{"title":"Reverse-shell as a tool for gaining unauthorized access","authors":"V. Y. Manytsʹkyy","doi":"10.31673/2409-7292.2022.013437","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.013437","url":null,"abstract":"This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the \"victim\" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Method of Spectral Analysis of Determination of Random Digital Signals Against the Background of Legal Radio Signals","authors":"O. A. Laptіev","doi":"10.31673/2409-7292.2019.047081","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.047081","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"67 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directions of protection of acoustic information on the object of information activity","authors":"V. Danilov, A. Kotenko","doi":"10.31673/2409-7292.2020.041822","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.041822","url":null,"abstract":"The ways of unauthorized receipt of acoustic information with limited access at the objects of information activity are shown. The physical essence of the processes that contribute to the unauthorized leakage of acoustic information is analyzed. An analysis of threats to the security of acoustic information at the objects of information activities, and their classification. An overview of methods and means of protection of acoustic information at the objects of information activities. The directions of further researches for maintenance of the necessary level of protection of the acoustic information on OIA according to the defined quality indicator are defined.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of detecting radio broadcast at objects of information activity","authors":"M. O. Voronin","doi":"10.31673/2409-7292.2022.040010","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040010","url":null,"abstract":"The threat of radio interception devices intercepting confidential acoustic speech information at the objects of information activity and the methods of detecting radio emissions of these devices using radio control tools are considered. The main principles of the construction of radio monitoring systems of electromagnetic radiation, their functionality, the algorithm of the method of detection of activated radio jamming devices are given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern challenges and threats to the digital transformation of companies","authors":"V. Savchenko","doi":"10.31673/2409-7292.2023.010001","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010001","url":null,"abstract":"The article examines challenges and threats to the digital transformation of companies, organizations and enterprises. The factors that determine the success of digitization processes are analyzed, the influence of the human factor on transformation is considered, the importance and necessity of a change in thinking for the success of digital transformation is determined. Here are five strategies companies can implement to overcome the challenges of digital transformation and realize their potential with new digital systems and technologies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A risk-oriented approach to the management of information security at the enterprise","authors":"I. R. Chernyavsʹkyy","doi":"10.31673/2409-7292.2022.023844","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.023844","url":null,"abstract":"The article is devoted to the study of the problems of the risk-oriented approach in the management of information security of the enterprise. The article analyzes the main characteristics of information security management at the current stage; the requirements of regulatory and methodological documents regarding the organization of information security management at the enterprise were studied; the main processes and components of the management organization are disclosed; the organization of management using a risk-oriented approach was studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical model of personal information security under the influence of media information","authors":"O. S. Vetlytska","doi":"10.31673/2409-7292.2023.020001","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020001","url":null,"abstract":"As mass media continue to play an increasingly important role in our daily lives, people face an increasing number of security risks associated with the consumption of media information. To better understand the factors that contribute to individual security in this context, the paper proposes a mathematical model that examines the relationship between the number of security breaches, the amount of media information consumed, the level of security measures taken by an individual, and the level of media literacy an individual possesses. The equations that represent these relationships are presented, and possible values for the model parameters are suggested. The model provides a framework for analyzing and improving individual safety in the context of media consumption, and has the potential to be used in practical applications such as designing effective safety awareness campaigns and designing safer media technologies.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"35 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120971483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Potential vulnerabilities in the authentication mechanism of WhatsApp and Telegram messengers","authors":"D. Rabchun","doi":"10.31673/2409-7292.2022.040007","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040007","url":null,"abstract":"The article examines the main security issues of the popular messengers WhatsApp and Telegram, investigates the structure and the possibility of penetrating the system based on the use of the vulnerability of the SS7 protocol. It was concluded that two-factor authentication is necessary.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122755723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of telecommunication networks of the 5G generation","authors":"O. Matsko","doi":"10.31673/2409-7292.2022.040003","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040003","url":null,"abstract":"The article examines the issues of protection in telecommunication networks of the new generation based on 5G technologies. Models of secure deployment of 5G networks, Protection of subscribers and devices, Network protection, New stack of IT protocols, Protection technologies used in 5G are considered. Inheritance of security across generations of technology is shown, comparison of LTE protection with 5G protection is made.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of antivirus protection in the formation of the ecosystem and immune system of corporate information systems","authors":"O. Skybun","doi":"10.31673/2409-7292.2023.010002","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010002","url":null,"abstract":"The article examines the need for the formation of an ecosystem, a corporate information system with a strong immune system, which, together with antivirus protection, provides a sufficient level of cyber protection of the entire system for the possibility of stable and stable functioning of large corporate information systems. The need to take into account the fact that modern corporate information systems are formed on the basis of neural systems, artificial intelligence and the Internet of Things was also noted. This determines the need for a complex approach to the selection of an antivirus software product, which must be harmoniously integrated into the general architecture of the information system to ensure a high level of antivirus protection. An analysis of available anti-virus software products has shown that the vast majority of them are effective for home use. For corporate information systems, it is necessary to choose an antivirus product based on the recommendation and technical support of the vendor company, which is responsible for the entire software product used in the system being built.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115244981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}