Ukrainian and Foreign Science: Yesterday, Today, Tomorrow
Total Page:16
File Type:pdf, Size:1020Kb
MINISTRY OF EDUCATION AND SCIENCE OF UKRAINE THE NATIONAL TECHNICAL UNIVERSITY OF UKRAINE "IGOR SIKORSKY KYIV POLYTECHNIC INSTITUTE" FACULTY OF LINGUISTICS IX INTERNATIONAL STUDENTS’ RESEARCH AND DEVELOPMENT CONFERENCE Ukrainian and Foreign Science: Yesterday, Today, Tomorrow CONFERENCE PROCEEDINGS December 2, 2020 Kyiv, Ukraine UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW ENGINEERING SCIENCES THE USE OF INFORMATION TECHNOLOGIES CUSTODIANS Egor Morskyi Politechnika Rzeszowska im. Ignacego Łukasiewicza, Poland The on-line processing of information from a remote terminal is needed due to the increasing multiplicity of information systems and growing requirements for the speed of information processing. A general requirement for all remote access technologies is the protection of information from unauthorized access (2020). The largest custodians in the world are developing their remote access systems, with the help of which the client can initiate an order from his computer. The experts are seriously interested in the problem solving of the stock information system integrating with banking and accounting systems. So, they do not ignore the issues of data protection, access, and maintaining their integrity. These tasks require new approaches and make scientists pay attention to modern solutions that are already available on the information technology market. The basis of the modern approach to building an information system is the "client-server" technology. One of the most important conditions for the development of a civilized securities market in Poland is the creation of information systems that allow paperless office (storage and circulation of documents in electronic form). Due to the fact that the secondary securities market in the country has been underdeveloped, special attention of the developers is drawn to the constantly increasing demand for systems operating with securities of private enterprises, the main of which is the depository system. It is the development of electronic depository systems that can have a significant impact on the widespread transition to electronic technologies in the securities market, an increase in their turnover and, as a result, to the formation of a network of participants with remote access, which, taking into account the size of the country. The introduction of new information technologies should contribute to solving the problem of improving the information support of custodians. The most knowledge-intensive and objectively necessary elements of such new information technologies are methods of simulation and forecasting depository activities. One of the topical directions for improving custodians’ activities is the use of the mathematical apparatus. It implies the need for research in this area and, first of all, a critical assessment of approaches and mathematical apparatus, the choice of a class of mathematical models and methods, the use of which is advisable for considering the subject area. Engineering Sciences 3 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW To sum up, only the correct choice of technology for creating a system allows experts to extend its life cycle, carrying out continuous development and expansion without radical alteration of the main basic components of the system. References: 1. Joshi, M. P. (2020). Custodians of Rationality: Data Science Professionals and the Process of Information Production in Organizations, AMCIS 2020, Proceedings. https://aisel.aisnet.org/amcis2020/org_transformation_is/org_transformation_is/1 BITCOIN REASONS FOR ITS GROWTH AND A BRIEF HISTORY Danylo Antolyk Faculty of Informatics and Computer Science National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Bitcoin, created in January 2009 after the housing market crash, is a cryptocurrency. The creator is an anonymous user under the pseudonym Satoshi Nakamoto. His identity is a mystery. It is run by a decentralized body, so it is not the official currency. (Jake Frankenfield 2020) Also, Bitcoin is not physical, it is absolutely virtual cash. We use it wherever they are supported. For example: from 2018 in Kyiv on the Bessarabian market it is possible to buy food for bitcoins. But in some eastern countries, they are completely prohibited. Basically, bitcoin is a computer file that is entered in an application on a PC or smartphone. Folk can easily exchange bitcoins for each other and all deals are listed in a publicly available catalog designating a blockchain. This allows you to track Bitcoins history so that people do not spend coins that do not belong to them, copy or cancel transactions. (BBC 2018) People can receive bitcoins in three ways: from other people, by selling certain things, or by creating them with a PC. For this system to work, people have to make persistent transactions on their PC. Computers are capable of calculating surprisingly complex amounts. Sometimes their owners receive bitcoins as a reward. For it, you need a more powerful computer. It is - mining. However, now it's getting harder and harder to end creating too many Bitcoins. At the moment it is almost useless to start mining because you can spend more on electric power than you earn This system is highly commendable, because you can exchange not a physical object for real things, but even for real money. People like it because it is not guided by the state. It is used by both ordinary lovers of anonymity and criminals. This is safe since every deal is open. This means that it is hard to duplicate bitcoins, create unreal ones, or use some you don't have. All risks are: you can lose access to your "storage", accidentally remove it, or someone can steal it from an untrusted website which one allows you to keep your currency. (BBC 2018) Engineering Sciences 4 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW Throughout history, Bitcoin has managed to rise, fall, and rise again. The first take-off - new technologies, limited edition, potential digital currency. The collapse is the refusal of the digital community to accept it due to the rules of using fiat currencies, competition in the form of huge financial investments, and their unwillingness to support the transition, which led to a drop in demand. The second take-off is the transfer of almost most of the same financial assets to their blockchain platform (which has led to a reputation for being a secure system), increased use of the network in connection with the coronavirus, and an increase in the number of electronic payments. To conclude, cryptocurrencies are not a solution for everyone. It has its pros and cons, and the defect of entry is extremely low. So, making the decision to switch to cryptocurrency is not easy. However, it is definitely a very interesting currency to look out for. References: 1. Jake Frankenfield (2020). Guide to Bitcoin. Retrieved from https://www.investopedia.com/terms/b/bitcoin.asp 2. BBC (2018). Guide: What is Bitcoin and how does Bitcoin work? Retrieved from https://www.bbc.co.uk/newsround/25622442 CYBER CRIMES Kateryna Artemenko Faculty of Informatics and Computer Science National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Cybercrimes are claimed to be a great threat to our society, personal confidentially, and capitalism, on its own. Offenses such as hacking or identity theft are becoming more and more common. It is unarguable that an enormous part of humanity has experienced some sorts of cyber attacks, for example in 2019 over 60% of businesses, worldwide, experienced phishing and social engineering attacks, 70% of which were actually small businesses. The goal is obvious — to take over some kind of confidential data (Vuleta, 2020). Needless to say, almost half of all property crimes are done via the Internet (The Guardian, 2019), where it is harder to defend yourself from violations. The question is: “are we doing enough to secure ourselves and data online?” First and foremost, cybersecurity departments are lacking employees, right now there are 300,000 unfilled jobs and the number will continue to increase, it is supposed that by 2021 this number will be up to 3.5 million (InfoSec Newsflash, 2019). Whilst everyone doing their work online, owning to quarantine, the cybersecurity specialist will be one of the most wanted positions. We cannot but mention that despite security online is highly important, there will be a lack of finances, to further support my argument the President of the United States in 2019 allocated 15 billion on cyber security needs (The White House, 2018, Engineering Sciences 5 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW p 1), but it is still the bare minimum since the cases of cyber-attacks won’t be leaning back. The current COVID-19 crisis and the need for investments in medicine will not let any government the opportunity to spend this much on cybersecurity. All things considered, the problem of the Internet not being a “safe place” for anyone, it is terrifying to see that even a teenager could wreck up the justice system of the whole country (Daniel Kelley’s case) (BBC, 2019), so you have to be aware of risks not just as an everyday user, but as businessmen or a public figure. Therefore, we should attract investments to the cybersecurity companies or maybe to become this type if specialist. It is up to you to decide, but do not take too long, the criminals are still on their way. References: 1. Vuleta, B. (2020, February 13). 39 Worrying Cyber Crime Statistics [Updated for 2020]. Retrieved from https://legaljobsite.net/cyber-crime-statistics. 2. The Guardian. (2020). International edition. Editorial. (2019, June 3). The Guardian view on cybercrime: the law must be enforced. Retrieved from https://www.theguardian.com/commentisfree/2019/jun/03/the-guardian-view-on- cybercrime-the-law-must-be-enforced. 3. Newsflash, I. (2019, March 21). Cyber Security Statistics for 2019. Cyber Defense Magazine, Retrieved from https://www.cyberdefensemagazine.com/cyber-security- statistics-for-2019/. 4. The White House. (2018). Federal Budget Authority. Cybersecurity Funding (pp.