Modern information security最新文献

筛选
英文 中文
Reverse-shell as a tool for gaining unauthorized access 反向shell作为获取未经授权访问的工具
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.013437
V. Y. Manytsʹkyy
{"title":"Reverse-shell as a tool for gaining unauthorized access","authors":"V. Y. Manytsʹkyy","doi":"10.31673/2409-7292.2022.013437","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.013437","url":null,"abstract":"This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the \"victim\" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Method of Spectral Analysis of Determination of Random Digital Signals Against the Background of Legal Radio Signals 合法无线电信号背景下确定随机数字信号的频谱分析新方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.047081
O. A. Laptіev
{"title":"New Method of Spectral Analysis of Determination of Random Digital Signals Against the Background of Legal Radio Signals","authors":"O. A. Laptіev","doi":"10.31673/2409-7292.2019.047081","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.047081","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"67 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directions of protection of acoustic information on the object of information activity 信息活动对象的声信息保护说明
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.041822
V. Danilov, A. Kotenko
{"title":"Directions of protection of acoustic information on the object of information activity","authors":"V. Danilov, A. Kotenko","doi":"10.31673/2409-7292.2020.041822","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.041822","url":null,"abstract":"The ways of unauthorized receipt of acoustic information with limited access at the objects of information activity are shown. The physical essence of the processes that contribute to the unauthorized leakage of acoustic information is analyzed. An analysis of threats to the security of acoustic information at the objects of information activities, and their classification. An overview of methods and means of protection of acoustic information at the objects of information activities. The directions of further researches for maintenance of the necessary level of protection of the acoustic information on OIA according to the defined quality indicator are defined.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of detecting radio broadcast at objects of information activity 在信息活动对象上探测无线电广播的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040010
M. O. Voronin
{"title":"Methods of detecting radio broadcast at objects of information activity","authors":"M. O. Voronin","doi":"10.31673/2409-7292.2022.040010","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040010","url":null,"abstract":"The threat of radio interception devices intercepting confidential acoustic speech information at the objects of information activity and the methods of detecting radio emissions of these devices using radio control tools are considered. The main principles of the construction of radio monitoring systems of electromagnetic radiation, their functionality, the algorithm of the method of detection of activated radio jamming devices are given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern challenges and threats to the digital transformation of companies 企业数字化转型面临的现代挑战和威胁
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010001
V. Savchenko
{"title":"Modern challenges and threats to the digital transformation of companies","authors":"V. Savchenko","doi":"10.31673/2409-7292.2023.010001","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010001","url":null,"abstract":"The article examines challenges and threats to the digital transformation of companies, organizations and enterprises. The factors that determine the success of digitization processes are analyzed, the influence of the human factor on transformation is considered, the importance and necessity of a change in thinking for the success of digital transformation is determined. Here are five strategies companies can implement to overcome the challenges of digital transformation and realize their potential with new digital systems and technologies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk-oriented approach to the management of information security at the enterprise 以风险为导向的企业信息安全管理方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.023844
I. R. Chernyavsʹkyy
{"title":"A risk-oriented approach to the management of information security at the enterprise","authors":"I. R. Chernyavsʹkyy","doi":"10.31673/2409-7292.2022.023844","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.023844","url":null,"abstract":"The article is devoted to the study of the problems of the risk-oriented approach in the management of information security of the enterprise. The article analyzes the main characteristics of information security management at the current stage; the requirements of regulatory and methodological documents regarding the organization of information security management at the enterprise were studied; the main processes and components of the management organization are disclosed; the organization of management using a risk-oriented approach was studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical model of personal information security under the influence of media information 媒介信息影响下的个人信息安全数学模型
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020001
O. S. Vetlytska
{"title":"Mathematical model of personal information security under the influence of media information","authors":"O. S. Vetlytska","doi":"10.31673/2409-7292.2023.020001","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020001","url":null,"abstract":"As mass media continue to play an increasingly important role in our daily lives, people face an increasing number of security risks associated with the consumption of media information. To better understand the factors that contribute to individual security in this context, the paper proposes a mathematical model that examines the relationship between the number of security breaches, the amount of media information consumed, the level of security measures taken by an individual, and the level of media literacy an individual possesses. The equations that represent these relationships are presented, and possible values for the model parameters are suggested. The model provides a framework for analyzing and improving individual safety in the context of media consumption, and has the potential to be used in practical applications such as designing effective safety awareness campaigns and designing safer media technologies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"35 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120971483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential vulnerabilities in the authentication mechanism of WhatsApp and Telegram messengers WhatsApp和Telegram信使的认证机制存在潜在漏洞
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040007
D. Rabchun
{"title":"Potential vulnerabilities in the authentication mechanism of WhatsApp and Telegram messengers","authors":"D. Rabchun","doi":"10.31673/2409-7292.2022.040007","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040007","url":null,"abstract":"The article examines the main security issues of the popular messengers WhatsApp and Telegram, investigates the structure and the possibility of penetrating the system based on the use of the vulnerability of the SS7 protocol. It was concluded that two-factor authentication is necessary.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122755723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of telecommunication networks of the 5G generation 5G一代电信网络的安全分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040003
O. Matsko
{"title":"Security analysis of telecommunication networks of the 5G generation","authors":"O. Matsko","doi":"10.31673/2409-7292.2022.040003","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040003","url":null,"abstract":"The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of antivirus protection in the formation of the ecosystem and immune system of corporate information systems 反病毒防护在企业信息系统生态系统和免疫系统形成中的作用
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010002
O. Skybun
{"title":"The role of antivirus protection in the formation of the ecosystem and immune system of corporate information systems","authors":"O. Skybun","doi":"10.31673/2409-7292.2023.010002","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010002","url":null,"abstract":"The article examines the need for the formation of an ecosystem, a corporate information system with a strong immune system, which, together with antivirus protection, provides a sufficient level of cyber protection of the entire system for the possibility of stable and stable functioning of large corporate information systems. The need to take into account the fact that modern corporate information systems are formed on the basis of neural systems, artificial intelligence and the Internet of Things was also noted. This determines the need for a complex approach to the selection of an antivirus software product, which must be harmoniously integrated into the general architecture of the information system to ensure a high level of antivirus protection. An analysis of available anti-virus software products has shown that the vast majority of them are effective for home use. For corporate information systems, it is necessary to choose an antivirus product based on the recommendation and technical support of the vendor company, which is responsible for the entire software product used in the system being built.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115244981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信