scholarly journals Improving the Methods for Protecting Information from Unauthorized Access

2018 ◽  
pp. 39-43
Author(s):  
Aleksandr Rodionov ◽  
Vladislav Belyanin ◽  
Aleksandr Gorbunov

The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.

2018 ◽  
Vol 3 (2) ◽  
pp. 96
Author(s):  
Bikmurzina R. R. ◽  
Melkonyan S. E. ◽  
Kolomiyets A. I.

This article presents analysis of economic security structure on the example of LUKOIL PJSC,  the internal Company documents were studied, stages of the managerial decisions making process concerning economic security issues were considered. Keywords: economic security, corporate security, personal data, policy and strategy of economic security, information protection


2021 ◽  
Vol 6 (3) ◽  
pp. 20-25
Author(s):  
Anastasia A. Voronina ◽  
◽  
Irina I. Skripina ◽  

Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term "information security". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of these problems. In the course of his work, the developer may accidentally make a mistake as a consequence of which a future vulnerability may be formed at this point. Vulnerability is a weak point of a program or software; having discovered this point, an attacker can easily harm information. If the threat came out deliberate, then there are methods to ensure the security of information. This article discusses information protection measures.


2021 ◽  
Vol 291 ◽  
pp. 03018
Author(s):  
Anton Nazarov ◽  
Dmitry Nazarov ◽  
Denis Kovtun

As a result of the spread of malicious information and spam in the Network, unauthorized access, disclosure, distortion, modification, destruction of both personal data of an individual user and digital data that make up the infrastructure of an entire state are possible. Therefore, ensuring information security is today one of the most important tasks of a society that seeks to preserve the current state of its territory of residence in the conditions of various external influences. Within the framework of information protection, a set of measures is implemented to ensure the security of data while maintaining their availability, confidentiality and integrity. The article deals with the problems of ensuring information security in the context of the transition to the digital economy. The article describes the main challenges and threats to databases in the form of unauthorized use, distortion, modification, and destruction of information. The directions and tools for preserving and protecting information posted on digital resources are defined.


Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


2013 ◽  
Vol 9 (16) ◽  
pp. 33-43
Author(s):  
Álvaro Javier Carrillo Hernández ◽  
Joan Katherine Zorovich Gutiérrez ◽  
Javier Enrique Arévalo Peña

Este articulo presenta el proceso de desarrollo de un módulo de capacitación en redes de área local (LAN: Local Area Networks), cuyos contenidos son de fácil entendimiento, que es posible tomarlo en un periodo muy corto de tiempo, que no depende directamente de un tutor para poderse realizar y que además tiene incluido un desarrollo práctico para la utilización del Laboratorio de Telemática de Fundación Universidad Autónoma de Colombia. Para poderlo realizar fue necesaria una indagación previa acerca del aprendizaje, la selección un plan temático, realizar la correspondiente recopilación bibliográfica para la creación de un marco teórico que fuese acorde con la teoría del aprendizaje y crear unas prácticas de laboratorio adecuadas que reforzaran el conocimiento adquirido. Como resultado se obtuvo un software didáctico que contiene todo el marco teórico distribuido en temáticas y prácticas de laboratorio que conjugan la parte teórica con la parte práctica.


Sign in / Sign up

Export Citation Format

Share Document