{"title":"Network threat detection technology using Zabbix software","authors":"I. V. Bilobrovets","doi":"10.31673/2409-7292.2023.020003","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020003","url":null,"abstract":"The article analyzes the problem of ensuring the company's information security and the need to use monitoring systems. Modern existing monitoring systems and the principle of threat detection are analyzed. It has been proven that it is important to use Zabbix software to detect threats and improve information security. The purpose, characteristics and main capabilities of Zabbix are defined. Examples of application of software for detecting attacks are given. Based on the research carried out in the article, a threat detection technology using Zabbix and a plug-in for it has been developed. The effectiveness of the application of the developed technology for detecting threats is shown.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static analysis of software source code based on the Fortify Static Code Analyzer solution","authors":"N. V. Goryuk, I. M. Lavrovsky","doi":"10.31673/2409-7292.2021.020910","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.020910","url":null,"abstract":"The article analyzes the problem of identifying source code vulnerabilities in the context of software development. An analysis of existing technologies for detecting vulnerabilities in the source code. Methods and means of protection of detection of source code vulnerabilities on the basis of the Fortify Static Code Analyzer solution are investigated. The purpose, main functions and architecture of the Fortify Static Code Analyzer solution are defined. Based on the research conducted in the work, a variant of the process of static analysis of the security of the source code in the context of the software life cycle was developed. Recommendations for the use of static source security analysis technology have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The technology for ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2022.040006","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040006","url":null,"abstract":"The article analyzes the methods and means of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution. The purpose, main functions and composition of the Cisco Cloudlock software complex are considered. Thanks to modern algorithms, it becomes possible to recognize behavioral anomalies at the beginning and warn of a possible cyber attack.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Intelligence technology and methods of its use to protect the company from cyber threats","authors":"O. O. Dorokhin, V. Marchenko, I. D. Semenova","doi":"10.31673/2409-7292.2021.031216","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.031216","url":null,"abstract":"The article is devoted to the methods of using Threat Intelligence technology (\"threat intelligence\" or \"cyber intelligence\" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of cloud infrastructure from cyber attacks","authors":"D. V. Yanovsʹkyy","doi":"10.31673/2409-7292.2022.025259","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.025259","url":null,"abstract":"The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring cybersecurity of enterprise information system endpoints based on Microsoft Defender Advanced Threat Protection","authors":"T. Koval, D. S. Smyrnov","doi":"10.31673/2409-7292.2021.033641","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.033641","url":null,"abstract":"The paper analyzes the problem of cybersecurity of the corporate information system and defines the purpose and objectives of cybersecurity of its endpoints. An analysis of existing technologies for cybersecurity endpoints of the corporate information system. Methods and means of providing cybersecurity of endpoints on the basis of Microsoft Defender Advanced Threat Protection are investigated. The purpose, main functions and composition of the Microsoft Defender Advanced Threat Protection platform are defined. Based on the research conducted in the work, a variant of the technology of cybersecurity of the endpoints of the corporate information system and recommendations for its application in the enterprise are proposed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for detecting network intrusions and signs of computer attacks based on an empirical approach","authors":"T. Y. Lukyanenko","doi":"10.31673/2409-7292.2022.021521","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.021521","url":null,"abstract":"The article analyzes the characteristics of detection of network intrusions into the information system and detection of signs of computer attacks at the enterprise; analysis of possible actions by attackers, methods and principles of establishing an optimal network intrusion detection system were investigated; considered the possibilities of developing and using systems for detecting network intrusions and detecting signs of computer attacks at the enterprise in modern conditions; researched and developed recommendations for the implementation of intrusion detection systems and detection of signs of computer attacks for possible further installation in the information protection system of any organization.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130411943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring the security of the PostgreSQL database management system","authors":"O. A. Bargylevych","doi":"10.31673/2409-7292.2022.032431","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.032431","url":null,"abstract":"This article analyzes the PostgreSQL database management system of a modern enterprise. The basic concept of the database, its types, subtypes and the progressive expansion of the database in the DBMS are also considered. The main settings for improving the security of the DBMS, which had possible ways of improving the security of both the physical and virtual environment, were analyzed. A practical example of obtaining access to the environment and directly to DBMS data with a basic configuration was also carried out, relevant conclusions and notes on possible solutions were made. Recommendations have been developed that should be applied to improve the state of security of the DBMS of a modern enterprise and to avoid cases of loss or distribution of confidential data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio monitoring of Wi-Fi frequency channels","authors":"V. Marchenko, L. P. Kryuchkova","doi":"10.31673/2409-7292.2019.023236","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.023236","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic Priorities of the Enterprise Information Security System, Attracts a Freelance Resource","authors":"Ye. M. Galakhov, O. Barabash","doi":"10.31673/2409-7292.2019.033035","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.033035","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}