This article reveals the problem of insecurity of systems based on the technology of «Smart home». There is given the analysis and risk assessment, developed recommendations for improving the security of smart homes. Compliance with these guidelines will significantly increase the level of security systems based on the technology of "smart house" that will solve the problem partially vulnerability of this type of system, which at the moment is quite acute.
This article describes the ways in which can be achieved integrity of information transmitted over fiber optic cables, ranging from monitoring for cable and ending with the advantages of single-mode fiber, as well as disassembled encryption methods for the transmission in fiber-optic lines and the latest developments in this area.
The article describes the basic methods of biometric identification. Built on its basis the access restriction system can control access to information and repositories in banks, it can be used at the enterprises involved in the processing of valuable information, to protect the means of communication, etc. Also describes the advantages and disadvantages of each method.
This article brings to light features of modern system smart home. The author describes interconnection with private security firms. This work illustrates vulnerabilities smart home and methods for ensuring the confidentiality and integrity of transmitted data. The result of the research is software and hardware system that implements the model of mutual authentication.
The proposed material is presented to the reader prospect of a new book about the formation of Soviet law enforcement system in Udmurtia in the 1917–1921 years. The attention is given to the justification of the structure, relevance, range of historical sources.