{"title":"Virtual Cloud Environment Protection Method Based on Attack Graph Structure","authors":"V. V. Vyshnivsʹkyy","doi":"10.31673/2409-7292.2023.010003","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010003","url":null,"abstract":"The article proposes the creation of an effective system for detecting and responding to external influences in order to minimize the consequences of breaching the protection of cloud virtual resources in a timely manner. Mathematical models have been improved to ensure the protection of virtual cloud resources for software-configured networks, namely: a mathematical model of the impact of an attack on virtual cloud resources, a mathematical model for assessing the state of virtual cloud resources, a mathematical model for choosing a countermeasure based on a complex indicator for software-configured networks. Based on the obtained mathematical models, a graph of attacks on the virtual cloud environment was developed. This graph allows you to get information about all known system vulnerabilities.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. S. Ishmetov, O. I. Gulyaeva, K. O. Nechipurenko
{"title":"Advanced IBM Qradar Incident Forensics enterprise information system cyber incident investigation technology","authors":"I. S. Ishmetov, O. I. Gulyaeva, K. O. Nechipurenko","doi":"10.31673/2409-7292.2021.031723","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.031723","url":null,"abstract":"The paper analyzes the problem of cybersecurity of the corporate information system and identifies the place, purpose and objectives of the investigation of cyber incidents of the corporate information system. The analysis of existing technologies of investigation of cyber incidents of the corporate information system is carried out. Methods and means of investigating cyber incidents of the corporate information system based on the IBM QRadar Incident Forensics solution are studied. The purpose, main functions and composition of the IBM QRadar Incident Forensics complex are determined. Based on the research conducted in the work, a variant of the technology of investigation of cyber incidents of the corporate information system and recommendations for the application of this technology in the enterprise have been developed. The technology of integration of IBM QRadar SIEM and IBM QRadar Incident Forensics is studied, the application of which increases the efficiency of the specialists of the Center for Cyber Security Management of the corporate information system.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology for detecting information threats of virtual communities in social networks","authors":"O. O. Bobrovsky, M. I. Opanasenko, T. Dzyuba","doi":"10.31673/2409-7292.2021.020102","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.020102","url":null,"abstract":"The article is devoted to the topical issue of identifying information threats in virtual communities of social networks and mechanisms for counteracting such threats. The process of organization of monitoring and content analysis of virtual communities in social networks is studied. The technology of detecting information threats of virtual communities in social networks and methods of their assessment have been developed. An approach to finding pages of discussions on social networks based on the Louvain method is proposed. The technology of determining the degree of information threat of the virtual community in social networks and ways to counteract the information threats of the virtual community have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of the Ukrainian-Russian information counteraction during the war in Donbass and the full-scale invasion of the Russian Federation on the territory of Ukraine","authors":"N. L. Veselkov","doi":"10.31673/2409-7292.2022.010615","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.010615","url":null,"abstract":"The implementation of attacks in cyberspace during the Ukrainian-Russian war, applications of both information and disinformation attacks and cyber attacks on the infrastructure of Ukrainian companies and the government are considered.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"85 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120878288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology for detecting simple viruses in program code","authors":"D. S. Voloshko","doi":"10.31673/2409-7292.2023.020006","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020006","url":null,"abstract":"This article deals with the detection of simple viruses in program code. Viruses can cause significant damage to software, so it is important to prevent their spread and detect them in time. Various methods can be used to detect viruses, such as virus scanners, static code analysis, program code behavior analysis, and others. When detecting viruses in software code, it is important to pay attention to the context of the detection and the experience of the software security expert. Detecting viruses in software code is an important step in software security and can help prevent the damage that viruses can cause.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Johnson distributions to describe noise in the problem of information protection from leakage due to the side electromagnetic fields of the USB keyboard","authors":"A. S. Chechko","doi":"10.31673/2409-7292.2021.011418","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.011418","url":null,"abstract":"The problem of the description of artificially present industrial noises which are available at operation of personal computers is considered in work. These noises have both positive and negative effects when protecting the information typed by the user by means of the USB keyboard interface. The difficulties that arise in this case are due to the fact that the indirect radiation of electromagnetic fields is observed during the operation of all elements of computer technology. On the one hand, the presence of these noises distorts the useful signal, which in turn prevents the attacker from detecting reliable information that is transmitted. On the other hand, these noises prevent the creation of appropriate measures to ensure complete protection when typing by a user of a personal computer. The paper proposes to consider industrial noise in the form of three random processes, which are described by Johnson distributions.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity technology for video surveillance systems based on the HIKVISION solution","authors":"D. Kolisnyk, I. Lishchuk","doi":"10.31673/2409-7292.2021.034248","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.034248","url":null,"abstract":"The study and analysis of the problem of ensuring the protection of video surveillance systems, the essence of the tasks of their protection. The existing technologies of protection of video surveillance systems are analyzed. The technology of providing protection of video surveillance systems on the basis of the Hikvision solution is investigated. The methods and means of protection of the components of the video surveillance system, which are implemented by Hikvision, are determined. The main threats to IP video surveillance systems have been identified. Recommendations for cybersecurity specialists on the application of technology for protection of video surveillance systems at the enterprise have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127006455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the main components of danger in the construction of information security system of the enterprise","authors":"L. A. Aseeva","doi":"10.31673/2409-7292.2019.024246","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.024246","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131776859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
О. М. Kikot, А. М. Pravdyvyi, S. Kornienko, F. O. Ozerinin, S. Zozulya
{"title":"Analysis and development trends of devices for finding illegal means of obtaining information","authors":"О. М. Kikot, А. М. Pravdyvyi, S. Kornienko, F. O. Ozerinin, S. Zozulya","doi":"10.31673/2409-7292.2020.043340","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.043340","url":null,"abstract":"This article raises the issue of leakage or loss of information, which can lead to material damage or catastrophic consequences. The analysis of search devices of secret reception means of information different on the principle of work, and methods of search of secret reception means of information is carried out. According to the analysis, we can conclude that the process of finding means of covert receipt of information at the present stage of society qualitatively development goes to another level. Therefore, the search methods and equipment used for this need to be improved, and the problem of analyzing the means of finding means of covert information in order to identify trends and develop modern requirements for them becomes relevant. Methods of concealing the work of secret means of obtaining information used in their development are studied. It should be noted that today it is much easier to make a digital transmitter, using the modern element base of standard means of communication, than to create and configure an \"analog\" bookmark on a transistor with positive feedback. That is why the possibilities of modern means of obtaining information secretly are influenced by the latest and promising technologies. The latest means of covert information retrieval (radio bookmarks) have the ability to use a variety of methods to hide the data channel, which significantly complicates the process of finding them. In particular, in the case of their use of combined methods of hiding the data channel. Taking into account the latest developments in the field of hidden information, a complete methodological set of requirements for regional design and creation of modern automated search systems, which, in turn, fully meet the process of modern automated search of digital radio bookmarks. These requirements can be used as a technical task in the design of automated software for searching digital radio bookmarks.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of the state of information security of IoT devices based on time series processing","authors":"V. V. Lysynchuk","doi":"10.31673/2409-7292.2022.030617","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.030617","url":null,"abstract":"The article describes the use of time series for the mathematical description of the state of security of devices in the IoT network. Time series data analysis methods are analyzed in order to obtain significant statistics and other data characteristics.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}