scholarly journals Virtual Immediate Coding

2018 ◽  
Vol 7 (3.13) ◽  
pp. 14
Author(s):  
V V. Kotenko ◽  
A I. Polyakov

A distinctive feature of virtualization of noise-immune encoding is the realized possibility of complex solution of problems of noise immunity, protection against information intrusions and imitating resistance. This, with relatively low economic costs, will significantly expand the capabilities of telecommunications systems in terms of information security. The effectiveness of the complex solution of information protection tasks from the positions of virtualization of the noise-immune encoding processes is experimentally proved in the work. The effectiveness of protection from information intrusions provided by virtual noise-immune codes and the effect of virtualization on the efficiency of the original noise-immune code were experimentally investigated. The obtained results show that virtual noise-resistant coding provides the effectiveness of protection from information intrusions, comparable with the efficiency of modern standards of cryptographic protection, with significantly lower complexity of practical implementation. In general, the results of experimental studies show that the virtualization of the process of noise-immune encoding from the perspective of the approach proposed in [1] opens an additional possibility of protecting information in the part of ensuring information security. 

2021 ◽  
Vol 12 (4) ◽  
pp. 19-28
Author(s):  
Oleksandr Laptiev ◽  
Valentyn Sobchuk ◽  
Andrii Sobchuk ◽  
Serhii Laptiev ◽  
Tatiana Laptieva

In modern conditions, an important role in ensuring the information security of the enterprise and especially its economic component belongs to the processes of information security of the state as a whole. The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological basis is the basis for making sound and effective management decisions of the information security of the state at all levels. The article analyzes the approaches to estimating the assessment of economic costs for the information security system. The base model is selected. Using the basic model of assessing the level of protection of information in the social network from external influences on the information social resource, improvements were made to assess the economic feasibility of implementing a mechanism of technical means of information protection in social networks depending on the value of information. The improvement is based on the assumption that the amount of funds allocated by the attacking party is equal to the value of the information, the value of the information is the same for both parties, and the opposing parties are on equal terms. The main parameters on which the efficiency of the proposed model of estimating economic costs depends. The efficiency of the proposed model of estimating economic costs depends on the accuracy of formulating the probability of success of protection and determining the value of information. The prospect of further research and development may be aimed at taking into account in the model additional factors that affect the estimation of costs for the information security system, which will allow calculations to be performed with greater accuracy.


2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.


Author(s):  
И.С. ШЕРСТНИКОВ ◽  
В.В. СМИРНОВА ◽  
В.Б. ПОПОВ

Приводятся результаты экспериментальных исследованийпомехозащищенности цепей многопарных LAN-кабелей вдиапазоне частот до 100 МГц Показано, что разработанный комплекс мероприятий по технологии скрутки кабельного сердечника, наложению на него экрана и защитной полимерной оболочки позволяет обеспечить выполнение норм на электрические характеристики помехозащищенности цепей кабеля, отвечающих требованиям категории 5е. The results of experimental studies of noise immunity of multipair LAN-cable circuits in the frequency range up to 100 MHz are presented. It is shown that the developed set of measures for the technology of twisting the cable core and applying a screen and a protective polymer sheath on it made it possible to ensure compliance with the standards for the electrical characteristics of noise immunity of cable circuits that meet the requirements of category 5e.


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


2021 ◽  
Vol 247 ◽  
pp. 01030
Author(s):  
Mafiiat Rakhmanova ◽  
Amiiat Demirova ◽  
Magomed Akhmedov ◽  
Faina Azimova ◽  
Irada Gadzhibekova ◽  
...  

New technical solutions improving the process of thermal sterilization of canned products through the use of multilevel high-temperature modes and heat recovery have been considered and proposed. The essence of the developed method lies in the fact that the heat released by cooling cans with the product that has undergone thermal sterilization is used to heat other cans with the product queued for sterilization. In this mode of heat treatment, except in the last stage, the heat emitted by cooled cans that have already undergone heat treatment is used to heat up the canned food. Hence, the use of the principle of heat recovery by cooling canned products in the baths where others are simultaneously heated provides a significant saving of heat energy and water. Depending on the temperature parameters at different stages of the heat treatment, the heat recovery rate can reach up to 90%. The method also provides savings on cooling water. For the practical implementation of the developed method, the design of the device for multilevel high-temperature thermal sterilization of canned food with heat recovery has been developed. On the basis of experimental studies, new, multilevel high-temperature modes of apple compote sterilization have been developed.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


2020 ◽  
Vol 23 (6) ◽  
pp. 99-114
Author(s):  
B. S. Dongak ◽  
A. S. Shatohin ◽  
R. V. Meshcheryakov

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 


Author(s):  
М. М. Abdurazakov ◽  
Z. О. Batygov

The article deals with the problems of information security and its provision in relation to society and its educational environment, processes and relations, subjects and objects. The necessity of forming the corresponding subject-information competence of subjects, personal culture of information security is shown.It is noted that the information security of educational subjects is a specific part of the general security of education as its qualitative development in the developing information society in accordance with its properties and requirements. The concept of information security in the field of education is formulated in the context of a general concept and in the aspect of its specificity in education, its educational and educational processes, as well as in the aspect of personal, psychological, age and other properties of subjects of education. This presupposes the presence of a corresponding purposefulness of general education, which also acquires the quality of informational education, and its expression in the content of education and subject-oriented educational training. In particular, this applies to the general education subject “Informatics” as the main resource of information education, in the process of forming the relevant knowledge, competencies and personal qualities.The necessity of mandatory inclusion of the relevant topics in the content of information education in the context of information security and information protection has been substantiated: the state and problems of information security, personal security; goals and objectives of information security; legal and other aspects of information protection, means of protecting electronic data in the field of education.


Author(s):  
Valery V. Arutyunov ◽  

The article notes the increasing importance of ensuring information security in the data processing, storage, search and transmission in the information systems and information and telecommunications networks in the 21st century. Current research areas in the field of the information security are considered, such as biometric methods and the information protection tools, blockchain technology, cryptography (including quantum cryptography), Intrusion Detection Systems (IDS), the steganographic information protection methods, Data Leakage Prevention systems (DLPsystems), cyberbullying, obfuscation methods, and the information security management. The author analyzes the dynamics of changes in scientometric indicators for scientific activity (publication, citation and Hirsh index) in 2010-2019 with relation to the research areas concerned. A number of trends for those indicators were revealed during the analyzed period, including an explosive growth of publications in the following areas: blockchain technology, information security management, biometric methods and the information protection tools, quantum cryptography, obfuscation methods. After four years of stable demand for research results in the field of information security management, since 2015, that indicator has been falling, what was possibly caused by the 2014 crisis. The growth of the citation index until the end of the period was noted only for two areas: blockchain technology and cyberbullying. The maximum value in indicators of demand for the results of Russian scientists work, achieved by Russian scientists in 2010-2019, was identified in the area of cyberbullying, the minimum – in the field of DLP-systems. The analysis of annual scientometric indicators was carried out using the RSCI database (Russian science citation index).


Sign in / Sign up

Export Citation Format

Share Document