{"title":"Theoretical Approach to Defining the Content of the Concept of \"Information\" as a Major Category of Cybersecurity","authors":"G. Gaidur, S. Gakhov","doi":"10.31673/2409-7292.2019.035156","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.035156","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122795423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPS signals as objects of radio suppression in objective-territorial protection tasks","authors":"L. P. Kryuchkova, V. Pshonnik, S. Zozulya","doi":"10.31673/2409-7292.2019.015358","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.015358","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122818838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The main areas of artificial intelligence technologies in cybersecurity","authors":"V. Savchenko, O. D. Shapovalenko","doi":"10.31673/2409-7292.2020.040611","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.040611","url":null,"abstract":"The article examines the key technologies of artificial intelligence in order to use them to ensure the protection of information. It is shown that currently there is no general concept of artificial intelligence in cybersecurity, the most important methods of artificial intelligence that can be used in cybersecurity are not defined, and the role that these methods can play to protect organizations in cyberspace has not been established. As a key idea for the use of artificial intelligence in cybersecurity, the use of technologies and methods that facilitate the detection and response to threats using cyber attack statistics sets has been proposed. Priority areas for the use of artificial intelligence are network security and data protection.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions","authors":"M. F. Goncharenko","doi":"10.31673/2409-7292.2022.022229","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.022229","url":null,"abstract":"This article provides information on basic investigation methods for any organization based on Autopsy and Volatility solutions. Possible sources of data and the difficulty of extracting certain information from them are analyzed. General recommendations for conducting investigations are offered. The considered tools and the process of analyzing the received data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal bases and stages of building information security in Ukraine","authors":"K. I. Barsukova","doi":"10.31673/2409-7292.2022.016166","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.016166","url":null,"abstract":"The article defines the legal basis for building an effective system of information protection by analyzing regulations. A study of legal methods of information security by analyzing and studying a comprehensive information security system and information security management system in accordance with the international standard ISO 27001. Describes the main stages of building a comprehensive information security system and information security management system, compares them.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex security architecture in 5G networks based on the construction of domains of trust","authors":"A. H. Zakharzhevskyy","doi":"10.31673/2409-7292.2023.010008","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010008","url":null,"abstract":"The article discusses key approaches to building a security system in 5G networks. It is determined that the security architecture in 5G networks is based on the use of 3G and 4G technologies in combination with new protocols and functions. It is shown that the list of vulnerabilities of 5G networks expands due to decentralization, which creates an opportunity to attack the computing resources of local devices, which are a priori less protected than the central nodes of the network core. The concept of building trust domains, which allow building complex protection taking into account the possibility of attacks at different levels, has been studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for evaluating the system of protection of automated information resources of a commercial bank","authors":"A. Kotenko","doi":"10.31673/2409-7292.2023.010004","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010004","url":null,"abstract":"The existing systems of protection of automated systems are considered. An analysis of threats to the information resources of a commercial bank was made. Identified components of information security of a banking institution. The composition of the automated banking system and its core - the subsystem \"Operational day of the bank\" are shown. Recommendations for building a system for protecting information resources of a commercial bank have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security testing of crypto exchanges based on Owasp technology of Web Security Testing Guide","authors":"O. A. Horlan","doi":"10.31673/2409-7292.2023.020007","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020007","url":null,"abstract":"The paper analyzed the security testing of crypto-exchanges, identified the inadequacy of checks in it, and found that the existing methodologies are insufficient to ensure the security of crypto-exchanges. The biggest attacks on crypto platforms, their causes, and how they could be avoided are explored. The essence of crypto-exchanges and their role in the modern world, the current state of security of crypto-exchanges, best practices and recommendations for improving the security of crypto-exchanges were developed. Based on research, a methodology for testing the security of crypto exchanges, developed on the basis of the OWASP Web Application Security Guide, is proposed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and identification of ways to reduce critical information security risks","authors":"M. Zaporozhchenko","doi":"10.31673/2409-7292.2020.042832","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.042832","url":null,"abstract":"One of the key requirements for the protection of an organization's information assets is to ensure proper information security risk management. In the process of risk management, they should be identified, assessed, analyzed and processed in order to change the value of risk to an acceptable level. The article proposes to consider ways to reduce information risks that may be caused by critical categories of threats and vulnerabilities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132317212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near Field NFC Interaction Technology","authors":"M. M. Lutsenko, G. Shuklin, V. Akhramovych","doi":"10.31673/2409-7292.2019.042733","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.042733","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}