Modern information security最新文献

筛选
英文 中文
Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime 人类心理和生物特征因素在和平时期和战争时期社会工程方法的发展和使用
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.011626
M. I. Ganchenko
{"title":"Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime","authors":"M. I. Ganchenko","doi":"10.31673/2409-7292.2022.011626","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.011626","url":null,"abstract":"The subject of this article is the process of influence of social engineers on people by manipulating consciousness, emotions, feelings without and with the use of modern information technology processing and simulation of biological characteristics of mankind in peacetime and wartime. The purpose and objectives are: consideration of existing methods of social engineering such as phishing, trojan, pretexting, watering hole, betting, quid pro quo, persecution, reverse social engineering through the prism of human feelings: naivety, inattention, greed, gullibility, curiosity, belonging fear; Consideration of modern technologies: handwriting forgery - My Text in your Handwriting algorithm, voice substitution - Descript's Ovrlab service, artificial dialogue - Replika application and face replacement - Deep Fake technology, which can help fraudsters to achieve their own goals of obtaining confidential data and carrying out further attacks based on them, as well as manipulating the consciousness of the real perception of events in wartime. The methods used are: psychological and sociological research methods, such as observation, social engineering methods, forecasting methods based on analysis and conclusions about future trends. The following results were obtained. Associations of methods of social engineering with feelings to which this or that psychological influence of the social engineer is directed are created. The potential of using emerging technologies with social engineering techniques to carry out more effective and sophisticated attacks, taking into account the favorite effects of criminals: haste, surprise, confusion, feelings of pity, anxiety, excitement and so on. The possibility of threats related to the procedures of authentication and authorization of users of biometric data on the basis of the considered modern technologies of imitation of biometric data of mankind: handwriting, voice, face. The scientific novelty of the research results is as follows: the importance and necessity of careful treatment of confidential information that people disseminate about themselves in all aspects of their social life; identified the main feelings on which social engineers play to achieve their own goals and benefit; the potential of development of modern technologies of imitation of biometric data of people in efficiency of carrying out attacks by methods of social engineering is specified, efficiency of use of means and methods of social engineering during information wars for influence on unstable psychological state is proved.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The method of maximum plausibility in the problems of protection of the radio signal of unmanned aerial vehicles control 无人机控制中无线电信号保护问题的最大似然方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.041217
S. I. Ganusyak
{"title":"The method of maximum plausibility in the problems of protection of the radio signal of unmanned aerial vehicles control","authors":"S. I. Ganusyak","doi":"10.31673/2409-7292.2020.041217","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.041217","url":null,"abstract":"The paper considers the problem of protection of control of the radio signal of control of unmanned aerial vehicles as a task of control of signal parameters. The problem of control of a parameter of a radio signal and a problem of protection against interception by control of the unmanned aerial vehicle is formulated. The methods of estimating the parameters of the radio communication signal are analyzed and the method of estimating the parameters based on the method of maximum likelihood is proposed. This technique is demonstrated by estimating the phase of harmonic oscillation, which describes the radio signal and there are noise interference. Simulation modeling of the developed method is carried out, which confirmed the adequacy of the proposed model.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cyberattack Simulation by Graph Theory 基于图论的网络攻击仿真
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.040611
V. Savchenko, O. Matsko, S. Legominova, I. Poltorak, V. Marchenko
{"title":"The Cyberattack Simulation by Graph Theory","authors":"V. Savchenko, O. Matsko, S. Legominova, I. Poltorak, V. Marchenko","doi":"10.31673/2409-7292.2019.040611","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.040611","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity risk management on the basis of game-theoretic approach 基于博弈论方法的网络安全风险管理
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.020616
V. Savchenko, O. Matsko
{"title":"Cybersecurity risk management on the basis of game-theoretic approach","authors":"V. Savchenko, O. Matsko","doi":"10.31673/2409-7292.2019.020616","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.020616","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acoustic Authorization Method in Access Control and Control Systems 门禁控制系统中的声学授权方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.043439
L. Kriuchkova, V. Pshonnik, M. Vovk
{"title":"Acoustic Authorization Method in Access Control and Control Systems","authors":"L. Kriuchkova, V. Pshonnik, M. Vovk","doi":"10.31673/2409-7292.2019.043439","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.043439","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of countering the vulnerabilities of applications based on the Android operating system through permission management 一种通过权限管理来解决基于Android操作系统的应用程序漏洞的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.024552
B. V. Hoholʹ
{"title":"A method of countering the vulnerabilities of applications based on the Android operating system through permission management","authors":"B. V. Hoholʹ","doi":"10.31673/2409-7292.2022.024552","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.024552","url":null,"abstract":"The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"73 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods and tools for managing vulnerabilities of corporate information system based on machine learning 基于机器学习的企业信息系统漏洞管理方法与工具
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.032428
G. G. Nayman, D. M. Garkavenko
{"title":"Methods and tools for managing vulnerabilities of corporate information system based on machine learning","authors":"G. G. Nayman, D. M. Garkavenko","doi":"10.31673/2409-7292.2021.032428","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.032428","url":null,"abstract":"The article highlights the general concepts of IT infrastructure, corporate information system, cyberattacks and cyberattack statistics. Vulnerability management is also described as a process of harm reduction from the implementation of threats, what problems are faced by information security professionals and ways to solve them. The possibility of using artificial intelligence in the field of information security, advantages, disadvantages, problems are considered. A hypothetical solution is proposed by developing methods and tools for managing vulnerabilities in corporate information systems using machine learning technologies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of increasing the security of the Internet of Things based on blockchain technologies 基于区块链技术提高物联网安全性的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.012530
G. Gaidur, D. Gai, S. O. Aleksenko
{"title":"Methods of increasing the security of the Internet of Things based on blockchain technologies","authors":"G. Gaidur, D. Gai, S. O. Aleksenko","doi":"10.31673/2409-7292.2020.012530","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.012530","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Problem of Students’ DoS / DDoS Attacks on Educational Resources 学生对教育资源的DoS / DDoS攻击问题
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.045262
Y. S. Antonov, P. V. Rymar, O. Antonova
{"title":"The Problem of Students’ DoS / DDoS Attacks on Educational Resources","authors":"Y. S. Antonov, P. V. Rymar, O. Antonova","doi":"10.31673/2409-7292.2019.045262","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.045262","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of modern tools for penetration testing 现代渗透测试工具分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020005
T. Muzhanova
{"title":"Analysis of modern tools for penetration testing","authors":"T. Muzhanova","doi":"10.31673/2409-7292.2023.020005","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020005","url":null,"abstract":"Penetration testing is a security audit performed by an organization in which an expert attempts to find, penetrate, and exploit weaknesses in an organization's computer system or networks. The main goal is to find any potential weakness. It also helps organizations maintain and adhere to established standards for protecting the privacy of their customers. The article explores software tools that can be used to perform penetration testing.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信