Cybersecurity: Education, Science, Technique最新文献

筛选
英文 中文
CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM 信息系统中网络安全文化水平评估模型
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.13.158169
I. Skiter
{"title":"CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM","authors":"I. Skiter","doi":"10.28925/2663-4023.2021.13.158169","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.158169","url":null,"abstract":"The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS 智能自动化系统设备储备优化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.8799
V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko
{"title":"OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS","authors":"V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko","doi":"10.28925/2663-4023.2021.14.8799","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.8799","url":null,"abstract":"Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for intelligent automated control systems Smart City are proposed. A model, algorithms and software have been developed for solving the optimization problem of choosing a CBE capable of ensuring the uninterrupted operation of the IACS both in conditions of technological failures and in conditions of destructive interference in the operation of the IACS by the attackers. The proposed solutions help to reduce the cost of determining the optimal CBE for IACS by 15–17% in comparison with the results of known calculation methods. The results of computational experiments to study the degree of influence of the outputs of the neural network analyzer on the efficiency of the functioning of the CBE for IACS are presented.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES 参数评价软件实现条形图显示装置
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.142158
O. Bushma, A. Turukalo
{"title":"EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES","authors":"O. Bushma, A. Turukalo","doi":"10.28925/2663-4023.2022.16.142158","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.142158","url":null,"abstract":"The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS 对抗激光智能系统的激光振动传感器结构优化研究
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.110123
V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk
{"title":"RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS","authors":"V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk","doi":"10.28925/2663-4023.2022.15.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.110123","url":null,"abstract":"One of the most vulnerable issues in the technical protection of information is the receipt of data, private or confidential, due to leakage through the optoelectronic channel, the main source of data is laser acoustic intelligence systems or laser microphones. There are active and passive methods of protection against laser acoustic reconnaissance systems (ACS). Active methods use various noisy or vibrating devices that pose a danger to human health. With passive protection, it is recommended to use either special corrugated windows or completely closed shutters, which create some inconvenience now. Detecting a working laser microphone is very difficult and in some cases technically impossible. For example, the removal of information using ACS occurs through glass building structures, usually windows. This article is devoted to the analysis of the principle of operation of laser systems of acoustic intelligence and passive methods of reading acoustic information. Triangulation laser sensors are designed for non-contact measurement and control of position, movement, size, surface profile, deformation, vibration, sorting, recognition of technological objects, measuring the level of liquids and bulk materials. Accordingly, they can be used to study the vibrational properties of glass and films applied to them. It is described the method of working with laser triangulation vibration sensors, which allows to study the deviations of glass from different manufacturers from sound vibrations, thereby investigating the anti-laser properties of existing glass, as well as different types of spraying and films. In addition, this method allows you to conduct and test deviations from sound vibrations for new types of glass, films and spraying, proving the results of spectral studies and their impact on the amplitude of vibration of the glass. The vibration sensor was adjusted and the software parameters were experimentally optimized to obtain the truest deviation values ​​required to work with sprayed samples for passive protection.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD 乌克兰和世界民航网络安全现状
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.2436
A. Ilyenko, Sergii Ilyenko, D. Kvasha
{"title":"THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD","authors":"A. Ilyenko, Sergii Ilyenko, D. Kvasha","doi":"10.28925/2663-4023.2020.9.2436","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.2436","url":null,"abstract":"Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT 基于特征和知识库的发动机电控单元参数分类软件
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.11.110123
S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska
{"title":"PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT","authors":"S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska","doi":"10.28925/2663-4023.2021.11.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.110123","url":null,"abstract":"The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA 基于航空航天和地面研究数据的复杂环境监测信息技术
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.187197
Y. Holovan
{"title":"INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA","authors":"Y. Holovan","doi":"10.28925/2663-4023.2022.17.187197","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.187197","url":null,"abstract":"The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR 从网络聚类因子计算个人数据保护的方法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.3649
V. Akhramovich
{"title":"METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR","authors":"V. Akhramovich","doi":"10.28925/2663-4023.2021.14.3649","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.3649","url":null,"abstract":"A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.\u0000\u0000Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.\u0000\u0000A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.\u0000\u0000As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.\u0000\u0000Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.\u0000\u0000Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.\u0000\u0000Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REAL SIMULATION OF A "WAR DRIVING" ATTACK ON A WIRELESS NETWORK 对无线网络的“战争驱动”攻击的真实模拟
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.99107
R. Korolkov, Serhii Laptiev
{"title":"REAL SIMULATION OF A \"WAR DRIVING\" ATTACK ON A WIRELESS NETWORK","authors":"R. Korolkov, Serhii Laptiev","doi":"10.28925/2663-4023.2022.18.99107","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.99107","url":null,"abstract":"The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the \"War Driving\" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a \"War Driving\" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a \"War Driving\" attack. The developed recommendations will protect wireless networks from \"War Driving\" attacks","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS nlu和生成式人工智能对网络防御系统发展的影响
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.187196
I. Sukaylo, Nataliia Korshun
{"title":"THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS","authors":"I. Sukaylo, Nataliia Korshun","doi":"10.28925/2663-4023.2022.18.187196","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.187196","url":null,"abstract":"The combination of cyber security systems and artificial intelligence is a logical step at this stage of information technology development. Today, many cybersecurity vendors are incorporating machine learning and artificial intelligence into their products or services. However, the effectiveness of investments in advanced machine learning and deep learning technologies in terms of generating meaningful measurable results from these products is a matter of debate. When designing such systems, there are problems with achieving accuracy and scaling. The article considers the classification of artificial intelligence systems, artificial intelligence models used by security products, their capabilities, recommendations that should be taken into account when using generative artificial intelligence technologies for cyber protection systems are given. ChatGPT's NLP capabilities can be used to simplify the configuration of policies in security products. An approach that considers both short-term and long-term metrics to measure progress, differentiation, and customer value through AI is appropriate. The issue of using generative AI based on platform solutions, which allows aggregating various user data, exchanging ideas and experience among a large community, and processing high-quality telemetry data, is also considered. Thanks to the network effect, there is an opportunity to retrain AI models and improve the effectiveness of cyber defense for all users. These benefits lead to a virtual cycle of increased user engagement and improved cyber security outcomes, making platform-based security solutions an attractive choice for businesses and individuals alike. When conducting a cyber security audit of any IT infrastructure using AI, the limits and depth of the audit are established taking into account previous experience.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信