scholarly journals RESEARCH OF INFORMATION SYSTEMS PROTECTION METHODS USING MODERN AUTHENTICATION METHODS

Author(s):  
K. T. Sharsheeva ◽  
A.N. Zhumabaeva ◽  
G.M. Usubakunova

At the moment, the exchange of data via insecure communication channels is the most vulnerable to information systems that store a large amount of data, the partial loss or substitution of which can lead to irreversible consequences. For this reason, in order to ensure security, the task is to use such methods and means that allow to verify the authenticity of the user's belonging to this system and, if successful, give access to information. In this paper are reviewed authentication methods that can be used depending on the needs of the systems, their vulnerabilities and recommend solutions to use. Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms: 1. The user knows some unified information (password entry); 2. The user has a unified information storage (smart card, token); 3. The user himself is an integral part of the authentication (biometric). Each authentication mechanism functions differently and has their strengths and weakness.

1985 ◽  
Vol 16 (4) ◽  
pp. 10-14
Author(s):  
George M. Watters

The Dictionary of Occupational Titles (DOT), supplements to the DOT, and other standardized vocational information have long been used to assist in job placement, vocational and educational planning, and litigation. Recent reliance on computerized information systems has both increased this use and provided rapid access to information results. However, the speed and clerical accuracy of current technology may mask invalid use of information system components. This article examines coding structures used with standardized occupational information to determine “transferable skills:” Proper transferable skills technology is essential to valid application of vocational information. It is intended that this article will spur information users to question and, where possible, determine the underlying systematic technology used for transferable skills analysis.


THE BULLETIN ◽  
2020 ◽  
Vol 5 (387) ◽  
pp. 16-24
Author(s):  
Nazym Zhumangaliyeva ◽  
◽  
Aliya Doszhanova ◽  
Anna Korchenko ◽  
Svitlana Kazmirchuk ◽  
...  

Nowadays, one of the relevant areas that is developing in the field of information security is associated with the use of Honeypot (virtual lures, online traps), and the selection of criteria for determination of the most effective Honeypot and their further classification is an urgent task. There are presented the main products in which virtual lures technology is implemented. Often they are used to study the behavior, approaches and methods that an unauthorized party uses for unauthorized access to information system resources. Online traps can imitate any resource, but more often they look like real production servers and workstations. There are known a number of fairly effective developments that are used to solve the problems of identifying attacks on the information systems resources, which are based on the fuzzy sets apparatus. They showed the effectiveness of using the appropriate mathematical apparatus, the use of which, for example, to formalize the approach for the formation of a set of criteria, will improve the process of determining the most effective Honeypot. For this purpose, there have been proposed criteria that characterize online traps, with the use of which there has been developed a method of linguistic variable standards formation for choosing the most effective Honeypot. The method is based on the formation of a set of Honeypot, subsets of characteristics and identifier values of linguistic estimates of Honeypot characteristics, a base and derivative frequency matrix, as well as on the construction of fuzzy terms and standard fuzzy numbers with their visualization. This will allow further classification and selection of them osteffective virtual lures.


2020 ◽  
Vol 2020 (3) ◽  
pp. 59-68
Author(s):  
A. Metelkov

There is an ongoing debate among users and specialists about the effectiveness of passwords used to authenticate subjects of access to information systems. The relevance of choosing the topic of the article is explained by the use of passwords in almost any information system, and in many systems password protection is used as the only means. At the same time, the password's resistance to opening often determines the security of the entire information system. Domestic and foreign modern approaches to password policy formation are analyzed and generalized. On this basis, proposals have been developed to improve the protection of information using passwords.


2017 ◽  
Vol 21 (6) ◽  
pp. 171-177
Author(s):  
A.N. Krutov

The article discusses the question of construction of the systems of protection against unauthorized access to information systems that are in commercial operation. It offers two concepts of development of the system from unauthorized access with minimal modifications in the already developed information system. As a means of building an effective system of protection in the process means of careful monitoring of access database DBMS Oracle (Fine Grained Access Control) are used. Depending on the size of the source database and the possibility to modify the table structure of the information system it is offered to use one or the other method for constructing a system of protection against unauthorized access. Developed protection system is relatively indepen- dent module that can be implemented in as needed.


1983 ◽  
Vol 6 (1) ◽  
pp. 71-79
Author(s):  
Miroslav Novotný

Information (storage and retrieval) systems lead to define sequents of formulas of the propositional calculus. We give necessary and sufficient conditions for a formula β to be a sequent of a formula α with respect to a given information system and/or with respect to a given information system and its given valuation.


2020 ◽  
Vol 2 (2) ◽  
pp. 128-143
Author(s):  
Tedi Budiman

Financial information system is an information system that provides information to individuals or groups of people, both inside and outside the company that contains financial problems and information about the flow of money for users in the company. Financial information systems are used to solve financial problems in a company, by meeting three financial principles: fast, safe, and inexpensive.Quick principle, the intention is that financial information systems must be able to provide the required data on time and can meet the needs. The Safe Principle means that the financial information system must be prepared with consideration of internal controls so that company assets are maintained. The Principle of Inexpensive, the intention is that the cost of implementing a financial information system must be reduced so that it is relatively inexpensive.Therefore we need technology media that can solve financial problems, and produce financial information to related parties quickly, safely and cheaply. One example of developing information technology today is computer technology and internet. Starting from financial problems and technological advances, the authors make a website-based financial management application to facilitate the parties that perform financial management and supervision.Method of development application program is used Waterfall method, with the following stages: Software Requirement Analysis, Software Design, Program Code Making, Testing, Support, Maintenance.


2017 ◽  
Vol 5 (1) ◽  
pp. 122
Author(s):  
Assist. Prof. Dr. Demokaan DEMİREL

The distinctive quality of the new social structure is that information becomes the only factor of production. In today's organizations, public administrators are directly responsible for applying information to administrative processes. In addition to his managerial responsibilities, a knowledge based organization requires every employee to take responsibility for achieving efficiency. This has increased the importance of information systems in the decision-making process. Information systems consist of computer and communication technology, data base management and model management and include activity processing system, management information system, decision support systems, senior management information system, expert systems and office automation systems. Information systems in the health sector aim at the management and provision of preventive and curative health services. The use of information systems in healthcare has the benefits of increasing service quality, shortening treatment processes, maximizing efficiency of the time, labour and medical devices. The use of information systems for clinical decision making and reducing medical errors in the healthcare industry dates back to the 1960s. Clinical information systems involve processing, storing and re-accessing information that supports patient care in a hospital. Clinical information systems are systems that are directly or indirectly related to patient care. These systems include electronic health/patient records, clinical decision support systems, nurse information systems, patient tracking systems, tele-medicine, case mix and smart card applications. Diagnosis-treatment systems are information-based systems used in the diagnosis and treatment of diseases. It consists of laboratory information systems, picture archiving and communication system, pharmacy information system, radiology information system, nuclear medicine information system. This study aims to evaluate the effectiveness of health information system applications in Turkey. The first part of the study focuses on the concept of information systems and the types of information systems in organization structures. In the second part, clinical information systems and applications for diagnosis-treatment systems in Turkey are examined. Finally, the study evaluates applications in the health sector qualitatively from the new organizational structure, which is formed by information systems.


2020 ◽  
Vol 9 (3) ◽  
pp. 33-38
Author(s):  
Iroda Abdullaeva ◽  
◽  
Dilyora Hoshimova ◽  
Hamdam Xomidov ◽  
Maftuna Raxmonova

This article is devoted to the prospects of the development of banking information systems in the Republic of Uzbekistan and highlights issues such as the processing of significant flows of information in the banking information system using advanced information processing tools


2020 ◽  
Vol 1 (3) ◽  
pp. 44-53
Author(s):  
E.T. Mannopova ◽  

This article describes the main approaches to the development of an intellectual information system for managing the educational process. When developing, the experience of some foreign and national universities is taken into account, taking into account the general principles of the educational process. The analysis showed that in the development of IP there is a need for a specific approach to the development of the system.


2014 ◽  
Vol 5 (1) ◽  
pp. 12-19
Author(s):  
Yohannes Kurniawan ◽  
Janastasha Christie Parapaga

The research goal is to identify and analyze the need of accounting information system related to the revenue cycle at PT XYZ. This paper designing the useful of accounting information systems to support the current business processes, especially on the revenue cycle process. The design method is an Object Oriented Analysis and Design (OOAD) which refers to the modeling and design requirements discipline. And the result achieved by analysis and design of accounting information systems can support current activities of the revenue cycle, especially for the documentation and store of transaction data, and generate reports in accordance with company requirements. Conclusions derived from the analysis and design is the implementation of a webbased application that can help PT XYZ to do the work in different places, such as marketing office, head office and especially at the exhibition. Index Terms - Accounting Information System, revenue cycle, OOAD 


Sign in / Sign up

Export Citation Format

Share Document