{"title":"确保计算机网络信息活动对象的网络保护","authors":"A. Kotenko, M. Yasko","doi":"10.31673/2409-7292.2021.046469","DOIUrl":null,"url":null,"abstract":"Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ensuring cyber protection of a computer network object of information activity\",\"authors\":\"A. Kotenko, M. Yasko\",\"doi\":\"10.31673/2409-7292.2021.046469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2021.046469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.046469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ensuring cyber protection of a computer network object of information activity
Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.