Studying various Islamic groups, their activities and methods of propaganda work, external and internal orientation, come to the conclusion that they affect human consciousness. Particular impact such work has on a believer. In this regard, it should be said that all known to us in the East, terrorist organizations have vivid religious orientation. And this despite the attempt of Western countries headed by USA to give them some "secular" sound . However, these organizations did not hide its religious nature. This work is separately dedicated to the most influential, massive and rich world of the terrorist group – Islamic state of Iraq and the Levant (hereafter ISIL). The organization skillfully and effectively apply the methods and techniques of propaganda, drawing into its ranks all new and new adherents.
14-11-2017 admin 7242 0
Проект: Revolution of the XXI century: nonviolent methods
In the result of the obsolescence of earlier methods of cheating companies, the West is now experiencing a crisis that may end in a revolution, a major war or the advent of the "strong hand", says assistant to the President in an article for RT.
07-11-2017 admin 1608 0
The international telecommunication Union (ITU) has presented the Global Cybersecurity Index (GCI) 2017 Wednesday, June 5. This was a continuation of the first version, which the organization launched in 2014. A report on the commitment of the member States of the ITU cybersecurity, hoping to force them to improve their cybersecurity and to increase the awareness for the need to run bilateral, multilateral and international cooperation.
09-10-2017 admin 1529 0
In the XXI century the spread and impact of cyberspace in the world was so great that it began to pre-empt the state policy of many countries. The technological boom has brought a rapid growth in the number of cyber attacks. In the literature includes such concepts as cyber security, cyber terrorism, the penalties for kiberprestupniki.
09-10-2017 admin 2396 0
In the light of new hacking and virus attacks, which in 2017 was targeted not only to corporations but also to public institutions, including schools and hospitals, and private users the issue of information security became extremely resonant. Available about the current issues of it security and the impact of virtualization on the protection of information systems you will learn under the cut.
06-10-2017 admin 1209 0
Russian hackers has become a brand of our time. Judging from the headlines around the world, crafty burglars almost omnipotent and able to at least pull out the light the ins and outs of the world anti-doping Agency, though, to sit in the White house Donald trump. While not hear hysteria about hackers from other countries. Meanwhile, just a few years ago hackers waged a successful sabotage at a nuclear facility.
01-10-2017 admin 2048 0
The monograph is the result of the author's works on synthesis of research in the fields of electronic warfare and information warfare in terms of what happened in the beginning of XXI century information technology revolution and the introduction of troops of the concept of network-centric warfare. In the monograph the analysis of the concept of network-centric warfare, identified the fundamental relationship of this concept with the increasing role of exposure to information circulating in the systems of control of troops and weapons. The analysis of electronic warfare, information warfare, technical and psychological fields, as well as methods of their use in modern network-centric warfare. The examples of the wars of the early XXI century, which were conducted in accordance with the network-centric concept, the contribution of electronic warfare and information warfare in the technical and psychological dimensions to achieve the military and information superiority. The basic tendencies of development of electronic warfare, as well as means and methods of information confrontation in the technical and psychological dimensions.
26-09-2017 admin 3278 0
This year the company ServiceNow has introduced a cloud-based platform Trusted Security Circles. It helps to combat cyber-threats by sharing information among companies and professionals in the field of security.
15-09-2017 admin 2143 0
In recent days, in business Newspapers and news agencies published articles about the problems of large banks. What happens in the financial system?
18-08-2017 admin 1398 0
This was expected, since the moment when scientists learned howto upload digital information inside macromolecules of deoxyribonucleic acid. For the first time, researchers were able to infect the virus the computer, analyze the DNA, which had made the malicious code. It seems that all of us are waiting for a fascinating biankouma future where you can hack everything, including primary storage of genetic information of any biological organism.
15-08-2017 admin 1637 0