodological documents of the Russian Federation in the fi of information security. To solve these problems, methods of analysis, synthesis, system analysis, formalization, comparison and analogy are used. Import substitution, digitalization of the economy, ensuring the security of critical information infrastructure, as well as the need to control automated systems, communications and users in distributed work in the context of a pandemic that has caused requirements to restrict personal contacts are considered as the main drivers of development for both information security and information technologies. As a result of the analysis, the most priority areas for the development of automated systems for monitoring information flows were identified: analytics, data visualization, system integration, behavioral analysis of threats to information security. Read more... |