Abstract

In modern conditions, the amount of information is constantly increasing, and at the same time, the speed of doing business is increasing. According to Gartner Group estimates, the global average amount of user data per company is 120 terabytes. In turn, according to IDC calculations, last year 35 billion messages were sent in one hour in the world. If these numbers are taken into account, it turns out that one message accounts for approximately 3.4 Mв of information. To be successful, companies not only have to operate with large volumes of data, but also process it quickly and efficiently. At the same time, according to the opinion of the world's leading experts, there are about 40 key macrotechnologies in the world today that determine the level of the economy. These processes were significantly influenced by the specifics of the formation, constant development and transformation of cyberspace. In these areas, breakthrough achievements are predicted, first of all, in artificial intelligence, cloud technologies, internet of things, productivity and nature of computing devices, possibilities of storage, processing and transmission of large arrays of data and information (Big Data), means and technologies for their implementation on radically new principles. The capabilities and vulnerabilities of almost all modern infocommunication and cybernetic systems increasingly depend, in addition, on the growth of the interrelationships of various information systems and control systems among themselves in multiparametric, multidimensional cyberspace and their informational and cybernetic interpenetration, interaction and interdependence, etc. Therefore, taking into account the above, it is necessary to focus primarily on the creation of permanently functioning data processing centers (data centers), and under the conditions of our state's opposition to the aggressor country, to develop appropriate data processing and storage systems on mobile platforms. Another, quite significant and meaningful component is taking into account the modern structures of information protection and cyber security systems, which involve the use of a fairly powerful line of tools, both at the technological and software levels, the use of extensive relevant architectures, protection methods aimed at prejudice, detection and response to potential cyber threats.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call