{"title":"网络安全问题","authors":"Alexander Labinsky","doi":"10.61260/2307-7476-2024-2-39-46","DOIUrl":null,"url":null,"abstract":"The following are considered: \n principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission; \n principles and measures to ensure the security of the corporate network, as well as the types \nof information protection provided by these security measures; \n virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer; \n systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools; \n Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection. \nThe Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.","PeriodicalId":477082,"journal":{"name":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","volume":"46 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ON THE ISSUE OF NETWORK SECURITY\",\"authors\":\"Alexander Labinsky\",\"doi\":\"10.61260/2307-7476-2024-2-39-46\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The following are considered: \\n principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission; \\n principles and measures to ensure the security of the corporate network, as well as the types \\nof information protection provided by these security measures; \\n virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer; \\n systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools; \\n Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection. \\nThe Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.\",\"PeriodicalId\":477082,\"journal\":{\"name\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"volume\":\"46 3\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.61260/2307-7476-2024-2-39-46\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.61260/2307-7476-2024-2-39-46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
考虑了以下内容: 确保企业网络安全的原则和手段,以及提供可靠保护和安全数据传输的虚拟专用网络的特点; 确保企业网络安全的原则和措施,以及这些安全措施提供的信息保护类型; 提供安全加密用户连接网络的虚拟专用网络(VPN)。使用 VPN 可提供可靠的数据保护、掩盖用户的地理位置、访问区域内容和安全数据传输; 用于检测和预防网络黑客攻击威胁的系统,其中主要是 Kali Linux 软件包,以及用于 Linux 和 Windows 网络监控工具的 Windows 子系统的功能; Windows 网络监控工具,包括在控制台命令行模式下工作的实用程序,允许您检查远程个人计算机的可用性并诊断连接。Kali Linux 软件包是 Linux 操作系统的发行包,预装了 600 多个网络渗透测试程序。在该软件包的功能中,文章讨论了网络漏洞的搜索和利用、检查 SSL 证书和开放端口的正确配置、跟踪数据传输路线、检查服务器的可用性以及搜索网络问题。
The following are considered:
principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission;
principles and measures to ensure the security of the corporate network, as well as the types
of information protection provided by these security measures;
virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer;
systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools;
Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection.
The Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.