Downloads provided by UsageCounts
{"references": ["1.\tIT Governance Institute: Guidance for Boards of Directors and Executive Management. 3rd Edition, 2000, www.ITgovernance.org and www.isaca.org accesat 18.02.2022", "2.\tLegea Republicii Moldova privind accesul la informa\u0163ie, Nr. 982, din 11 mai 2000. \u00cen: Monitorul Oficial al Republicii Moldova nr.88-90 din 25.07.2000.", "3.\tManagementul Riscurilor - risks are everywhere. http://www.managementul-riscurilor.ro/ Accesat 18.09.2022", "4.\tMihai I. Securitatea informa\u021biilor. Editura Sitech, 2012, 317 p.", "5.\tMcAfee.Protecting Critical Infrastructure. https://www.mcafee.com/enterprise/enus/about/public-policy/critical-infrastructure.html Accesat 28.09.2022", "6.\tRusnac A. Aspecte ale teoriei securit\u0103\u0163ii, Chi\u015fin\u0103u, 2005, 216 p.", "7.\tStanciu V., Tinca A. Securitatea informa\u021biei. Principii \u0219i bune practici. Edi\u021bia a doua, 2015", "8.\tStandardul de securitate ISO/IEC 27002. https://standardizare.wordpress.com Accesat 12.10.2022", "9.\tSR/ISO 27002 Tehnologia informa\u021biei. Tehnici de securitate. Cod de bun\u0103 practic\u0103 pentru managementul securit\u0103\u021bii informa\u021biei. Camera de Comer\u021b, Industrie \u0219i Agricultur\u0103 Timi\u0219. https://www.cciat.ro/cciat_ASRO_-_CZI_Timi%C8%99_(standarde), accesat 12.10.2022", "10.\tSR EN ISO/IEC 27001:2018. https://standardizare.wordpress.com/2018/04/13/, accesat 14.09.2022", "11.\tStrategia securit\u0103\u021bii informa\u021bionale a Republicii Moldova pentru anii 2019\u20132024. \u00cen: Monitorul Oficial Nr. 13-21 art. 80 din 18-01-2019", "12.\thttps://www.securitatea-retelelor.ro/sisteme-de-tip-ids-ips. Accesat 23.10.2022", "13.\thttps://ibn.idsi.md/sites/default/files/imag_file/410-413_1.pdf Accesat 23.10.2022"]}
Increasing the dependence of contemporary society on the globalization of information systems and communication infrastructures leads to increasing the vulnerability of the person, society and the state to the more and more acute threats in the informational-technological and informational-media domains. In the informational age, cyber space is a comfortable platform for the preparation and execution of cybercrime, cyber-terrorism acts and other actions that directly or indirectly affect national state security. Violation of the security of the information systems of public authorities and other institutions may compromise the confidentiality and integrity of this information and, as a result, cause financial or material damage, including damage to state security.
information system, Security, cyber space, security, informational potential
information system, Security, cyber space, security, informational potential
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 6 |

Views provided by UsageCounts
Downloads provided by UsageCounts