Modern information security最新文献

筛选
英文 中文
Network threat detection technology using Zabbix software 使用Zabbix软件的网络威胁检测技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020003
I. V. Bilobrovets
{"title":"Network threat detection technology using Zabbix software","authors":"I. V. Bilobrovets","doi":"10.31673/2409-7292.2023.020003","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020003","url":null,"abstract":"The article analyzes the problem of ensuring the company's information security and the need to use monitoring systems. Modern existing monitoring systems and the principle of threat detection are analyzed. It has been proven that it is important to use Zabbix software to detect threats and improve information security. The purpose, characteristics and main capabilities of Zabbix are defined. Examples of application of software for detecting attacks are given. Based on the research carried out in the article, a threat detection technology using Zabbix and a plug-in for it has been developed. The effectiveness of the application of the developed technology for detecting threats is shown.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static analysis of software source code based on the Fortify Static Code Analyzer solution 静态分析软件的源代码,基于Fortify静态代码分析器的解决方案
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.020910
N. V. Goryuk, I. M. Lavrovsky
{"title":"Static analysis of software source code based on the Fortify Static Code Analyzer solution","authors":"N. V. Goryuk, I. M. Lavrovsky","doi":"10.31673/2409-7292.2021.020910","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.020910","url":null,"abstract":"The article analyzes the problem of identifying source code vulnerabilities in the context of software development. An analysis of existing technologies for detecting vulnerabilities in the source code. Methods and means of protection of detection of source code vulnerabilities on the basis of the Fortify Static Code Analyzer solution are investigated. The purpose, main functions and architecture of the Fortify Static Code Analyzer solution are defined. Based on the research conducted in the work, a variant of the process of static analysis of the security of the source code in the context of the software life cycle was developed. Recommendations for the use of static source security analysis technology have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The technology for ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution 基于Cisco Cloudlock解决方案的云环境网络安全保障技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040006
A. H. Zakharzhevskyy
{"title":"The technology for ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2022.040006","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040006","url":null,"abstract":"The article analyzes the methods and means of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution. The purpose, main functions and composition of the Cisco Cloudlock software complex are considered. Thanks to modern algorithms, it becomes possible to recognize behavioral anomalies at the beginning and warn of a possible cyber attack.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Intelligence technology and methods of its use to protect the company from cyber threats 威胁情报技术及其用于保护公司免受网络威胁的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.031216
O. O. Dorokhin, V. Marchenko, I. D. Semenova
{"title":"Threat Intelligence technology and methods of its use to protect the company from cyber threats","authors":"O. O. Dorokhin, V. Marchenko, I. D. Semenova","doi":"10.31673/2409-7292.2021.031216","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.031216","url":null,"abstract":"The article is devoted to the methods of using Threat Intelligence technology (\"threat intelligence\" or \"cyber intelligence\" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of cloud infrastructure from cyber attacks 保护云基础设施免受网络攻击
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.025259
D. V. Yanovsʹkyy
{"title":"Protection of cloud infrastructure from cyber attacks","authors":"D. V. Yanovsʹkyy","doi":"10.31673/2409-7292.2022.025259","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.025259","url":null,"abstract":"The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring cybersecurity of enterprise information system endpoints based on Microsoft Defender Advanced Threat Protection 基于Microsoft Defender Advanced Threat Protection的企业信息系统端点网络安全保障
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.033641
T. Koval, D. S. Smyrnov
{"title":"Ensuring cybersecurity of enterprise information system endpoints based on Microsoft Defender Advanced Threat Protection","authors":"T. Koval, D. S. Smyrnov","doi":"10.31673/2409-7292.2021.033641","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.033641","url":null,"abstract":"The paper analyzes the problem of cybersecurity of the corporate information system and defines the purpose and objectives of cybersecurity of its endpoints. An analysis of existing technologies for cybersecurity endpoints of the corporate information system. Methods and means of providing cybersecurity of endpoints on the basis of Microsoft Defender Advanced Threat Protection are investigated. The purpose, main functions and composition of the Microsoft Defender Advanced Threat Protection platform are defined. Based on the research conducted in the work, a variant of the technology of cybersecurity of the endpoints of the corporate information system and recommendations for its application in the enterprise are proposed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for detecting network intrusions and signs of computer attacks based on an empirical approach 基于经验方法的检测网络入侵和计算机攻击迹象的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.021521
T. Y. Lukyanenko
{"title":"Methodology for detecting network intrusions and signs of computer attacks based on an empirical approach","authors":"T. Y. Lukyanenko","doi":"10.31673/2409-7292.2022.021521","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.021521","url":null,"abstract":"The article analyzes the characteristics of detection of network intrusions into the information system and detection of signs of computer attacks at the enterprise; analysis of possible actions by attackers, methods and principles of establishing an optimal network intrusion detection system were investigated; considered the possibilities of developing and using systems for detecting network intrusions and detecting signs of computer attacks at the enterprise in modern conditions; researched and developed recommendations for the implementation of intrusion detection systems and detection of signs of computer attacks for possible further installation in the information protection system of any organization.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130411943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring the security of the PostgreSQL database management system 确保PostgreSQL数据库管理系统的安全性
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.032431
O. A. Bargylevych
{"title":"Ensuring the security of the PostgreSQL database management system","authors":"O. A. Bargylevych","doi":"10.31673/2409-7292.2022.032431","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.032431","url":null,"abstract":"This article analyzes the PostgreSQL database management system of a modern enterprise. The basic concept of the database, its types, subtypes and the progressive expansion of the database in the DBMS are also considered. The main settings for improving the security of the DBMS, which had possible ways of improving the security of both the physical and virtual environment, were analyzed. A practical example of obtaining access to the environment and directly to DBMS data with a basic configuration was also carried out, relevant conclusions and notes on possible solutions were made. Recommendations have been developed that should be applied to improve the state of security of the DBMS of a modern enterprise and to avoid cases of loss or distribution of confidential data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio monitoring of Wi-Fi frequency channels Wi-Fi频率频道的无线电监测
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.023236
V. Marchenko, L. P. Kryuchkova
{"title":"Radio monitoring of Wi-Fi frequency channels","authors":"V. Marchenko, L. P. Kryuchkova","doi":"10.31673/2409-7292.2019.023236","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.023236","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic Priorities of the Enterprise Information Security System, Attracts a Freelance Resource 企业信息安全系统的战略重点,吸引自由职业者资源
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.033035
Ye. M. Galakhov, O. Barabash
{"title":"Strategic Priorities of the Enterprise Information Security System, Attracts a Freelance Resource","authors":"Ye. M. Galakhov, O. Barabash","doi":"10.31673/2409-7292.2019.033035","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.033035","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信