Legal, regulatory and metrological support of information security system in Ukraine
Latest Publications


TOTAL DOCUMENTS

23
(FIVE YEARS 9)

H-INDEX

0
(FIVE YEARS 0)

Published By Kyiv Politechnic Institute

2411-0671, 2074-9481

Author(s):  
Nataliiа Borodina ◽  
Vasyl Golinko ◽  
Serhii Cheberiachko

The analysis of the legislative base of Ukraine in the field of national safety is performed. It is established that the existing system of national safety does not fully take into account such components as: transport safety, life safety, industrial safety, labor safety (labor protection), man-made safety, fire safety, sanitary and epidemiological safety. It should be noted that despite the urgent need to ensure cybersecurity in modern conditions, the training of specialists carried out in higher education institutions is not coordinated with the state bodies that formulate and implement state policy in the field of national safety. It is shown that currently the terms “Civil Safety” and “Economic Security” are not defined by law and this component of national safety is not included in the national safety system at all.  The structure of national safety is proposed and the compliance of safety types with the main components of national safety is determined, which will allow to remove the existing uncertainties and contradictions in the legislation. It is recommended that the next revision of the legal framework of Ukraine in the field of safety take into account the proposed structure of national safety and the defined compliance of safety with the main components of national safety, which will remove existing uncertainties and contradictions in the legislation. At the same time, the proposed structure of national safety can be changed and new definitions of concepts will be provided, which will already be based on the type of threat (military / non-military) and on the objects of influence (state / society / person).


Author(s):  
Olena Azarenko ◽  
Volodymyr Mirnenko ◽  
Nina Rashkevich ◽  
Olga Shevchenko ◽  
Tatyana Shevchenko

The paper presents a developed laboratory setup that allows experimental studies of the influence of indicators of the physical state of landfill soil on the stability of slopes to shear, to check the reliability of the mathematical model and the information and technical method developed on its basis for preventing emergencies of the cascade type of propagation due to the displacement of landfill soil on a solid landfill household waste with technological liquidation energy-intensive equipment. The main elements of the developed installation are a rectangular experimental box with swivel and fixed parts, swivel and locking mechanisms, tabletop plates, a sprayer, and a tangential load system. As the main requirements for the installation, the possibility of conducting a series of experiments based on the use of landslide experimental blocks with a change in their humidity, density, temperature and angle of inclination of the base of the sliding surface, as well as mechanical characteristics - the angle of internal friction, specific adhesion of landfill soil. Carrying out research using a laboratory setup is based on the assumption that the transition of a landslide experimental block of landfill soil into a dynamic state is considered the onset of an emergency at the object level of distribution. In the course of the work, a technique was developed for conducting experimental studies and processing observation results. The methodology includes the following procedures: establishment of initial and boundary conditions; preparation of a laboratory installation; conducting a series of experiments to determine the mechanical parameters and the shear angle of the experimental blocks, and a series of experiments to determine the indicators of moisture, temperature and density of landfill soil on the fact of the shift, taking into account the gradual increase in moisture; statistical processing to obtain a statistical sample of the values of the effective indicators of the physical state of landfill soil included in the confidence interval according to the classical statistical method - Student's t-test.


Author(s):  
Yurii Kulakov ◽  
Liudmyla Tereikovska ◽  
Ihor Tereikovskyi

An important direction of increasing the security and expanding the functionality of modern information systems is the introduction of face recognition tools and user emotions by their keyboard handwriting. The expediency of improving the indicated recognition means by introducing modern neural network solutions into them is shown. A way has been developed for using a convolutional neural network for recognizing a user's face and emotions from keyboard handwriting, the features of which are the procedure for adapting the structural parameters of a convolutional neural network of the VGG type to the expected conditions of use and a procedure for determining the input field, which provides the representation of the parameters of colored channels. After adapting the structural parameters, the VGG network was implemented using the MATLAB R2018b application package, which made it possible to carry out computer experiments aimed at verifying the proposed method. As a result of the conducted computer experiments, it was determined that the use of the proposed method of applying a convolutional neural network makes it possible to achieve a user face recognition accuracy of about 82% with 50 learning epochs. The need for further research in the direction of the formation of a training sample is shown, which will ensure high-quality training of the neural network model.


Author(s):  
Yevhen Morshch ◽  
Olena Andriiuk ◽  
Kostyantyn Lysychenko ◽  
Andrii Pruskyi

The paper presents approaches to the development of priorities in the system of adaptive environmental monitoring of areas of hostilities and military exercises. The peculiarities of forming an interval scale for indices and indicators of disturbances of ecosystems that are under the influence of military-man-made load are also given.


Author(s):  
Andrii Pryimak ◽  
Vasyl Karpinets ◽  
Yana Yaremchuk

It is known that with the growing popularity of blockchain and cryptocurrency technology, many people want to make money on it. As a result, hackers who use other people's resources for easy profit are becoming more active. There are many different tools available today to protect user’s personal computers from cryptojacking, but effective protection for server operating systems are still actual.This paper investigates the possibility of searching for unauthorized cryptocurrency mining processes by three parameters: search for suspicious processes by name, by binary signature and by connection to the mining pool.Based on the study, a method of automated search for unauthorized cryptocurrency mining in server OS containers was proposed, which consists of 5 main stages:1. Search for unauthorized cryptocurrency generation processes by process name.2. Search by binary signature.3. Search for a connection to a mining pool4. Detection of the process of unauthorized mining and stopping the container in which the mining process was detected.5. Notification of the system administrator about the detection of unauthorized cryptocurrency generation processes.It is worth noting that, unlike existing tools, the developed method searches for containers from the host virtual machine, so that there is no need to run a search in each of the containers, as it can be a large number of them and as a result reduce the load on the system.The block diagram of the application for the implementation of the proposed method was also described, as well as examples of stopping the container in which an unauthorized mining process was found and the corresponding message to the system administrator.In addition, a study of the speed of the proposed method was conducted. The results of the test showed a time of 2,585 seconds, which reflects the fast operation and the absence of additional overload on the system.


Author(s):  
Olena Azarenko ◽  
Serhii Chumachenko ◽  
Gennadii Kamyshentsev ◽  
Yuliia Syrytsia ◽  
Olexandr Fesai

In this work, an information and analytical model of the psychophysiological state of the operator of the main control panel of a critical infrastructure facility has been developed, which provides an objective process for revealing a latent negative impact on people who provide the main production process at the enterprise. It is shown that the features of management of an emergency of a terrorist nature in the interests of its prevention and prevention, caused by a hidden electromagnetic effect on the operational composition of a critical infrastructure facility, are determined by taking into account five factors. This is control over the level of electromagnetic radiation and the psycho-emotional state of the personnel of the facility, the prevention of errors of the operational staff and hidden psycho-emotional impact on him, technical counteraction of the hidden electromagnetic influence. Theoretically, there are three possible solutions to the problem. The first is the positioning of the language source. The second definition of the boundaries of the linguistic parameters of the individual in various psychophysical states. The third definition of the psychophysical state of the operator by the discrete components of his linguistic spectrum. Obtaining this model of obtaining this model is achieved by determining the psychophysiological state of the operator. The information-analytical model of the psychophysiological state of the operator of the main control panel of the critical infrastructure facility is a system of three dependencies. The first of them describes the psychophysiological state of the operator, they change during the performance of his functional duties. The second describes the i-th element of the current psychophysiological state of the operator, changes in time, and the third describes the development of anomalies in the i-th element of the psychophysiological state of the operator, making it difficult for him to perform his duties.


Author(s):  
Serhii Chumachenko ◽  
Yevhen Morshch ◽  
Kostyantin Lysychenko ◽  
Andrii Pruskyi ◽  
Roman Shevchenko

To ensure stable management of technogenic safety and civil protection in these conditions, it is necessary to develop an information model for managing technogenic security under verious conditions of use of the Armed Forces of Ukraine with the provision of minimal risks and threats of emergencies of military technogenic origin. The information model provides for three components, namely: the first is a model for managing technogenic security safety in the zone of ​​the joint forces operation in a steady state; the second is  a model for managing technogenic safety in the area of ​​the joint forces operation in an emergency  of natural or technogenic origin; third is a model for managing technogenic security in the area of ​​the joint forces operation in an emergency of military-technogenic origin. The paper shows that the information model of the mechanism of man-made safety regulation during emergencies of military-man-made origin is a set of specific methods, forms, techniques, tools and levers of man-made safety regulation, through the improvement of which, in fact, the man-made safety system is improved. regional level. On the example of solving the practical problem of determining the depth and area of ​​distribution of the primary cloud of highly toxic substances and its impact on military facilities, shows the use of information model to provide the decision maker with necessary and sufficient information to make management decisions to ensure military-man-made security . To assess the effectiveness of mechanisms for state regulation of man-made safety at the regional level, it is proposed to use the method of hierarchy analysis. According to this model, the subject of management (management bodies in the field of technogenic safety) exerts a controlling influence (on the basis of laws, decrees, by-laws, standards, resolutions, orders, programs of ecological direction) on the object of management (social facilities, enterprises, natural objects), which in accordance with the received control impact, changes its state, activity, quantitative and qualitative parameters of the state or impact on the environment.


Author(s):  
Roman Gudak ◽  
Mikhailo Divizinyuk ◽  
Nataliya Kasatkina ◽  
Oleksandr Farrakhov ◽  
Roman Shevchenko

Emergency situations are objective (regardless of the attitude towards them) spatio-temporal processes, each of which is conventionally divided into five stages, namely: everyday accumulation of negative factors; extreme development of a negative factor; catastrophic event; elimination of the consequences of this event and their remote consequences. They occur on vehicles, man-made and natural objects, areas of the territory, water basins and in mountains, cities and administrative regions. The type of each emergency is tied to a specific catastrophic event that may occur, is happening or has already happened. The main goal of emergency management is to prevent a catastrophic event, and if it occurs, to minimize its consequences. The task of the management process is formulated by stages of the emergency.The main feature of the soils of the Carpathian Mountains is their relative looseness and water saturation. When additional volumes of the aquatic environment appear, which are set in motion by the forces of gravity, significant hydraulic gradients are created, which lead to landslides, mudflows, collapse of mountain slopes and banks of rivers and streams. Natural emergencies caused by hydrological and meteorological events in mountainous areas have five characteristics. This is the inevitability and suddenness of the onset of a catastrophic event, which can cover an extended territory, be accompanied by great destruction and changes in the terrain. Information and technical features of emergency management in a separate mountainous region include a detailed study of the area and monitoring with the local population, geoinformation modeling of disasters and early preparation of action plans, constant training of rescuers and preparation for the use of new rescue equipment – helicopters.


Author(s):  
Nataly Deyneko ◽  
Mikhailo Divizinyuk ◽  
Оlexandr Levterov ◽  
Volodymyr Mirnenko ◽  
Olga Shevchenko

The paper proposes the development of new approaches to the creation of emergency response systems using non-traditional power supplies in the event of damage to traditional power supply systems.The main idea of the work is the formation of integrated approaches to alternative methods based on the phenomenon of acoustic emission (AE) using an unconventional power source based on film solar cells on flexible substrates. The creation of photoconverters based on thin films from a variety of materials and compounds is a promising direction in the development of solar energy. Unfortunately, the efficiency of these photoconverters is not yet high enough, but the cost of equipment for their creation, and hence the cost of instrument structures, is already quite acceptable.The investigated solar cells were obtained by the method of thermal vacuum evaporation using a UVN67 vacuum unit with modified internal equipment.After manufacturing, solar cells (SCs) were investigated under standard laboratory conditions adopted for the study of solar cells for ground-based use, i.e. in the AM 1.5 mode with a luminous flux power of 100 mW / cm2 and a temperature of 25 ° C. To study degradation processes in such solar cells after measuring the initial parameters The solar cells were placed in a sealed plastic box and kept for 4 years at a temperature of 15-25 ° СChecking the elements demonstrate high degradation resistance, which provides general requirements for the material and the conditions for its creation promising for use as unconventional sources of power supply for emergency response systems and ensuring the use of information and technical methods for preventing emergency situations as a result of fire in conditions of damage to the power supply of emergency response systems.


Sign in / Sign up

Export Citation Format

Share Document