{"title":"Rationale for Principles of Developing Control and Protection of Web Content Using CMS Drupal","authors":"U. Lapteva, O. Kuzyakov","doi":"10.1109/FAREASTCON.2018.8602487","DOIUrl":null,"url":null,"abstract":"The paper describes the solution of the problem of the porting content from the old website to the new platform with added interactive functionality. Made the rationale for the selection of the content management system Drupal-based on the analysis of the comparative characteristics of the other CMS. The paper provides detailed practical implementation of the desired functionality. A brief overview of the classes of functional requirements for information security is given. On the example of one of the classes the adaptation of the ranking method to assess the probability of unauthorized access taking into account the factors formulated. For each factor are valid values. The analysis of the password length depending on the size of the original alphabet of characters. Probabilistic estimates of hacking are calculated, recommendations on the optimal combination are given.","PeriodicalId":177690,"journal":{"name":"2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FAREASTCON.2018.8602487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The paper describes the solution of the problem of the porting content from the old website to the new platform with added interactive functionality. Made the rationale for the selection of the content management system Drupal-based on the analysis of the comparative characteristics of the other CMS. The paper provides detailed practical implementation of the desired functionality. A brief overview of the classes of functional requirements for information security is given. On the example of one of the classes the adaptation of the ranking method to assess the probability of unauthorized access taking into account the factors formulated. For each factor are valid values. The analysis of the password length depending on the size of the original alphabet of characters. Probabilistic estimates of hacking are calculated, recommendations on the optimal combination are given.