IMPLEMENTATION OF THE PROJECT OF MODERNIZATION OF THE SOFTWARE AND TECHNICAL COMPLEX OF EPIDEMIC RISK MODELING "NETEPIDEMIC"

Author(s):  
Евгений Романович Нежельский ◽  
Андрей Константинович Журавлев ◽  
Виктория Викторовна Исламгулова ◽  
Константин Александрович Разинкин ◽  
Игорь Леонидович Батаронов ◽  
...  

С каждым годом происходит рост атак злоумышленников на информационные системы с применением как вредоносного кода, так и методов социальной инженерии и вредоносных контентов. Существующие системы анализа эпидемических процессов предоставляют в основном средства визуализации результатов моделирования и не подходят для практического применения с целью воспроизведения реальных процессов диффузии вредоносного кода и контента в распределенных автоматизированных информационных системах. В статье приведена последовательность мероприятий, проведенных в рамках модернизации программно-технического комплекса «NetEpidemic» в направлении риск-мониторинга эпидемических процессов, протекающих в информационных системах, отвечающего требованиям в первую очередь прогнозирования и качественной визуализации результатов с целью его актуализации как инструмента научно-исследовательских изысканий и дальнейшего продвижения на рынке программного обеспечения. Every year, there is an increase in attacks by cybercriminals on information systems using both malicious code and methods of social engineering and malicious content. Existing systems for analyzing epidemic processes provide mainly visualization tools for modeling results and are not suitable for practical use in order to reproduce real processes of diffusion of malicious code and content in distributed automated information systems. The article provides a sequence of measures taken as part of the modernization of the software and hardware complex "NetEpidemic" in the direction of risk monitoring of epidemic processes occurring in information systems, which meets the requirements, first of all, of forecasting and high-quality visualization of results in order to update it as a research tool and further advancement in the software market.


2017 ◽  
Author(s):  
Seda Gurses ◽  
Joris Vredy Jan van Hoboken

Moving beyond algorithms and big data as starting points for discussions about privacy, the authors of Privacy After the Agile Turn focus our attention on the new modes of production of information systems. Specifically, they look at three shifts that have transformed most of the software industry: software is now delivered as services, software and hardware have moved into the cloud and software’s development is ever more agile. These shifts have altered the conditions for privacy governance, and rendered the typical mental models underlying regulatory frameworks for information systems out-of-date. After 'the agile turn', modularity in production processes creates new challenges for allocating regulatory responsibility. Privacy implications of software are harder to address due to the dynamic nature of services and feature development, which undercuts extant privacy regulation that assumes a clear beginning and end of production processes. And the data-driven nature of services, beyond the prospect of monetization, has become part of software development itself. With their focus on production, the authors manage to place known challenges to privacy in a new light and create new avenues for privacy research and practice.



Author(s):  
Ram Gopal Gupta ◽  
Bireshwar Dass Mazumdar ◽  
Kuldeep Yadav

The rapidly changing needs and opportunities of today’s global software market require unprecedented levels of code comprehension to integrate diverse information systems to share knowledge and collaborate among organizations. The combination of code comprehension with software agents not only provides a promising computing paradigm for efficient agent mediated code comprehension service for selection and integration of inter-organizational business processes but this combination also raises certain cognitive issues that need to be addressed. We will review some of the key cognitive models and theories of code comprehension that have emerged in software code comprehension. This paper will propose a cognitive model which will bring forth cognitive challenges, if handled properly by the organization would help in leveraging software design and dependencies.



2021 ◽  
Vol 28 (3) ◽  
pp. 314-316
Author(s):  
Yury V. Kosolapov

In the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the algorithm CheckTrace is committed. The correct description of the algorithm CheckTrace is given below. The author apologises for the inconvenience.



Author(s):  
Евгений Юрьевич Чапурин ◽  
Александр Евгеньевич Гуслянников ◽  
Лариса Владимировна Паринова ◽  
Владислав Георгиевич Юрасов ◽  
Юрий Геориевич Пастернак ◽  
...  

В статье описан разрабатываемый программно-технический комплекс, представляющий собой веб-платформу с интегрированными программами-сканерами и анализатором текста. Приведен перечень языков программирования, с помощью которых был разработан программно-технический комплекс. Наряду с этим представлен внешний вид программно-технического комплекса для выявления и анализа деструктивного контента. Представлен внешний вид десктопной и мобильной версии программно-технического комплекса, примеры авторизации. Описан процесс регистрации на платформе для поиска деструктивного контента и проведения риск-анализа. Приведен перечень основных блоков, которые становятся доступные после авторизации в личном кабинете. Также рассмотрена система баз данных, ее внешний вид и описаны все поля используемых таблиц (Log_pass, Users, Login_base, Comments, Emotions_ok, get_users_likes, groupsdestructive, groupsdestructive_log, Queries) и их применение. The article describes the developed software and hardware complex, which is a web platform with integrated scanners and a text analyzer. Along with this, the external view of the software and hardware complex for identifying and analyzing destructive content is presented. The database system, its appearance is also considered and all its fields and their application are described.



Significance Microsoft attributed the first hack exploiting these flaws to a Chinese state-sponsored group. These flaws were subsequently leaked online, and organisations that have failed to install software patches continue to be targeted. Over 30,000 systems have already been compromised in the United States alone, further straining US-China ties. Impacts The ubiquity of US technology will make vulnerabilities in US software a wider cybersecurity risk. Developing indigenous IT software and hardware will be unfeasible for most countries as rifts over 5G have exposed. Although tarnished, Microsoft will benefit from having few competitors in the business and domestic use software market.



2002 ◽  
Vol 16 (2) ◽  
pp. 143-164 ◽  
Author(s):  
Craig E. Bain ◽  
Alan I. Blankley ◽  
L. Murphy Smith

This study examines topics currently addressed in the introductory Accounting Information Systems (AIS) course and makes comparisons to past studies. The study includes an examination of 12 current AIS textbooks, syllabi from current AIS instructors, and the results of a survey of AIS faculty and professionals. The divisions of topics in the books and on the syllabi suggest that introduction to systems, internal control, and transaction processing are the most important topics to be covered. After these topics, the rankings diverge. The results of this study suggest that the emphasis historically placed on system analysis and design, while still important, is somewhat less than in the past. This was also apparent from the results of the authors' surveys of AIS faculty and professionals who use technology in their jobs. Both faculty and professionals agree that greater importance should be placed on teaching internal control and transactions processing, while moderate importance should be placed on software and hardware issues. Professionals ranked ethics and Internet education of greater importance than did faculty, while faculty rated computer fraud (which may tie in with ethics) and database management systems of greater importance than did the professionals. Professionals also placed higher importance on teaching software applications (particularly spreadsheet applications) than did faculty.



Author(s):  
Li Chao

In this case study, you will encounter some of the issues of lab development for delivering lab-based information systems courses online. Many small campuses have very limited budget or no budget at all for the computer lab specifically designed for information systems majors. Sometimes, even with new computers purchased, very few people know how to set them up for lab-based information systems (IS) courses. What are the software and hardware requirements for getting the lab online? How much will it cost? Where can you find resources for the lab development? To ensure quality teaching on IS-related topics, you have to deal with these issues. This case study will discuss how to create a lab that allows students to get hands-on practice for courses such as network management or database processing online with a shoestring budget.



Author(s):  
Jo-Mae B. Maris

Cross-discipline research requires researchers to understand many concepts outside their own discipline. Computing has increased in our everyday lives to the point that “ubiquitous computing” has become an entry in the Wikipedia (Wikepedia). Research is no different. Researchers outside of computer networkrelated disciplines must account for the effects of network-based information systems on their research. This article presents a model to aid researchers with the tasks of properly identifying the elements and effects of a network-based information system within their studies. The complexity associated with network-based information systems may be seen by considering a study involving the effectiveness of an Enterprise Resource Planning (ERP) system on a mid-sized company. A study becomes muddled when it fails to recognize the differences between the myriad of people, procedures, data, software, and hardware involved in the development, implementation, security, use, and support of an ERP system. If a researcher confuses network security with ERP configuration limitations, then two important aspects of the information system are obscured. Networks limit access to network resources so that only authorized users have access to their data. ERP applications allow an organization to restrict access to data to safeguard the data (Colt & Yang, 2004). Both aspects relate to the availability of data, but they come from different parts of the system. The two aspects should not be addressed as if both are attributable to the same source. Misidentifying network-based information system elements reflects negatively upon the legitimacy of an entire study.



Author(s):  
Otobong Inieke

Data security in the information age is a critical facet in the integrity and reliability of the various information systems making up value structures of businesses, organizations etc. Aside from professionals directly involved with securing data within these systems, the importance of data security is not readily apparent to the everyday user of devices in the information systems. The purpose of this literature review is to highlight challenges related to data security and business information systems in conjunction with digital literacy. An extensive literature review was conducted with the aim of identifying and describing scenarios of technology misuse as well as vulnerabilities in vital business information systems. A gap in awareness continues to plague those who leverage information systems for its myriad uses because everyday users will in most cases dismiss data security advice as alarmist or jargon-laden. This falls in line with a 2018 cyber security survey from Statista which showed that 22% of data security tasks was preventing malware while 17% of tasks were dedicated to preventing social engineering and phishing attacks. This literature review will describe possible data insecurity solutions as well as potential areas of further research. The paper will point out the importance of digital literacy as well as recommendations for its improvement in society and also ongoing research in that regard. The essence of this literature review is to identify certain everyday information systems such as decision support systems and transaction processing systems; while pointing out vulnerabilities and threat nature i.e. technical or non-technical and also demonstrating the importance of digital literacy and lack thereof.



Sign in / Sign up

Export Citation Format

Share Document