{"title":"Methods for assessing the state of protection of enterprises from cybersecurity threats","authors":"D. V. Kukshyn","doi":"10.31673/2409-7292.2021.035565","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.035565","url":null,"abstract":"Nine methods of enterprise security assessment are considered: vulnerability assessment method, network assessment method, virus detection assessment method, authentication assessment method, penetration test assessment method, social engineering threat assessment method, hardware threat assessment method, policy and countermeasures assessment method and a method for assessing natural hazards.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique for detecting and locating of hidden information obtaining devices that work in the digital Wi-Fi bandwidth","authors":"O. A. Laptіev","doi":"10.31673/2409-7292.2019.022531","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.022531","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The technology of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution","authors":"M. I. Opanasenko","doi":"10.31673/2409-7292.2023.010010","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010010","url":null,"abstract":"The article examines Denial of Service (DDoS) attacks that occur at the network layer of IoT systems and their impact on various aspects of network operation. DDoS attack scenarios using network bandwidth and using system resources are briefly discussed. Botnet detection methods in the IoT network are analyzed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles of operation and detection on the target system of the dual purpose tool Cobalt Strike","authors":"A. V. Khaver","doi":"10.31673/2409-7292.2023.020002","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020002","url":null,"abstract":"The article investigates the nature of the functioning of the dual-purpose tool Cobalt Strike, which actively uses APT (Advanced Persistent Threat) in its arsenal primarily to gain unauthorized access to information systems and their information assets. Considering the extent of the widespread use of Cobalt Strike, it is advisable to consider the principle of its operation and possible measures to counter its penetration into the information systems of objects of critical information infrastructure.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of typical vulnerabilities of Web-sites of organizations in 2019-2020","authors":"D. I. Vasylʹchenko, I. M. Lavrovsʹkyy","doi":"10.31673/2409-7292.2021.014146","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.014146","url":null,"abstract":"This paper provides information on the main web attacks on the website of any organization. The statistics of web attacks for recent years and the vulnerabilities that allow these web attacks are analyzed. Recommendations are provided for protection against major web attacks and protection of the website as a whole, which must be followed to avoid fatal consequences in the event of an attack by an attacker.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical analysis of CaddyWiper malware","authors":"O. Matsko","doi":"10.31673/2409-7292.2023.010006","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010006","url":null,"abstract":"The article examines a new type of malware designed to destroy information resources and media at network endpoints. Discovered in 2022, the CaddyWiper virus destroys user data, separates information from connected drives. The purpose of the work is to study the characteristic features of CaddyWiper to increase the effectiveness of malware detection.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"European Union experience in counteracting destructive information activities in the Internet","authors":"T. Muzhanova, Yuriy Yakymenko","doi":"10.31673/2409-7292.2019.023741","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.023741","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Berkman, Ya. O. Pryima, N. Chumak, V. Dmitriev, O. O. Schedrova, A. A. Iarchuk
{"title":"Concept of Secure IT Center Management System","authors":"L. Berkman, Ya. O. Pryima, N. Chumak, V. Dmitriev, O. O. Schedrova, A. A. Iarchuk","doi":"10.31673/2409-7292.2019.030614","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.030614","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Quality of Modeling the Scenario of Information Analysis on a Branched Network","authors":"Y. Melnyk, S. Otrokh, V. Kuzminykh, O. Koval","doi":"10.31673/2409-7292.2019.037000","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.037000","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of DDoS Attacks and their Protection Methods","authors":"V. M. Bilko, I. M. Lavrovsky, A. Y. Barom","doi":"10.31673/2409-7292.2019.035763","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.035763","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126682784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}