scholarly journals Benefits of effective implementation of information security systems in commercial company

2020 ◽  
Author(s):  
L.D. Azieva ◽  
B.S. Sadulaeva
Author(s):  
Виталий Анатольевич Довгаль ◽  
Сусана Касеевна Меретукова ◽  
Денис Игоревич Шередько

Рассматриваются способы и особенности организации удаленного доступа сотрудниками коммерческой компании, выполняющими свои должностные обязанности, находясь вне офиса, что является актуальным в связи с необходимостью изоляции в условиях пандемии. Использование общедоступных каналов передачи данных требует применения эффективных систем безопасности информации. На основании рассмотрения угроз передачи данных, присущих удаленному доступу, и способов их нейтрализации в данной работе предлагаются варианты замены зарубежного программного обеспечения, используемого в российских коммерческих компаниях, аналогичным ему по реализуемым функциям отечественным в рамках тенденции импортозамещения. The article discusses the methods and features of organizing remote access by employees of a commercial company who perform their official duties while out of the office, which is relevant due to the need for isolation in a pandemic. The use of public data transmission channels requires the use of effective information security systems. Based on the consideration of data transmission threats inherent in remote access and ways to neutralize them, this paper suggests options for replacing foreign software used in Russian commercial companies with similar domestic functions in terms of the import substitution trend.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2021 ◽  
Author(s):  
Larisa K. Ptitsyna ◽  
Anastasia O. Zharanova ◽  
Mikhail P. Belov ◽  
Aleksey V. Ptitsyn

2019 ◽  
Vol 1 (2) ◽  
pp. 115-119
Author(s):  
V.V. Korchynskyi ◽  
◽  
K. Alfaion ◽  
Y.V. Kopytin ◽  
M.V. Kopytina

Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection- the most important assets of business entities.


Sign in / Sign up

Export Citation Format

Share Document