{"title":"Study of Wi-Fi network security with WPA/WPA2 Personal encryption","authors":"M. V. Gurenko","doi":"10.31673/2409-7292.2022.035564","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.035564","url":null,"abstract":"The article investigates the security of a wireless Wi-Fi network with WPA/WPA2 Personal encryption through penetration testing. Recommendations for wireless network configuration have been developed: use of the WPA2-Enterprise security algorithm; using a Radius server configured for authentication using a login-password pair; additional implementation of the SMS service to confirm one's identity, etc.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123795119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topological identification of data transmission systems in the tasks of information protection at the objects of information activity","authors":"T. Khomenko","doi":"10.31673/2409-7292.2021.012629","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.012629","url":null,"abstract":"The paper considers the problem associated with the detection of threats associated with the leakage of information through existing channels that have a different physical principle at the objects of information activities. A mathematical model is proposed, which is based on the theory of fractal analysis and which identifies the channel through which there is an unauthorized leakage of information on the object of information activity. Based on experimental data obtained using different channels of unauthorized removal of information at the object of information activities, a scale is presented, which determines the intervals of the fractal dimension, which allows to identify the channel through which the intention to leak information at the object information activities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"29 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security systems for private enterprise. Organization of the information security service of a private enterprise","authors":"V. Akhramovych, S. Amelkin","doi":"10.31673/2409-7292.2019.012127","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.012127","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protect web applications from sql-injection with Fortinet hardware","authors":"M. O. Tsuranov","doi":"10.31673/2409-7292.2022.013843","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.013843","url":null,"abstract":"This article analyzes the protection of web-applications using the software and hardware Fortigate 60E, as well as the need to use systems to protect web-applications. The types of sql-injection, their impact on the operation of the web-application are analyzed. The main functions and capabilities of the Fortigate 60E equipment are defined. Recommendations for the use of equipment such as Fortigate.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The technology of building an effective integrated security system of the object of information activities","authors":"A. Kotenko","doi":"10.31673/2409-7292.2022.016769","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.016769","url":null,"abstract":"The article analyzes the existing approaches to building security systems for information activities. The technique of construction of the effective integrated system of safety of OID is offered. The method is based on the provisions of the method of dynamic programming, optimization theory.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability analysis of wireless sensor networks","authors":"P. S. Zhukovskyy","doi":"10.31673/2409-7292.2021.045963","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.045963","url":null,"abstract":"The analysis of the problem of cybersecurity of wireless sensor networks is carried out in the work, the purpose and tasks of management of protection of wireless sensor networks are defined. The purpose of security of sensor networks is defined. The analysis of vulnerabilities of wireless sensor networks is carried out. Based on the research conducted in the work, recommendations for the use of technology to manage their protection at the enterprise have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of free access tools for hacking Wi-Fi networks","authors":"R. Y. Shevchenko","doi":"10.31673/2409-7292.2022.040001","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040001","url":null,"abstract":"The article discusses the most popular tools for hacking Wi-Fi networks that are freely distributed on the Internet. The advantages and weaknesses of each of the tools for research and detection of vulnerabilities in Wi-Fi networks are revealed. It is shown that when used correctly, these tools can be useful for the correct configuration of the protection of industrial and home Wi-Fi networks.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The dynamics of changes in security systems during the development of a company from small to large","authors":"O. V. Zvezdoglyad","doi":"10.31673/2409-7292.2022.031823","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.031823","url":null,"abstract":"The article is devoted to the study of the peculiarities of the company's information security management in the process of its development from small to large. General definitions and theoretical provisions of information security were studied; the current state and trends in the development of ISMS of small, medium and large businesses in Ukraine were investigated; IT support models for small, medium and large companies were developed and sound recommendations for their implementation were given. The results of the research can be used at enterprises and organizations of small, medium and large businesses in the process of solving IS problems, preventing the occurrence of critical errors, incidents and unnecessary costs in the process of growth and development of business from small to large.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of attacks on vulnerabilities of web-resources","authors":"V. V. Borodanʹ","doi":"10.31673/2409-7292.2022.015055","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.015055","url":null,"abstract":"This article provides basic information about possible web attacks on the web resources of a regular user or organization. The statistics of attacks for the last few years are analyzed, as well as possible vulnerabilities that allow these attacks. The correlation of loss levels in different types of industries is analyzed. The list of the most common vulnerabilities is given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of information security vulnerability management processes","authors":"V. V. Samko","doi":"10.31673/2409-7292.2022.040008","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040008","url":null,"abstract":"The article discusses an example of automation of IS vulnerability and risk management processes. The main requirements for the automation system and its tasks are defined. The most popular methods of risk management were considered and the impact of automation tools on management methods was checked. The possibilities of the proposed automation toolkit were considered, and recommendations were offered regarding its implementation and use.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}