Answer the question
In order to leave comments, you need to log in
What is a "complex of identification analysis"?
Hello.
I will not describe what was the reason, but I was abruptly changed the already approved topic of the diploma to a topic that was completely incomprehensible to me (due to duplication of the topic). I spent a lot of time arguing with the department and the dean's office, but in the end I only made things worse for myself. I decided to put up with it and now sat down to write a thesis on the topic approved for me. The subject is called: "Development of a complex of the identification analysis of the protected geoinformation system".
I study information security, but I absolutely do not understand what "identification analysis" is - as I understand it, this does not apply to identification tools from the point of view of information security, for example, a user in the AS, but, on the contrary, analysis of geodata identification directly.
In this regard, two questions have arisen - 1) what is an identification analysis complex and do I interpret this concept correctly 2) If I interpret it correctly, how does it relate to information security in general?
Answer the question
In order to leave comments, you need to log in
On the topic, I can only give an example:
A person who is in another country 3000 km from me, and sitting in VK, asked me to enter his VK. The system asked me for a captcha and a confirmation code. After he sent me the code, I entered his VK.
When I entered my VK from a laptop, sitting in it from a smartphone, no captcha or code was required - I stupidly entered using my login and password.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question