NBI TechnologiesPub Date : 2021-03-01DOI: 10.15688/nbit.jvolsu.2020.3.1
Yulia Bahracheva, Arina Alеeva
{"title":"Reducing the Risk of Information Security of Subjects of Decentralized Autonomous Organizations","authors":"Yulia Bahracheva, Arina Alеeva","doi":"10.15688/nbit.jvolsu.2020.3.1","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.1","url":null,"abstract":"The purpose of this work is to reduce the risk of information security of subjects of decentralized autonomous organizations. For this purpose, a mathematical model of the audit of information security of subjects of decentralized autonomous organizations was developed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2021-03-01DOI: 10.15688/nbit.jvolsu.2020.3.2
A. Bochkarev, A. Babenko
{"title":"Development of a Formal Model of the Research of Methods for Determining the Reliability of Information Systems","authors":"A. Bochkarev, A. Babenko","doi":"10.15688/nbit.jvolsu.2020.3.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.2","url":null,"abstract":"The state of reliability is the main indicator of the stable functioning of the information system. Reliability assessment is a complex indicator that consists of four groups of properties, namely: durability, reliability, maintainability and complex indicators. In turn, the reliability properties are composed of indicators of each of the properties. It is on the basis of these indicators that the reliability of the information system used or designed. The stable functioning of information systems largely depends on the reliable operation of technical components of the system, both physical and software. The reasons that suggest an increased interest in the problems of determining the reliability of information systems are: increasing the complexity of the hardware of information systems and the emergence of highperformance information systems; slow growth in the level of reliability of its components; increasing the significance of the hardware work implemented; complexity of the conditions of use, etc. In practice, probabilistic, dynamic, predictive, and static models for determining the reliability of information systems are used to assess reliability. Each of these methods uses the presented reliability indicators as the basis for determining its reliability assessment. The concepts of information system and reliability are presented. Models and methods for determining the reliability of information systems are analysed. Criteria for the development of a formal model of research methods for evaluating the reliability of information systems are defined. A formal model has been developed for the study of methods for determining the reliability of information systems.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2021-03-01DOI: 10.15688/nbit.jvolsu.2020.3.5
V. Shevtsov, Nikita Kasimovsky
{"title":"Threat and Vulnerability Analysis of IoT and IIoT Concepts","authors":"V. Shevtsov, Nikita Kasimovsky","doi":"10.15688/nbit.jvolsu.2020.3.5","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.5","url":null,"abstract":"IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2021-03-01DOI: 10.15688/nbit.jvolsu.2020.3.6
K. Smirnov
{"title":"Investigation of the Fine Structure of 5 VMC Niobium Alloy Samples After Internal Nitriding","authors":"K. Smirnov","doi":"10.15688/nbit.jvolsu.2020.3.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.6","url":null,"abstract":"The paper considers the possibility of studying the fine structure of samples made of niobium alloy 5 VMC (grade 5B2MC-2), which underwent internal nitriding by X-ray diffraction analysis.The calculation of the dislocation density, which represents one of the parameters of the fine structure using various techniques, is shown. Its influence on the possible modes of internal nitriding is considered.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.6
A. Afanasiev, Y. Bakhracheva
{"title":"Analysis of the Types of Radar Absorbing Materials","authors":"A. Afanasiev, Y. Bakhracheva","doi":"10.15688/nbit.jvolsu.2019.2.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.6","url":null,"abstract":"The paper provides the analysis of modern radar absorbing materials. The authors describe the advantage of radar absorbing material on the basis of the metamaterial.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.3
M. Ozhiganova, I. Dergacheva, Anastasija Kalita
{"title":"Analysis of Linguistic Methods of Informational Impact on Human Consciousness","authors":"M. Ozhiganova, I. Dergacheva, Anastasija Kalita","doi":"10.15688/nbit.jvolsu.2019.2.3","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.3","url":null,"abstract":"Modern mass media give the opportunity to use a variety of technologies of consciousness manipulation, but it is not important in what way or method this manipulation takes place, it is important what information needs to be conveyed to the ideologists of the organization.\u0000\u0000It is fundamentally important that almost every technology of mind manipulation creates its own image of the enemy, which provokes all the cruelty and aggression of terrorist organization members.\u0000\u0000The authors analyze various linguistic methods for detecting information influence on human consciousness. The paper shows that the classical approach to determining the types of speech actions is very convenient. However, this approach almost completely eludes the real semantics of natural language phrases that carry out speech actions, which can be compensated by the method of using content analysis and the use of databases for the information system.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.1
A. Babenko
{"title":"Developing a Model for Managing the Structure of Information Protection Technical Means in State Information Systems","authors":"A. Babenko","doi":"10.15688/nbit.jvolsu.2019.2.1","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.1","url":null,"abstract":"The urgency of the issue of information security in state information systems is justified by the high demand for systems of this class. The effectiveness of public information systems largely depends on the level of their security. Based on this, we formulate the purpose of this study: formalization of the process of managing the composition of the system of information technical protection in state information systems.\u0000\u0000The paper deals with the problem of managing the composition of the system of information technical protection in state information systems. The author analyzes threats to information security in state information systems. The article defines the criteria of evaluating technical means of information protection in state information systems. The researcher develops a formal model of managing the structure of information technical protection system in state information systems.\u0000\u0000The developed model of managing the structure of information protection technical means in state information systems allows to determine the most effective structure of the information protection system in state information systems. If the requirements for the analyzed means of information security change, then changing the values in the optimal vector, you can come to the right decision. Consequently, the developed model of managing the structure of information protection technical means in state information systems is universal and effective.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"579 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116067459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.7
V. Yatsyshen, I. Potapova, Vyacheslav Shipaev
{"title":"Polaritons in Nanocomposites of Metal Nanoparticles – Dielectric","authors":"V. Yatsyshen, I. Potapova, Vyacheslav Shipaev","doi":"10.15688/nbit.jvolsu.2019.2.7","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.7","url":null,"abstract":"The article studies the main characteristics of surface polaritons in composite nanomaterials. The authors consider composite media such as noble metal nanoparticles randomly distributed in a transparent dielectric matrix and build dispersion curves of polaritons in such nanocomposites. The paper shows calculating optical parameters of the surface polariton for several values of the radius of metal nanoparticles and the nanocomposite filling parameter. The authors also present the calculations of the complex refractive index for polaritons in composites with nanoparticles of different metals. In addition, the authors find the dependences of the real and imaginary parts of the complex refractive index of the nanocomposite on the normalized frequency for membranes with different thicknesses and calculate real and imaginary parts of dielectric constant for waves in several metals. Besides, the article provides an overview of important stages in the study of surface electromagnetic waves. It shows that the variation of the structure materials, size and concentration of nanoparticles opens wide possibilities for controlling the optical properties of composite mediums and their practical application. The considered nanocomposites are artificially created media whose material parameters can be controlled. The first method consists in changing the relative volume of the nanoparticles filling of the dielectric matrix. The second method consists in changing the dielectric constant of the nanocomposite matrix. The authors emphasize that the dielectric constant of the nanocomposite in this case acquires resonant properties in contrast to the permeability of the nanoparticles themselves.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121409097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.4
M. Maslova, Kristina Ryzhaja
{"title":"Internet Fraud as a Threat to Personal Information Security","authors":"M. Maslova, Kristina Ryzhaja","doi":"10.15688/nbit.jvolsu.2019.2.4","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.4","url":null,"abstract":"The paper analyzes the statistics of implementing known information threats, considers new types of Internet fraud and develops recommendations for protecting against unauthorized actions of Internet scammers.\u0000\u0000Internet fraud has long gone beyond mailing and has become widespread. Fraudsters operate in almost all spheres of human activity, and with the advent of various means of communication their activities have acquired new trends.\u0000\u0000The most common methods of online fraud are the following: fake shops with Internet sales, phishing, fundraising for charity, dating sites, viral content.\u0000\u0000The paper shows that the considered methods of Internet fraud are connected not so much with the Internet as directly with the user. Internet users should not only be aware of possible types and schemes of fraud, but also take care of software protection methods such as antivirus and timely updating all applications, browsers and systems. Only being up to date, constantly learning and being interested in both new threats and methods of their protection users can protect themselves and their loved ones from losses.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2019-10-01DOI: 10.15688/nbit.jvolsu.2019.2.2
J. Goncharenko, A. Golovin
{"title":"Developing a Software Module to Automate the Process of Categorizing Objects of Critical Information Infrastructure","authors":"J. Goncharenko, A. Golovin","doi":"10.15688/nbit.jvolsu.2019.2.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.2","url":null,"abstract":"This article presents a program for automating the process of categorizing critical information infrastructure of the Russian Federation. The program for automating the process of categorizing critical information infrastructure objects is located on Windows 7 that provides consistent, logically verified work. When you run it, the user is given the ability to automatically enter data in the object scope, type, architecture. As a development environment for this software product PyCharm developed by JetBrains based on IntelliJ IDEA was used for Python programming language. The program provides libraries pyqt5, python-docxtemplate’s, pyinstaller. In the end of the program the objects of critical information infrastructure are identified as the outcome of importance (or not given) and create the resulting document in Microsoft Word (.docx). Thus, the developed software module for automating the process of categorizing critical information infrastructure objects allows to speed up the process making it easier to implement.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125200626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}