{"title":"http://journals.dut.edu.ua/index.php/dataprotect/article/view/2604","authors":"D. M. Lisovyy, R. I. Draguntsov","doi":"10.31673/2409-7292.2021.044450","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.044450","url":null,"abstract":"The paper analyzes the problem of cybersecurity of the corporate information system and defines the purpose and objectives of managing the protection of endpoints of the corporate information system. The analysis of existing technologies of management of protection of endpoints of the corporate information system is carried out. Methods and means of endpoint protection management on the example of HCL BigFix are investigated. The purpose, main functions and composition of the HCL BigFix platform have been determined. On the basis of the researches carried out in the work the variant of technology of management of protection of end points of the corporate information system and recommendations concerning application of technology of management of their protection at the enterprise is developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities and prospects of using Open-Source intrusion detection technologies in the spheres of small and medium business of Ukraine","authors":"N. L. Veselkov, V. Marchenko","doi":"10.31673/2409-7292.2021.011925","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.011925","url":null,"abstract":"The use of intrusion detection methods, such as IDS and Honeypot, to protect the network infrastructures of small and medium-sized businesses in Ukraine is considered.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the effectiveness of cryptographic protection of information in a local area network of an information activity with the help of a user complex of CSC «ІІТ Користувач ЦСК-1»","authors":"V. Akhramovych, O. O. Sirenko","doi":"10.31673/2409-7292.2019.011620","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.011620","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126223311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Bayesian e-mail filtering to detect spam","authors":"M. V. Volkov","doi":"10.31673/2409-7292.2022.034854","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.034854","url":null,"abstract":"A study of the impact of spam messages and modern threats on the process of e-mail exchange in the corporate information system was conducted. The role of spam and its influence in corporate information systems has been studied. Peculiarities of countermeasures and technologies for e-mail protection against spam have been studied. On the basis of the research carried out in the work, a Bayesian classifier was developed for filtering e-mails of postal exchange in the corporate information system.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of traffic anomalies in the home Wi-Fi network using Waidps and Nzyme utilities","authors":"I. M. Lavrovsky","doi":"10.31673/2409-7292.2022.040004","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040004","url":null,"abstract":"The article examines Waidps and Nzyme utilities used for monitoring wireless networks. Some basic WLAN terms were described with possible attacks on WLANs in general and how dangerous they are. It has been studied how each of the utilities works: its capabilities, disadvantages and the order of application.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model of predicting insider threat in the organization","authors":"S. Zaikin, O. Kitura","doi":"10.31673/2409-7292.2021.013034","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.013034","url":null,"abstract":"The article considers the concepts of \"insider threat\" and \"insider\". General methods of using insider threats by cybercriminals to compromise the network environment of the organization to gain access to valuable assets are identified. The types of insider threats and their criticality for organizations to deal with these threats to reduce risk are studied. It is concluded that no approach can solve the security problem. In order to mitigate the insider threat, further research is needed on cybersecurity insider threats, and the right approach to combating a malicious insider threat from different perspectives should be identified. It is noted that organizations can implement some basic measures that can reduce the number of cases of insider threats to a minimum.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Технологія виявлення поліморфних комп’ютерних вірусів","authors":"O. O. Agachi","doi":"10.31673/2409-7292.2023.010007","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010007","url":null,"abstract":"Traditional viruses were computer programs with a static structure that had very limited functionality. After the first detection, their structure is used by the antivirus program (AVP) as a tool to detect similar viruses with similar patterns. However, modern viruses can configure themselves and even change the structure of their functionality, which makes it difficult for antivirus software to detect them. A polymorphic virus is a complex computer virus that affects data types and functions, making it difficult to inspect its internal structure. The article reviews the general methods used by these viruses to demonstrate polymorphism; modern level of detection of polymorphic viruses; antivirus software to detect such viruses. The results of this study can be a source of knowledge for researchers and antivirus software companies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security monitoring and management based on the use of IBM QRadar SIEM system","authors":"A. Gunder","doi":"10.31673/2409-7292.2022.020614","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.020614","url":null,"abstract":"The article clarifies general information about security monitoring and management (SIEM) systems; researched SIEM as a tool to achieve compliance with regulatory security requirements; studied the functionality of IBM QRadar as a typical SIEM sample.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131326693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of single-position determination of coordinates of radio emitting means","authors":"V. S. Yegorov","doi":"10.31673/2409-7292.2020.042327","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.042327","url":null,"abstract":"Currently, the task of locating radio sources with complex types of modulation, wide bandwidth and low power is becoming increasingly important. The need to create radio monitoring systems and location of radio sources arises in both military (border control, local conflict zones) and civilian consumers (monitoring of navigation on international transport corridors and in special economic zones, search for sources of interference in telecommunication systems, detection of non-communication systems). in communication systems).","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Patch management and software updates based on the HCL Bigfix Patch solution","authors":"F. K. Skryabin, V. Vyshnivskyi","doi":"10.31673/2409-7292.2021.040613","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.040613","url":null,"abstract":"The methods and means of managing software updates and patches on the example of HCL BigFix Patch solution are investigated in the work. The purpose, main functions and composition of the HCL BigFix Patch software package have been determined. Based on the research conducted in the work, a variant of the software update and patch management technology was developed on the example of the HCL BigFix Patch solution. Recommendations for the application of corporate information system software update and patch management technology have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}