Search results
-
V.1(21), 2015
80-89The article is devoted to checking the validity of the hypothesis that the information on a user's computer system, obtained on the basis of covert monitoring of standard peripherals allow timely recognize disloyal behavior and prevent the realization of the internal threats to information security, which is important for the information systems of rail transport.