Modern information security最新文献

筛选
英文 中文
http://journals.dut.edu.ua/index.php/dataprotect/article/view/2604 http://journals.dut.edu.ua/index.php/dataprotect/article/view/2604
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.044450
D. M. Lisovyy, R. I. Draguntsov
{"title":"http://journals.dut.edu.ua/index.php/dataprotect/article/view/2604","authors":"D. M. Lisovyy, R. I. Draguntsov","doi":"10.31673/2409-7292.2021.044450","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.044450","url":null,"abstract":"The paper analyzes the problem of cybersecurity of the corporate information system and defines the purpose and objectives of managing the protection of endpoints of the corporate information system. The analysis of existing technologies of management of protection of endpoints of the corporate information system is carried out. Methods and means of endpoint protection management on the example of HCL BigFix are investigated. The purpose, main functions and composition of the HCL BigFix platform have been determined. On the basis of the researches carried out in the work the variant of technology of management of protection of end points of the corporate information system and recommendations concerning application of technology of management of their protection at the enterprise is developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunities and prospects of using Open-Source intrusion detection technologies in the spheres of small and medium business of Ukraine 在乌克兰中小企业领域使用开源入侵检测技术的机会和前景
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.011925
N. L. Veselkov, V. Marchenko
{"title":"Opportunities and prospects of using Open-Source intrusion detection technologies in the spheres of small and medium business of Ukraine","authors":"N. L. Veselkov, V. Marchenko","doi":"10.31673/2409-7292.2021.011925","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.011925","url":null,"abstract":"The use of intrusion detection methods, such as IDS and Honeypot, to protect the network infrastructures of small and medium-sized businesses in Ukraine is considered.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the effectiveness of cryptographic protection of information in a local area network of an information activity with the help of a user complex of CSC «ІІТ Користувач ЦСК-1» 在CSC«ІІТ Користувач ЦСК-1»用户综合体的帮助下,提高信息活动局域网络中信息加密保护的有效性
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.011620
V. Akhramovych, O. O. Sirenko
{"title":"Improving the effectiveness of cryptographic protection of information in a local area network of an information activity with the help of a user complex of CSC «ІІТ Користувач ЦСК-1»","authors":"V. Akhramovych, O. O. Sirenko","doi":"10.31673/2409-7292.2019.011620","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.011620","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126223311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Bayesian e-mail filtering to detect spam 贝叶斯邮件过滤在垃圾邮件检测中的应用
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.034854
M. V. Volkov
{"title":"Application of Bayesian e-mail filtering to detect spam","authors":"M. V. Volkov","doi":"10.31673/2409-7292.2022.034854","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.034854","url":null,"abstract":"A study of the impact of spam messages and modern threats on the process of e-mail exchange in the corporate information system was conducted. The role of spam and its influence in corporate information systems has been studied. Peculiarities of countermeasures and technologies for e-mail protection against spam have been studied. On the basis of the research carried out in the work, a Bayesian classifier was developed for filtering e-mails of postal exchange in the corporate information system.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of traffic anomalies in the home Wi-Fi network using Waidps and Nzyme utilities 使用Waidps和Nzyme实用程序检测家庭Wi-Fi网络中的流量异常
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040004
I. M. Lavrovsky
{"title":"Detection of traffic anomalies in the home Wi-Fi network using Waidps and Nzyme utilities","authors":"I. M. Lavrovsky","doi":"10.31673/2409-7292.2022.040004","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040004","url":null,"abstract":"The article examines Waidps and Nzyme utilities used for monitoring wireless networks. Some basic WLAN terms were described with possible attacks on WLANs in general and how dangerous they are. It has been studied how each of the utilities works: its capabilities, disadvantages and the order of application.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of predicting insider threat in the organization 预测组织内部威胁的模型
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.013034
S. Zaikin, O. Kitura
{"title":"Model of predicting insider threat in the organization","authors":"S. Zaikin, O. Kitura","doi":"10.31673/2409-7292.2021.013034","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.013034","url":null,"abstract":"The article considers the concepts of \"insider threat\" and \"insider\". General methods of using insider threats by cybercriminals to compromise the network environment of the organization to gain access to valuable assets are identified. The types of insider threats and their criticality for organizations to deal with these threats to reduce risk are studied. It is concluded that no approach can solve the security problem. In order to mitigate the insider threat, further research is needed on cybersecurity insider threats, and the right approach to combating a malicious insider threat from different perspectives should be identified. It is noted that organizations can implement some basic measures that can reduce the number of cases of insider threats to a minimum.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Технологія виявлення поліморфних комп’ютерних вірусів
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010007
O. O. Agachi
{"title":"Технологія виявлення поліморфних комп’ютерних вірусів","authors":"O. O. Agachi","doi":"10.31673/2409-7292.2023.010007","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010007","url":null,"abstract":"Traditional viruses were computer programs with a static structure that had very limited functionality. After the first detection, their structure is used by the antivirus program (AVP) as a tool to detect similar viruses with similar patterns. However, modern viruses can configure themselves and even change the structure of their functionality, which makes it difficult for antivirus software to detect them. A polymorphic virus is a complex computer virus that affects data types and functions, making it difficult to inspect its internal structure. The article reviews the general methods used by these viruses to demonstrate polymorphism; modern level of detection of polymorphic viruses; antivirus software to detect such viruses. The results of this study can be a source of knowledge for researchers and antivirus software companies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security monitoring and management based on the use of IBM QRadar SIEM system 基于IBM QRadar的安全监控管理SIEM系统
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.020614
A. Gunder
{"title":"Security monitoring and management based on the use of IBM QRadar SIEM system","authors":"A. Gunder","doi":"10.31673/2409-7292.2022.020614","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.020614","url":null,"abstract":"The article clarifies general information about security monitoring and management (SIEM) systems; researched SIEM as a tool to achieve compliance with regulatory security requirements; studied the functionality of IBM QRadar as a typical SIEM sample.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131326693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of single-position determination of coordinates of radio emitting means 无线电发射装置坐标的单位置测定方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.042327
V. S. Yegorov
{"title":"Method of single-position determination of coordinates of radio emitting means","authors":"V. S. Yegorov","doi":"10.31673/2409-7292.2020.042327","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.042327","url":null,"abstract":"Currently, the task of locating radio sources with complex types of modulation, wide bandwidth and low power is becoming increasingly important. The need to create radio monitoring systems and location of radio sources arises in both military (border control, local conflict zones) and civilian consumers (monitoring of navigation on international transport corridors and in special economic zones, search for sources of interference in telecommunication systems, detection of non-communication systems). in communication systems).","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patch management and software updates based on the HCL Bigfix Patch solution 基于HCL Bigfix Patch解决方案的补丁管理和软件更新
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.040613
F. K. Skryabin, V. Vyshnivskyi
{"title":"Patch management and software updates based on the HCL Bigfix Patch solution","authors":"F. K. Skryabin, V. Vyshnivskyi","doi":"10.31673/2409-7292.2021.040613","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.040613","url":null,"abstract":"The methods and means of managing software updates and patches on the example of HCL BigFix Patch solution are investigated in the work. The purpose, main functions and composition of the HCL BigFix Patch software package have been determined. Based on the research conducted in the work, a variant of the software update and patch management technology was developed on the example of the HCL BigFix Patch solution. Recommendations for the application of corporate information system software update and patch management technology have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信