INFORMATION SYSTEMS PROACTIVE PROTECTION SUITE AGAINST NETWORK RECONNAISSANCE

Author(s):  
S. P. Sokolovsky

The usage of known protection tools in information systems, including cryptographic ones, does not allow ensuring the confidentiality of information about its composition, structure and functioning algorithms, due to the fact that modern network technologies require addressable information in the service headers of the transmitted message packets. Strict dependence of information systems configurations on the quality requirements for the architecture, as well as established security policies set by regulators, causes them to have the properties of static, homogeneous and deterministic network parameters. This gives the adversary a number of indisputable advantages to non-compromising conduct network reconnaissance, high reliability of its results over a long period of time, as well as advance (planned) formation and application of the optimal set of tools to implement computer attacks. In this regard, there is a need to develop security technologies that replace static parameters of information systems with the dynamic ones. The analysis of existing technologies in the subject area under consideration showed a number of their inherent disadvantages, consisting in high resource intensity, insufficient performance and narrowness of the scope. In order to solve this problem, the author proposed a new technical solution that allows to level the disadvantages of known analogues and surpasses them by a number of criteria. The technical shape of the suite, consisting of three interconnected subsystems, that allows to mask information directions, the parameters of local area networks and manage the parameters of network connections with network reconnaissance tools, is presented and justified.

2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


2021 ◽  
Vol 7 (1(37)) ◽  
pp. 44-49
Author(s):  
Sergey Alexandrovich Golitsyn ◽  
Anastasia Dmitrievna Shulzhenko

This article discusses the issues of organizing countering computer attacks based on predicting the directions of their development and the formation of alternatives to counter them. The functional-structural diagram and architecture of the subsystem for predicting computer attacks are proposed.


2020 ◽  
pp. 2-18
Author(s):  
Dmitry Tali ◽  
◽  
Oleg Finko ◽  
◽  

The purpose of the research is to increase the level of security of electronic document metadata in the face of destructive influences from authorized users (insiders). Research methods: new scientific results allowed using a combination of data integrity control method based on the «write once» method and of authentication of HMAС messages (hash-based message authentication, as well as graph theory methods. Research result: a method of cryptographic recursive 2-D control of the integrity of electronic documents metadata is proposed. The analysis of the object of the study was carried out, based on the results of which it was concluded that it is necessary to effectively protect the metadata of electronic documents processed by automated information systems of electronic document management. Developed and described a mathematical model of the proposed method, based on graph theory. The developed technical solution makes it possible to implement the functions of cryptographic recursive twodimensional control of the integrity of the metadata of electronic documents, as well as to provide the possibility of localizing modified (with signs of violation of integrity) metadata records, in conditions of destructive influences of authorized users (insiders). This, in turn, reduces the likelihood of collusion between trusted parties by introducing mutual control over the results of their actions. The proposed solution makes it possible to ensure control of the integrity of data processed by departmental automated information systems of electronic document management, where, due to the peculiarities of their construction, it is impossible to effectively use the currently popular blockchain technology.


2017 ◽  
Vol 10 (3) ◽  
pp. 245-255
Author(s):  
Mitia Frumin

Abstract The Hebrew calendar is a lunisolar calendar. Its months are based on the revolution of the moon about the Earth, as it is said: This is the burnt offering of every new moon throughout the months of the year1 (Num. 28:14) At the present time the moment of the true new moon is approximated mathematically. However during the Second Temple period, the beginning of the new lunar month had to be observed and certified by witnesses. Then the Sanhedrin Court was to make a public proclamation on the first day of the lunar month (ראש חודש). In Mishnah, Tractate Rosh Hashana, Chapter 2 describes the process of communicating the information about the beginning of new month through the chain of beacon fires: “From the Mount of Olives to Sartaba, and from Sartaba to Grofina, and from Grofina to Hauran, and from Hauran to Bet Biltin. From Bet Biltin they did not move, but rather waved back and forth and up and down until he saw the whole of the diaspora before him lit up like one bonfire.”2 Questioning of reliability of the quoted above description, its completeness and exclusiveness of the delineated in the Mishnah route is beyond the scope of the presented research. In this article we’ll apply methods of the geographic information systems (GIS) analysis in order to examine the existed theories regarding localization of Sartaba - the second mentioned station in the chain of beacon fires, reveal their discrepancies and propose an innovative, albeit rather technical, solution for long-known problem.


2021 ◽  
pp. 12-20
Author(s):  
Sergey Kondakov ◽  
◽  
Ilya Rud ◽  

Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.


Author(s):  
Mohd Ahamad

A new concept in power generation is a microgrid. The Microgrid concept assumes a cluster of loads and microsources operating as a single controllable system that provides power to its local area. This concept provides a new paradigm for defining the operation of distributed generation. The microsources of special interest for MGs are small (<100-kW) units with power electronic interfaces. These sources are placed at customers sites. They are low cost, low voltage and have a high reliability with few emissions. Power electronics provide the control and flexibility required by the MG concept. A properly designed power electronics and controllers insure that the MG can meet the needs of its customers as well as the utilities. The goal of this project is to build a complete model of Microgrid including the power sources, their power electronics, and a load and mains model in THE HOMER. The HOMER Micropower Optimization Model is a computer model developed by the U.S. National Renewable Energy Laboratory (NREL) to assist in the design of micropower systems and to facilitate the comparison of power generation technologies across a wide range of applications. HOMER models a power system’s physical behavior and its life-cycle cost, which is the total cost of installing and operating the system over its life span. HOMER allows the modeler to compare many different design options based on their technical and economic merits. It also assists in understanding and quantifying the effects of uncertainty or changes in the inputs.


Author(s):  
David Rhind

Maps and mapping are the manifestation of geography for the great bulk of the population. These play a key role in society and underpin many functions of the state. The situation is particularly marked in Britain, both in war and peace, where the Ordnance Survey (the country's national mapping agency) has been central to national mapping for more than two centuries. It is no exaggeration to say that mapping underpins many of the activities of society, especially in Britain. The collation, visualisation and analysis of geographical information through maps are intimately intertwined. Since British geography and British geographers have been involved in all aspects of mapping and its successor, this chapter covers both academic and non-academic aspects of the subject area. This chapter examines the geographical underpinning of British society and its radical transformation, Geographical Information Systems and information technology and non-trivial cartography.


Author(s):  
M. Gordon Hunter

The subject area of the application of information systems to small business is a thoroughly interesting, yet relatively under-researched topic. Small business is an important part of any economy. In the United Kingdom, 25% of the gross domestic product is produced by small business, which employs 65% of the nation’s workers (Ballantine et al., 1998). In Canada, 43% of economic output is accounted for by small business, employing 50% of private sector employees (Industry Canada, 1997). Further, governments view the small business sector as that component of the economy that can best contribute to economic growth (Balderson, 2000). Given the importance of this sector of the economy, it is incumbent upon researchers and managers of small business to develop a better understanding of how information systems may contribute to the operation and growth of individual businesses as well as the overall sector. The objective of this article is to provide an overview of information systems used by small business. Research projects are presented that describe the current situation. Recommendations are then proffered for various stakeholders who should contribute to a more effective use of information systems by small business.


Author(s):  
David A. Banks

This chapter examines some of the issues that are driving the development of a master’s course designated as “Information Systems Development Methodologies.” The course takes a “reality as a social construct” view of the world, the purpose of the approach being to encourage students to challenge assumptions and enhance their abilities to research, reflect, critique, and develop strong arguments to support their understanding of the subject area. An interpretive approach such as this can challenge those students whose experiences of previous educational settings have been more strongly oriented toward rote or positivistic teaching and learning styles. The chapter outlines a number of approaches that have been adopted to help students deal with interpretive approaches to learning and to introduce them to issues of belief, inquiry, argument, and reflection.


Sign in / Sign up

Export Citation Format

Share Document