Modern information security最新文献

筛选
英文 中文
Theoretical Approach to Defining the Content of the Concept of "Information" as a Major Category of Cybersecurity 网络安全主要范畴“信息”概念内涵界定的理论途径
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.035156
G. Gaidur, S. Gakhov
{"title":"Theoretical Approach to Defining the Content of the Concept of \"Information\" as a Major Category of Cybersecurity","authors":"G. Gaidur, S. Gakhov","doi":"10.31673/2409-7292.2019.035156","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.035156","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122795423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPS signals as objects of radio suppression in objective-territorial protection tasks 目标-领土保护任务中作为无线电抑制对象的GPS信号
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.015358
L. P. Kryuchkova, V. Pshonnik, S. Zozulya
{"title":"GPS signals as objects of radio suppression in objective-territorial protection tasks","authors":"L. P. Kryuchkova, V. Pshonnik, S. Zozulya","doi":"10.31673/2409-7292.2019.015358","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.015358","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122818838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The main areas of artificial intelligence technologies in cybersecurity 人工智能技术主要应用于网络安全领域
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.040611
V. Savchenko, O. D. Shapovalenko
{"title":"The main areas of artificial intelligence technologies in cybersecurity","authors":"V. Savchenko, O. D. Shapovalenko","doi":"10.31673/2409-7292.2020.040611","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.040611","url":null,"abstract":"The article examines the key technologies of artificial intelligence in order to use them to ensure the protection of information. It is shown that currently there is no general concept of artificial intelligence in cybersecurity, the most important methods of artificial intelligence that can be used in cybersecurity are not defined, and the role that these methods can play to protect organizations in cyberspace has not been established. As a key idea for the use of artificial intelligence in cybersecurity, the use of technologies and methods that facilitate the detection and response to threats using cyber attack statistics sets has been proposed. Priority areas for the use of artificial intelligence are network security and data protection.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions 基于尸检和波动性解决方案的企业信息系统网络事件调查
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.022229
M. F. Goncharenko
{"title":"Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions","authors":"M. F. Goncharenko","doi":"10.31673/2409-7292.2022.022229","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.022229","url":null,"abstract":"This article provides information on basic investigation methods for any organization based on Autopsy and Volatility solutions. Possible sources of data and the difficulty of extracting certain information from them are analyzed. General recommendations for conducting investigations are offered. The considered tools and the process of analyzing the received data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal bases and stages of building information security in Ukraine 乌克兰信息安全建设的法律依据和阶段
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.016166
K. I. Barsukova
{"title":"Legal bases and stages of building information security in Ukraine","authors":"K. I. Barsukova","doi":"10.31673/2409-7292.2022.016166","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.016166","url":null,"abstract":"The article defines the legal basis for building an effective system of information protection by analyzing regulations. A study of legal methods of information security by analyzing and studying a comprehensive information security system and information security management system in accordance with the international standard ISO 27001. Describes the main stages of building a comprehensive information security system and information security management system, compares them.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complex security architecture in 5G networks based on the construction of domains of trust 基于信任域构建的5G网络复杂安全架构
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010008
A. H. Zakharzhevskyy
{"title":"Complex security architecture in 5G networks based on the construction of domains of trust","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2023.010008","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010008","url":null,"abstract":"The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for evaluating the system of protection of automated information resources of a commercial bank 商业银行自动化信息资源保护体系评价方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010004
A. Kotenko
{"title":"Methodology for evaluating the system of protection of automated information resources of a commercial bank","authors":"A. Kotenko","doi":"10.31673/2409-7292.2023.010004","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010004","url":null,"abstract":"The existing systems of protection of automated systems are considered. An analysis of threats to the information resources of a commercial bank was made. Identified components of information security of a banking institution. The composition of the automated banking system and its core - the subsystem \"Operational day of the bank\" are shown. Recommendations for building a system for protecting information resources of a commercial bank have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security testing of crypto exchanges based on Owasp technology of Web Security Testing Guide Web安全测试指南中基于Owasp技术的加密交易所安全测试
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020007
O. A. Horlan
{"title":"Security testing of crypto exchanges based on Owasp technology of Web Security Testing Guide","authors":"O. A. Horlan","doi":"10.31673/2409-7292.2023.020007","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020007","url":null,"abstract":"The paper analyzed the security testing of crypto-exchanges, identified the inadequacy of checks in it, and found that the existing methodologies are insufficient to ensure the security of crypto-exchanges. The biggest attacks on crypto platforms, their causes, and how they could be avoided are explored. The essence of crypto-exchanges and their role in the modern world, the current state of security of crypto-exchanges, best practices and recommendations for improving the security of crypto-exchanges were developed. Based on research, a methodology for testing the security of crypto exchanges, developed on the basis of the OWASP Web Application Security Guide, is proposed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and identification of ways to reduce critical information security risks 分析和识别降低关键信息安全风险的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.042832
M. Zaporozhchenko
{"title":"Analysis and identification of ways to reduce critical information security risks","authors":"M. Zaporozhchenko","doi":"10.31673/2409-7292.2020.042832","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.042832","url":null,"abstract":"One of the key requirements for the protection of an organization's information assets is to ensure proper information security risk management. In the process of risk management, they should be identified, assessed, analyzed and processed in order to change the value of risk to an acceptable level. The article proposes to consider ways to reduce information risks that may be caused by critical categories of threats and vulnerabilities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132317212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near Field NFC Interaction Technology 近场NFC交互技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.042733
M. M. Lutsenko, G. Shuklin, V. Akhramovych
{"title":"Near Field NFC Interaction Technology","authors":"M. M. Lutsenko, G. Shuklin, V. Akhramovych","doi":"10.31673/2409-7292.2019.042733","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.042733","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信