Modern information security最新文献

筛选
英文 中文
Study of Wi-Fi network security with WPA/WPA2 Personal encryption 基于WPA/WPA2个人加密的Wi-Fi网络安全研究
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.035564
M. V. Gurenko
{"title":"Study of Wi-Fi network security with WPA/WPA2 Personal encryption","authors":"M. V. Gurenko","doi":"10.31673/2409-7292.2022.035564","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.035564","url":null,"abstract":"The article investigates the security of a wireless Wi-Fi network with WPA/WPA2 Personal encryption through penetration testing. Recommendations for wireless network configuration have been developed: use of the WPA2-Enterprise security algorithm; using a Radius server configured for authentication using a login-password pair; additional implementation of the SMS service to confirm one's identity, etc.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123795119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topological identification of data transmission systems in the tasks of information protection at the objects of information activity 拓扑识别是数据传输系统在信息保护任务中的信息活动对象
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.012629
T. Khomenko
{"title":"Topological identification of data transmission systems in the tasks of information protection at the objects of information activity","authors":"T. Khomenko","doi":"10.31673/2409-7292.2021.012629","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.012629","url":null,"abstract":"The paper considers the problem associated with the detection of threats associated with the leakage of information through existing channels that have a different physical principle at the objects of information activities. A mathematical model is proposed, which is based on the theory of fractal analysis and which identifies the channel through which there is an unauthorized leakage of information on the object of information activity. Based on experimental data obtained using different channels of unauthorized removal of information at the object of information activities, a scale is presented, which determines the intervals of the fractal dimension, which allows to identify the channel through which the intention to leak information at the object information activities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"29 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security systems for private enterprise. Organization of the information security service of a private enterprise 民营企业信息安全系统。私营企业信息安全服务机构
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.012127
V. Akhramovych, S. Amelkin
{"title":"Information security systems for private enterprise. Organization of the information security service of a private enterprise","authors":"V. Akhramovych, S. Amelkin","doi":"10.31673/2409-7292.2019.012127","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.012127","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protect web applications from sql-injection with Fortinet hardware 使用Fortinet硬件保护web应用程序免受sql注入
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.013843
M. O. Tsuranov
{"title":"Protect web applications from sql-injection with Fortinet hardware","authors":"M. O. Tsuranov","doi":"10.31673/2409-7292.2022.013843","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.013843","url":null,"abstract":"This article analyzes the protection of web-applications using the software and hardware Fortigate 60E, as well as the need to use systems to protect web-applications. The types of sql-injection, their impact on the operation of the web-application are analyzed. The main functions and capabilities of the Fortigate 60E equipment are defined. Recommendations for the use of equipment such as Fortigate.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The technology of building an effective integrated security system of the object of information activities 构建有效的信息活动对象综合安全系统的技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.016769
A. Kotenko
{"title":"The technology of building an effective integrated security system of the object of information activities","authors":"A. Kotenko","doi":"10.31673/2409-7292.2022.016769","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.016769","url":null,"abstract":"The article analyzes the existing approaches to building security systems for information activities. The technique of construction of the effective integrated system of safety of OID is offered. The method is based on the provisions of the method of dynamic programming, optimization theory.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability analysis of wireless sensor networks 无线传感器网络脆弱性分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.045963
P. S. Zhukovskyy
{"title":"Vulnerability analysis of wireless sensor networks","authors":"P. S. Zhukovskyy","doi":"10.31673/2409-7292.2021.045963","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.045963","url":null,"abstract":"The analysis of the problem of cybersecurity of wireless sensor networks is carried out in the work, the purpose and tasks of management of protection of wireless sensor networks are defined. The purpose of security of sensor networks is defined. The analysis of vulnerabilities of wireless sensor networks is carried out. Based on the research conducted in the work, recommendations for the use of technology to manage their protection at the enterprise have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of free access tools for hacking Wi-Fi networks Wi-Fi网络免费接入工具分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040001
R. Y. Shevchenko
{"title":"Analysis of free access tools for hacking Wi-Fi networks","authors":"R. Y. Shevchenko","doi":"10.31673/2409-7292.2022.040001","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040001","url":null,"abstract":"The article discusses the most popular tools for hacking Wi-Fi networks that are freely distributed on the Internet. The advantages and weaknesses of each of the tools for research and detection of vulnerabilities in Wi-Fi networks are revealed. It is shown that when used correctly, these tools can be useful for the correct configuration of the protection of industrial and home Wi-Fi networks.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The dynamics of changes in security systems during the development of a company from small to large 安全系统在公司从小到大发展过程中的动态变化
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.031823
O. V. Zvezdoglyad
{"title":"The dynamics of changes in security systems during the development of a company from small to large","authors":"O. V. Zvezdoglyad","doi":"10.31673/2409-7292.2022.031823","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.031823","url":null,"abstract":"The article is devoted to the study of the peculiarities of the company's information security management in the process of its development from small to large. General definitions and theoretical provisions of information security were studied; the current state and trends in the development of ISMS of small, medium and large businesses in Ukraine were investigated; IT support models for small, medium and large companies were developed and sound recommendations for their implementation were given. The results of the research can be used at enterprises and organizations of small, medium and large businesses in the process of solving IS problems, preventing the occurrence of critical errors, incidents and unnecessary costs in the process of growth and development of business from small to large.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of attacks on vulnerabilities of web-resources web资源漏洞攻击分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.015055
V. V. Borodanʹ
{"title":"Analysis of attacks on vulnerabilities of web-resources","authors":"V. V. Borodanʹ","doi":"10.31673/2409-7292.2022.015055","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.015055","url":null,"abstract":"This article provides basic information about possible web attacks on the web resources of a regular user or organization. The statistics of attacks for the last few years are analyzed, as well as possible vulnerabilities that allow these attacks. The correlation of loss levels in different types of industries is analyzed. The list of the most common vulnerabilities is given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of information security vulnerability management processes 信息安全漏洞管理流程的自动化
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040008
V. V. Samko
{"title":"Automation of information security vulnerability management processes","authors":"V. V. Samko","doi":"10.31673/2409-7292.2022.040008","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040008","url":null,"abstract":"The article discusses an example of automation of IS vulnerability and risk management processes. The main requirements for the automation system and its tasks are defined. The most popular methods of risk management were considered and the impact of automation tools on management methods was checked. The possibilities of the proposed automation toolkit were considered, and recommendations were offered regarding its implementation and use.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信