What is it about?
An analysis of the dangers arising from the use of electronic documents transmitted via communication systems has been carried out. In addition, it is shown how leaks of personal data of clients of various institutions can occur. The article describes how an electronic signature is used and its areas of application. The basic principles of ensuring information security using an electronic signature are given.
Featured Image
Photo by Markus Spiske on Unsplash
Why is it important?
Today, to protect your life, it is not enough to follow the usual rules of life safety. It is necessary to learn and follow additional security laws - informational or they can be called digital. The study aims to ensure the digital security of the population.
Perspectives
It is necessary to carefully monitor what information resources we leave our personal data on.
Grigory Nesterenko
Omsk State Technical University
Read the Original
This page is a summary of: Modern digital principles of life safety, January 2025, American Institute of Physics,
DOI: 10.1063/5.0257412.
You can read the full text:
Resources
Features of saving personal data when using digital document management
The paper describes the process of assessing the vulnerabilities of software and network products and makes an assessment of their formation. Based on the research results, a classification of such vulnerabilities was carried out and three main areas of protection were identified.
Prospects, Advantages and Disadvantages of Electronic Signature
Nowadays, electronic record management is being introduced everywhere. In this regard, the use of electronic signature becomes very relevant and is of great efficiency. However, one should keep in mind that apart from the advantages of this digital technology, there are also some drawbacks that need to be addressed. The advantages of electronic signature are described, which consist in increasing document flow mobility. The disadvantages of electronic signature are analysed, which lie in the possibility of unauthorized access to it and its illegal use. The article gives recommendations on the practical use and protection of electronic signature when using it to work with documents.
Contributors
The following have contributed to this page







