Modern information security最新文献

筛选
英文 中文
Methods for assessing the state of protection of enterprises from cybersecurity threats 评估企业网络安全威胁防护状况的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.035565
D. V. Kukshyn
{"title":"Methods for assessing the state of protection of enterprises from cybersecurity threats","authors":"D. V. Kukshyn","doi":"10.31673/2409-7292.2021.035565","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.035565","url":null,"abstract":"Nine methods of enterprise security assessment are considered: vulnerability assessment method, network assessment method, virus detection assessment method, authentication assessment method, penetration test assessment method, social engineering threat assessment method, hardware threat assessment method, policy and countermeasures assessment method and a method for assessing natural hazards.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technique for detecting and locating of hidden information obtaining devices that work in the digital Wi-Fi bandwidth 在数字Wi-Fi带宽中工作的隐藏信息获取设备的检测和定位技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.022531
O. A. Laptіev
{"title":"Technique for detecting and locating of hidden information obtaining devices that work in the digital Wi-Fi bandwidth","authors":"O. A. Laptіev","doi":"10.31673/2409-7292.2019.022531","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.022531","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The technology of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution 基于Cisco Cloudlock解决方案的云环境网络安全保障技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010010
M. I. Opanasenko
{"title":"The technology of ensuring cyber security of the cloud environment based on the Cisco Cloudlock solution","authors":"M. I. Opanasenko","doi":"10.31673/2409-7292.2023.010010","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010010","url":null,"abstract":"The article examines Denial of Service (DDoS) attacks that occur at the network layer of IoT systems and their impact on various aspects of network operation. DDoS attack scenarios using network bandwidth and using system resources are briefly discussed. Botnet detection methods in the IoT network are analyzed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Principles of operation and detection on the target system of the dual purpose tool Cobalt Strike 双用途工具钴击靶系统的工作原理及检测
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020002
A. V. Khaver
{"title":"Principles of operation and detection on the target system of the dual purpose tool Cobalt Strike","authors":"A. V. Khaver","doi":"10.31673/2409-7292.2023.020002","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020002","url":null,"abstract":"The article investigates the nature of the functioning of the dual-purpose tool Cobalt Strike, which actively uses APT (Advanced Persistent Threat) in its arsenal primarily to gain unauthorized access to information systems and their information assets. Considering the extent of the widespread use of Cobalt Strike, it is advisable to consider the principle of its operation and possible measures to counter its penetration into the information systems of objects of critical information infrastructure.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of typical vulnerabilities of Web-sites of organizations in 2019-2020 2019-2020年机构网站典型漏洞概述
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.014146
D. I. Vasylʹchenko, I. M. Lavrovsʹkyy
{"title":"Overview of typical vulnerabilities of Web-sites of organizations in 2019-2020","authors":"D. I. Vasylʹchenko, I. M. Lavrovsʹkyy","doi":"10.31673/2409-7292.2021.014146","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.014146","url":null,"abstract":"This paper provides information on the main web attacks on the website of any organization. The statistics of web attacks for recent years and the vulnerabilities that allow these web attacks are analyzed. Recommendations are provided for protection against major web attacks and protection of the website as a whole, which must be followed to avoid fatal consequences in the event of an attack by an attacker.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical analysis of CaddyWiper malware cadywiper恶意软件的技术分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010006
O. Matsko
{"title":"Technical analysis of CaddyWiper malware","authors":"O. Matsko","doi":"10.31673/2409-7292.2023.010006","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010006","url":null,"abstract":"The article examines a new type of malware designed to destroy information resources and media at network endpoints. Discovered in 2022, the CaddyWiper virus destroys user data, separates information from connected drives. The purpose of the work is to study the characteristic features of CaddyWiper to increase the effectiveness of malware detection.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European Union experience in counteracting destructive information activities in the Internet 欧盟在对抗互联网破坏性信息活动方面的经验
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.023741
T. Muzhanova, Yuriy Yakymenko
{"title":"European Union experience in counteracting destructive information activities in the Internet","authors":"T. Muzhanova, Yuriy Yakymenko","doi":"10.31673/2409-7292.2019.023741","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.023741","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept of Secure IT Center Management System 安全IT中心管理系统的概念
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.030614
L. Berkman, Ya. O. Pryima, N. Chumak, V. Dmitriev, O. O. Schedrova, A. A. Iarchuk
{"title":"Concept of Secure IT Center Management System","authors":"L. Berkman, Ya. O. Pryima, N. Chumak, V. Dmitriev, O. O. Schedrova, A. A. Iarchuk","doi":"10.31673/2409-7292.2019.030614","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.030614","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Quality of Modeling the Scenario of Information Analysis on a Branched Network 分支网络信息分析场景建模质量评价
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.037000
Y. Melnyk, S. Otrokh, V. Kuzminykh, O. Koval
{"title":"Evaluating the Quality of Modeling the Scenario of Information Analysis on a Branched Network","authors":"Y. Melnyk, S. Otrokh, V. Kuzminykh, O. Koval","doi":"10.31673/2409-7292.2019.037000","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.037000","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of DDoS Attacks and their Protection Methods DDoS攻击分析及防范方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.035763
V. M. Bilko, I. M. Lavrovsky, A. Y. Barom
{"title":"Analysis of DDoS Attacks and their Protection Methods","authors":"V. M. Bilko, I. M. Lavrovsky, A. Y. Barom","doi":"10.31673/2409-7292.2019.035763","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.035763","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126682784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信