Cybersecurity: Education, Science, Technique最新文献

筛选
英文 中文
ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION 某军事高等院校网络安全影响因素分析
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.5370
V. Kyva
{"title":"ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION","authors":"V. Kyva","doi":"10.28925/2663-4023.2022.15.5370","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.5370","url":null,"abstract":"The impact of the development and dissemination of information and communication technologies (ICT) in higher military educational institutions (HMEI) is considered in the article, as on the one hand, it increases its efficiency and promotes the training of highly qualified personnel (tactical, operational and strategic level of military education) for the Security Sector and defense of Ukraine, which is extremely necessary in the case of armed aggression by the Russian Federation, and on the other hand, it makes its information space vulnerable to cyberattacks, which the issue of cybersecurity of HMEI raises. At the same time, the author focuses on the analysis of cyber-attacks on educational institutions in recent years, which are due to the development of methods (means) of their implementation and wide access to them by various users, including attackers. In addition, Distributed Denial of Service (DDoS) cyber-attack is the most common cyber threat to international educational institutions, according to an analytical report by Netscout (a developer of ICT solutions to combat DDoS cyberattacks in the United States). It has been analyzed that criminals have recently used DDoS cyberattacks to extort money. Moreover, DDoS cyberattacks were aimed at banks, stock exchanges, travel agencies, currency exchanges and educational institutions. Therefore, the cybersecurity of HMEI needs constant attention from the participants of its provision. In addition, the analysis shows that the cybersecurity of any university is influenced by external and internal factors, which confirm the relevance of the chosen area of research. Therefore, the cybersecurity of HMEI requires an analysis of the factors that affect it, in order to choose the best option for its implementation. Accordingly, the essence and main features of the impact of factors on the cybersecurity of HMEI are identified and their characteristics are presented. The influence of factors on the cybersecurity of HMEI has been decomposed, in particular on the interdependence and criticality of their impact. The necessity of taking into account and constant monitoring of the influence of external and internal factors on the cybersecurity of HMEI is substantiated, which allows to get situational awareness of the current state of cybersecurity and to make appropriate decisions to the management.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EXPERIMENTAL STUDY OF THE MODEL FOR CALCULATING THE QUANTITATIVE CRITERIA FOR ASSESSING THE SECURITY LEVEL OF INFORMATION AND TELECOMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURE OF THE STATE 国家关键基础设施信息通信系统安全水平评估定量标准计算模型的实验研究
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.618
S. Gnatyuk, Oleksiy Yudin, V. Sydorenko, T. Smirnova, Dauriya Zhaksigulova
{"title":"EXPERIMENTAL STUDY OF THE MODEL FOR CALCULATING THE QUANTITATIVE CRITERIA FOR ASSESSING THE SECURITY LEVEL OF INFORMATION AND TELECOMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURE OF THE STATE","authors":"S. Gnatyuk, Oleksiy Yudin, V. Sydorenko, T. Smirnova, Dauriya Zhaksigulova","doi":"10.28925/2663-4023.2022.16.618","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.618","url":null,"abstract":"Global trends in the number and complexity of cyber-attacks have led to the information and telecommunications systems (ITS) protection, in particular, industry, which are critical to society, socio-economic development and information component of national security. Given the needs of national security and the need to introduce a systematic approach to solving the problem of critical infrastructure protection, at the national level, creating a system of protection of such infrastructure is one of the priorities in reforming the defense and security sector of Ukraine. Thus, there is a need to develop methods and models for classifying ITS as a critical infrastructure to ensure Ukraine's national security. The paper studies the model of calculating the quantitative criterion for assessing the security of ITS based on the method of hierarchy analysis, which allowed the processing of expert assessments to obtain a quantitative indicator of ITS security. This made it possible to simplify the procedure for selecting experts, to avoid the specifics of processing expert data, as well as to assess ITS in a limited amount of statistics. The developed model allows to move from qualitative assessment in the form of an ordered series of alphanumeric combinations denoting the levels of implemented services, to quantitative assessment in the form of the ratio of functional security profiles. In addition, specialized software has been developed that implements the studied model, which allowed to conduct experimental research and verification of this model on the example of ITS of the National Confidential Communications System. In further research, the authors plan to investigate the model for calculating the quantitative criterion for assessing the security of ITS in other areas of critical infrastructure (energy, transport etc.).","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY 内部人与内幕信息:本质、威胁、活动与法律责任
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.175185
Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, Sofia Boiko
{"title":"INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, Sofia Boiko","doi":"10.28925/2663-4023.2022.15.175185","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.175185","url":null,"abstract":"The constant development of information technologies, the growing role at the present stage of human potential create new internal threats to the information security of enterprises. The article investigates and analyzes the problems of information security associated with internal violators of companies and their insider activity. Economic reports and analytical materials allowed to determine the relevance and importance of this work. Based on scientific literature, a review of various approaches to the definition of \"insider\" and \"insider information\" was carried out. The main key indicators of the insider and signs of insider information are described. The classification of data sources for the study of insider threats is presented, among which real data of the system journal and data from social networks are allocated; analytical information with synthetic anomalies; simulated data due to the formation of stochastic models; theoretical and gaming approach. Insider threat detection algorithms are described depending on intentions, behavior, capabilities of insiders, how resources are used, as well as models involving several algorithms. The normative issues of protection of insider information from unauthorized disclosure and legal responsibility for illegal use of insider information in Ukrainian legislation are covered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES 二次和扭转Edwards曲线上csidh算法的随机化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.128144
A. Bessalov, Ludmila Kovalchuk, Sergey Abramov
{"title":"RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES","authors":"A. Bessalov, Ludmila Kovalchuk, Sergey Abramov","doi":"10.28925/2663-4023.2022.17.128144","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.128144","url":null,"abstract":"The properties of quadratic and twisted supersingular Edwards curves that form pairs of quadratic twist with order over a prime field are considered. A modification of the CSIDH algorithm based on odd degree isogenies of these curves is considered. A simple model for the implementation of the CSIDH algorithm in 3 minimal odd isogeny degrees 3, 5, 7, with the prime field modulus and the order of supersingular curves is constructed. At the precipitation stage, the parameters of isogenic chains of all degrees for these two classes of supersingular Edwards curves are calculated and tabulated. An example of the implementation of the CSIDH algorithm as a non-interactive secret sharing scheme based on the secret and public keys of Alice and Bob is given. A new randomized CSIDH algorithm with a random equiprobable choice of one of the curves of these two classes at each step of the isogeny chain is proposed. The choice of the degree of each isogeny is randomized. The operation of the randomized algorithm by an example is illustrated. This algorithm as a possible alternative to \"CSIDH with constant time\" is considered. A combination of the two approaches is possible to counter side channel attacks. Estimates of the probability of a successful side-channel attack in a randomized algorithm are given. It is noted that all calculations in the CSIDH algorithm necessary to calculate the shared secret are reduced only to calculating the parameter of the isogenic curve and are performed by field and group operations, in particular, scalar point multiplications and doubling points of the isogeny kernel. In the new algorithm we propose to abandon the calculation of the isogenic function of random point , which significantly speeds up the algorithm.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130758007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EXPERIMENTAL DETERMINATION OF OPTIMAL PARAMETERS OF MOBILE TELECONFERENCES 移动电话会议最佳参数的实验确定
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.6886
Andrii Byts, V. Sokolov, N. Mazur, V. Kozachok, A. Bessalov
{"title":"EXPERIMENTAL DETERMINATION OF OPTIMAL PARAMETERS OF MOBILE TELECONFERENCES","authors":"Andrii Byts, V. Sokolov, N. Mazur, V. Kozachok, A. Bessalov","doi":"10.28925/2663-4023.2021.14.6886","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.6886","url":null,"abstract":"The article considers the problem of ensuring the availability and integrity of wireless subscribers in cellular and other wireless corporate networks. The article aims to determine the threshold values for the moment of failure of video transmission, quantitative parameters, artifacts, and the number of errors for the image. Show the dependence of the integrity of data transmitted in real-time on the characteristics of the environment. Two approaches were used to assess the quality of video information: qualitative (image recognition assessment) and quantitative (error measurement). Because the research program was written in the Kotlin programming language, a library written in Java or Kotlin was required. After searching the library, it turned out that only three libraries meet such parameters as reliability, relevance, and availability of documentation: Jaffree, Xuggler, and VLCJ. After gathering information, it was found that the most common screen extensions for desktops are 1366 × 768 and for phones—360 × 640. An error occurred that RTP did not support more than one connection. Also, the RTSP protocol could not pass the experiment on codecs other than MP4V. The experiment stopped earlier than necessary without error. Judging by the indicators, this was a very high CPU load. All other protocols were successfully tested, and results were obtained. During the experiments, we encountered various video anomalies. The worst was the video playback problem with the MJPG codec. Other anomalies were also identified: frame delay, incorrect frame rendering, white noise, and white noise mixed with frames. It is clear how up to 128 kbps experiments are successful and then begin to stop the video stream without error information. According to the results of experiments, the H.264 codec performs best.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DEVELOPMENT OF RECOMMENDATIONS FOR REDUCING CYBER THREATS DURING REMOTE WORK FROM THE POINT OF VIEW OF CYBER SECURITY 从网络安全的角度制定减少远程工作期间网络威胁的建议
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.159166
Iryna Pazynina, Ruslan Korchomnyi
{"title":"DEVELOPMENT OF RECOMMENDATIONS FOR REDUCING CYBER THREATS DURING REMOTE WORK FROM THE POINT OF VIEW OF CYBER SECURITY","authors":"Iryna Pazynina, Ruslan Korchomnyi","doi":"10.28925/2663-4023.2022.17.159166","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.159166","url":null,"abstract":"For several years in a row, Ukrainian organizations (first due to the Covid-19 pandemic and its consequences, and now military operations) and in general the world, have been forcibly transferring employees to a more optimal work format - this is remote work (work at home). According to statistics, this practice has shown its positive side in terms of higher labor productivity (less time spent on moving around the city, comfortable home conditions, etc.), however, from the point of view of cyber security, there has been an increase in cases of cyber threats (hereinafter - cyber threats) and the activation of cyber criminals.\u0000\u0000Remote work mode means full or partial transition to the use of personal devices by employees.\u0000\u0000Setting up remote work of employees requires a clear preparation of information systems within the organization, therefore information security (hereinafter - IS) and information technology (hereinafter - IT) services must ensure the security and continuity of the organization's business processes. Because remote work is associated with a high risk of cyber threats and the intervention of cybercriminals.\u0000\u0000Cybernetic threats (cyberthreats) are existing and/or potentially possible phenomena and factors that pose a danger to the vital interests of a person and citizen, society and the state, the implementation of which depends on the proper functioning of information, telecommunication, and information-telecommunication systems [1].\u0000\u0000The formation and effective implementation of cyber security, within the framework of which a set of recommendations and measures for predicting and countering cyber threats is developed, is a necessary condition for the safe and continuous functioning of the organization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OUTLINE OF THE FUNCTIONAL PURPOSE, REQUIREMENTS FOR THE COMPOSITION OF EQUIPMENT AND TOOLS FOR COMPLEX HARDWARE COMMUNICATION AND CYBERSECURITY 概述了复杂硬件通信和网络安全设备和工具的功能目的、组成要求
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.6172
O. Shemendiuk, I. Kozubtsov, Ivan Neshcheret, Y. Protsiuk, Serhii Bryhadyr, Denys Fomkin
{"title":"OUTLINE OF THE FUNCTIONAL PURPOSE, REQUIREMENTS FOR THE COMPOSITION OF EQUIPMENT AND TOOLS FOR COMPLEX HARDWARE COMMUNICATION AND CYBERSECURITY","authors":"O. Shemendiuk, I. Kozubtsov, Ivan Neshcheret, Y. Protsiuk, Serhii Bryhadyr, Denys Fomkin","doi":"10.28925/2663-4023.2022.18.6172","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.6172","url":null,"abstract":"The experience of modern combat use of weapons and military equipment in the full-scale military aggression of the Russian Federation against Ukraine confirmed the need to review the existing requirements not only for individual samples, but in particular for the automobile platform. The automobile base consists of technically outdated equipment brands (Ural, Zil, GAZ, KAMAZ, Maz, UAZ), the manufacturer of which is the USSR, and the modern supplier of spare parts is the Russian Federation. If it was used for more than an operational period in connection, then problems began to arise. Purpose of the article. Justification of the composition of equipment and communication facilities of the complex hardware of the communications and cybersecurity troops of the Armed Forces of Ukraine, depending on the purpose and functional tasks. Materials and methods. To solve the tasks set, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when clarifying the object and subject of research; the method of convergence from abstract to concrete; method of analytical and comparative analysis in analytical and comparative assessment of the novelty of research results; synthesis and generalization – to substantiate the methodological and methodological foundations of the study; generalization – the formulation of conclusions and recommendations for continuing further research. The result. The existing fleet of complex hardware Communications was constructed by the forces of the repair bases of the Armed Forces of Ukraine according to the unapproved established order projects for the modernization of command and staff vehicles of the old fleet (R-142 and R-145) (up to type A2M1-04) and re-equipped with the latest models of the hardware of the old fleet type P-258, P-256, P-240, P-241, P-238 and P-178. a variable approach to the choice of the automobile base and the complete set of mobile telecommunications kit and means of communication makes it possible to quickly organize all types of communication in any field conditions.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM 一类自动化系统的信息安全风险评估方法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.98112
I. Litvinchuk, Ruslan Korchomnyi, Nataliia Korshun, Maksym Vorokhob
{"title":"APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM","authors":"I. Litvinchuk, Ruslan Korchomnyi, Nataliia Korshun, Maksym Vorokhob","doi":"10.28925/2663-4023.2020.10.98112","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.98112","url":null,"abstract":"The article is devoted to the assessment of information security risks in automated systems of class \"1\". An adapted approach to the assessment of information security risks in such automated systems using the Methodology and requirements of the standards of GSTU SUIB 1.0 / ISO / IEC 27001: 2010 and GSTU SUIB 2.0 / ISO / IEC 27002: 2010 is proposed. The efficiency and methods of implementation of the approach are proved on the example of consideration of real threats and vulnerabilities of class 1 automated systems. The main requirement for the creation of information security management system in the organization is risk assessment and identification of threats to information resources that are processed in information and telecommunications systems and speakers. The basic standards on information security in Ukraine are considered, which give general recommendations for the construction and assessment of information security risks within the ISMS. The most common methods and methodologies for assessing information security risks of international standard are analyzed, their advantages and disadvantages are identified. The order of carrying out of works on an estimation of risks of information security of the AS of a class \"1\" is defined. The vulnerabilities considered by the expert according to the standard ISO/IEC 27002:2005 and the Methodology are given. A conditional scale for determining the impact on the implementation of threats to integrity, accessibility, observation is given. Measures and means of counteracting the emergence of threats are proposed. This approach can be used both for direct information risk assessment and for educational purposes. It allows to get the final result regardless of the experience and qualifications of the specialist who conducts risk assessment, with the subsequent implementation and improvement of the existing risk management system in the organization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT 在it环境中提供特权访问控制和管理的解决方案的比较分析
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.98112
O. Romaniuk, P. Skladannyi, Svitlana Shevchenko
{"title":"COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT","authors":"O. Romaniuk, P. Skladannyi, Svitlana Shevchenko","doi":"10.28925/2663-4023.2022.16.98112","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.98112","url":null,"abstract":"Abuse of privileges in the IT environment is defined as one of the threats to the information assets of the business at the present stage. The article examines and analyzes these problems, which are closely related to the leakage of information due to legitimate access to it and / or unauthorized access to it. Reports, research, acts, surveys at various enterprises contain a large amount of analytical and statistical materials that confirm the relevance and importance of this work. Based on the scientific literature, a review of key definitions on this issue, namely: characterized the definition of \"privileged access\"; the main examples of privileged access in the IT environment are considered; describes the risks and threats of information from attack vectors associated with privileged access to the IT environment. The mechanism for control and management of privileged access - RAM is presented, the steps of this process are highlighted and its expediency is substantiated. Experimental techniques allowed to choose the most applicable solutions of RAM: WALLIX Bastion PAM, One Identity Safeguard PAM, CyberArk PAM. The essence and functionality of each of these solutions are revealed. The advantages and disadvantages of each technology are established. As a result of research of technical and functional characteristics the comparative analysis of data of three decisions is carried out: obligatory components of the decision on control and management of privileged access are the manager of passwords and the manager of sessions (sessions), and additional - the module with analytics of privileged sessions and the access manager. use a VPN to access privileged assets. It can also be noted that the functionality of all products is very similar, so the implementation plays a big role, namely the practical approach during operation, internal algorithms, additional opportunities for integration and innovation. PAM solutions are recommended for organizations as a means to mitigate information security risks and threats due to insider activities of company employees who have privileged access to the IT environment.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM 基于应用遗传算法的信息保护手段布局优化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.620
V. Lakhno, Volodimir Maliukov, Larysa Komarova, D. Kasatkin, T.Yu. Osypova, Y. Chasnovskyi
{"title":"OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM","authors":"V. Lakhno, Volodimir Maliukov, Larysa Komarova, D. Kasatkin, T.Yu. Osypova, Y. Chasnovskyi","doi":"10.28925/2663-4023.2022.17.620","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.620","url":null,"abstract":"the article considers the possibilities of modifying the genetic algorithm (GA) for solving the problem of selecting and optimizing the configurations of information protection means (IPR) for security circuits of information and communication systems (ICS). The scientific novelty of the work lies in the fact that in GA, as criteria for optimizing the composition of IPR, it is proposed to use the total value of risks from loss of information, as well as the integral indicator of IPR and cost indicators for each class of IPR. The genetic algorithm in the task of optimizing the selection of the composition of the IPR for ICS is considered as a variation of the problem associated with multiple selection. In such a statement, the optimization of the placement of IPR along the contours of ICS protection is considered as a modification of the combinatorial problem about the backpack. The GA used in the computing core of the decision support system (DSS) differs from the standard GA. As part of the GA modification, chromosomes are presented in the form of matrices, the elements of which are numbers that correspond to the numbers of the IPR in the ICS nodes. In the process of GA modification, k-point crossover was applied. The fitness function is represented as the sum of efficiency coefficients. At the same time, in addition to the traditional absolute indicators of the effectiveness of IPR, the total value of risks from loss of information, as well as cost indicators for each class of IPR are taken into account. The practical value of the research lies in the implementation of the DSS based on the proposed modification of the GA. Computational experiments on the selection of a rational software algorithm for the implementation of the model were performed. It is shown that the implementation of GA in DSS allows to speed up the search for optimal options for the placement of cyber security means (CS) for ICS by more than 25 times. This advantage allows not only to perform a quick review of various options of hardware and software IPR and their combinations for ICS, but also to further combine the proposed algorithm with existing models and algorithms for optimizing the composition of ICS cyber security circuits. Potentially, such a combination of models and algorithms will provide an opportunity to quickly rebuild ICS protection, adjusting its profiles in accordance with new threats and classes of cyberattacks.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信