scholarly journals Organization of secure remote access for an employee of a commercial company working outside the office

Author(s):  
Виталий Анатольевич Довгаль ◽  
Сусана Касеевна Меретукова ◽  
Денис Игоревич Шередько

Рассматриваются способы и особенности организации удаленного доступа сотрудниками коммерческой компании, выполняющими свои должностные обязанности, находясь вне офиса, что является актуальным в связи с необходимостью изоляции в условиях пандемии. Использование общедоступных каналов передачи данных требует применения эффективных систем безопасности информации. На основании рассмотрения угроз передачи данных, присущих удаленному доступу, и способов их нейтрализации в данной работе предлагаются варианты замены зарубежного программного обеспечения, используемого в российских коммерческих компаниях, аналогичным ему по реализуемым функциям отечественным в рамках тенденции импортозамещения. The article discusses the methods and features of organizing remote access by employees of a commercial company who perform their official duties while out of the office, which is relevant due to the need for isolation in a pandemic. The use of public data transmission channels requires the use of effective information security systems. Based on the consideration of data transmission threats inherent in remote access and ways to neutralize them, this paper suggests options for replacing foreign software used in Russian commercial companies with similar domestic functions in terms of the import substitution trend.

2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2021 ◽  
Author(s):  
Larisa K. Ptitsyna ◽  
Anastasia O. Zharanova ◽  
Mikhail P. Belov ◽  
Aleksey V. Ptitsyn

2011 ◽  
Vol 121-126 ◽  
pp. 1259-1263
Author(s):  
Zhong Min Yao ◽  
Xi Guang Liu ◽  
Ya Zhen Wang

With the application scale and area of the building PV power station continuous extension, data transmission and monitoring management of the building PV power station have become increasingly important.This paper introduces a kind of data delivering and distributed monitoring management system of the building PV power station based on ZigBee wireless network,this system has information transmission modules based on ZigBee wireless network, region monitoring and magement module and remote access module. ZigBee wireless network could deliver datas of the building PV power station to the center of region monitoring and management system,ultimately,the datas were deposited in the database of region monitoring and management system,The Electricity Regulatory Office and The Power Company used remote transmission and monitoring system by remote access system on the Internet, to access data reports of the building PV power station in the database of region monitoring and magement system.System test results can carry out the building PV power station’s data transmission, monitoring system’s data management and remote access by the Internet.


2019 ◽  
Vol 1 (2) ◽  
pp. 115-119
Author(s):  
V.V. Korchynskyi ◽  
◽  
K. Alfaion ◽  
Y.V. Kopytin ◽  
M.V. Kopytina

Sign in / Sign up

Export Citation Format

Share Document