首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES 关于军事人员在部门关键信息基础设施中玩地理定位游戏的网络安全问题
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.7690
L. Kozubtsova, I. Kozubtsov, T. Tereshchenko, T. Bondarenko
The subject of research in the scientific article is the state of cybersecurity of the Armed Forces of Ukraine from the gambling dependence of military personnel. Purpose of the article. Study of the psychological and pedagogical problem of gambling addiction among military personnel with the involvement of cellular communications as a new problem in ensuring cybersecurity of the Armed Forces of Ukraine. The result of the study. Sociological studies have shown that people spend more than four hours with their smartphones every day. Smartphone addiction, "nomophobia" is caused by the problem of excessive internet use or internet addiction disorder. Addiction occurs from games, game apps, and online games. This article discusses individual augmented reality geolocation games and their appeal. It is established that the imposition of geolocation games on military personnel is aimed at collecting confidential information about critical infrastructure facilities of the Armed Forces of Ukraine under vivid psychological pleasure. All of them are aimed at where to structure the cybersecurity system of the Armed Forces of Ukraine, and the leakage of geographic information from the location of military facilities is their natural appearance. scientific novelty. For the first time, it is proposed to include the psychological and pedagogical problem of gambling addiction of military personnel on cellular communications in the group of factors that cause cybersecurity violations in the Armed Forces of Ukraine. The practical significance of the obtained scientific result gives grounds for developing recommendations for preventing the leakage of confidential information and conducting explanatory work with the personnel of the Armed Forces of Ukraine about the dangerous consequences both personally for them and for state security through the use of intrusive geolocation games. The presented study does not exhaust all aspects of this problem. The theoretical and practical results obtained in the course of scientific research form the basis for its further study in various aspects.
科学文章的研究主题是从军事人员的赌博依赖中研究乌克兰武装部队的网络安全状况。文章的目的。研究军事人员赌博成瘾的心理和教学问题,涉及蜂窝通信,作为确保乌克兰武装部队网络安全的新问题。研究的结果。社会学研究表明,人们每天花在智能手机上的时间超过4个小时。智能手机成瘾,“nomophobia”是由过度使用互联网或网络成瘾症引起的。上瘾发生在游戏、游戏应用和网络游戏中。本文讨论了单个增强现实地理定位游戏及其吸引力。可以确定的是,对军事人员进行地理定位游戏的目的是在生动的心理愉悦中收集有关乌克兰武装部队关键基础设施的机密信息。所有这些都是针对乌克兰武装部队网络安全系统的构建,军事设施位置的地理信息泄露是它们的自然表现。科学的新奇。首次提议将军事人员对蜂窝通信的赌博成瘾的心理和教学问题纳入导致乌克兰武装部队网络安全违规的因素组。所获得的科学结果的实际意义为制定防止机密信息泄露的建议和与乌克兰武装部队人员进行解释工作提供了依据,说明通过使用侵入性地理定位游戏对他们个人和国家安全的危险后果。所提出的研究并没有穷尽这个问题的所有方面。在科学研究过程中所取得的理论和实践成果为其在各方面的进一步研究奠定了基础。
{"title":"ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES","authors":"L. Kozubtsova, I. Kozubtsov, T. Tereshchenko, T. Bondarenko","doi":"10.28925/2663-4023.2022.17.7690","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.7690","url":null,"abstract":"The subject of research in the scientific article is the state of cybersecurity of the Armed Forces of Ukraine from the gambling dependence of military personnel. Purpose of the article. Study of the psychological and pedagogical problem of gambling addiction among military personnel with the involvement of cellular communications as a new problem in ensuring cybersecurity of the Armed Forces of Ukraine. The result of the study. Sociological studies have shown that people spend more than four hours with their smartphones every day. Smartphone addiction, \"nomophobia\" is caused by the problem of excessive internet use or internet addiction disorder. Addiction occurs from games, game apps, and online games. This article discusses individual augmented reality geolocation games and their appeal. It is established that the imposition of geolocation games on military personnel is aimed at collecting confidential information about critical infrastructure facilities of the Armed Forces of Ukraine under vivid psychological pleasure. All of them are aimed at where to structure the cybersecurity system of the Armed Forces of Ukraine, and the leakage of geographic information from the location of military facilities is their natural appearance. scientific novelty. For the first time, it is proposed to include the psychological and pedagogical problem of gambling addiction of military personnel on cellular communications in the group of factors that cause cybersecurity violations in the Armed Forces of Ukraine. The practical significance of the obtained scientific result gives grounds for developing recommendations for preventing the leakage of confidential information and conducting explanatory work with the personnel of the Armed Forces of Ukraine about the dangerous consequences both personally for them and for state security through the use of intrusive geolocation games. The presented study does not exhaust all aspects of this problem. The theoretical and practical results obtained in the course of scientific research form the basis for its further study in various aspects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR 网络战争中保护互联网资源免受ddos攻击的工具研究
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.91111
Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk
To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.
迄今为止,信息技术已进入社会的各个领域。由于科学技术的飞速发展,不仅在敌对领域,而且在社会控制论空间,传统的战争引入方法也在发生变化。现代世界的特点是网络空间战争活跃,其中最常见的攻击之一是ddos攻击,包括关键基础设施。这主要是由于各种小工具、电子设备和互联网极端密集地融入社会的生活和活动,违反这些设备会造成重大损害-对敌人的心理和从内部造成重大损害。违反这种正常功能的最简单和最流行的方法之一是使用资源过载,这甚至可能导致它们完全无法访问。超载的一种方式是在拒绝服务的情况下使用ddos攻击。大量向被攻击资源发送外部请求会导致这样的资源在短时间内试图开发大量的请求,这将导致其工作明显放缓,甚至导致资源完全停止。本文致力于研究ddos攻击的实施方法。详细讨论了实现它们的最常见方法和针对它们的主要保护方法。本文详细分析了针对DDoS攻击的防护技术和方法,并比较了现有企业的防护解决方案。但是随着信息技术的飞速发展,DDoS攻击也会随之发展。因此,针对它们的保护问题是相关的,特别是在网络条件下。
{"title":"RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR","authors":"Illia Laktionov, Andrii Kmit, I. Opirskyy, O. Harasymchuk","doi":"10.28925/2663-4023.2022.17.91111","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.91111","url":null,"abstract":"To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATIC PILOT SYSTEM FOR UNMANNED OF AIRCRAFT IN THE ABSENCE OF RADIO COMMUNICATION 在没有无线电通信的情况下,无人驾驶飞机的自动驾驶系统
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.93103
Tetyana Shabelnik, Serhii Krivenko, Olena Koneva
One of the most pressing problems of piloting unmanned aerial vehicles (UAV) in the absence of radio communication is considered in the article. Therefore, the aim of the article is to develop an algorithm and method of automatic piloting of UAV in terms of loss of radio control signal using the methods of technical vision. The most effective methods of tracking, identification and detection of landmarks are based on the comparison of reference information (database of known navigation objects) with the observation scene in real time.Working system of automatic piloting of UAVs in the conditions of loss of radio control signal or GPS-navigation developed. The hardware and software of the UAV provides full automatic control. The programming of the system consists of two stages: planning the flight task and calculating the trajectory of the UAV in flight. The planning of the flight task is carried out by setting the topographic landmarks and flight parameters in relation to them. At this stage, the criteria for the generalization of the various components of the landscape are formed and their division by gradations. This work is combined with the recognition of points with altitude marks, and fixing the heights of horizontal surfaces available in the area. All horizontal surfaces are tied with the shortest shooting strokes to at least of three points with elevations. The process of topography-based object selection is directly related to its segmentation, the results of which significantly affect the further process of image analysis and UAV control. The calibration of the starting point of the route occurs during the launch of the UAV. The control system automatically monitors the location of the UAV throughout the trajectory of the movement on a topographic basis relative to the prespecified landmarks. Structured shots of the terrain and topographic bases are compared during the flight. The algorithm is based on the comparison of geometric parameters of landmarks. The parameters of the geometric center O(x, y) and the area S are taken into account by such parameters. The control signal in the three axes OX, OY and OZ is determined for the first time by the method of least squares depending on the values ​​of the calculated coefficients of the original equations.
本文研究了在无无线电通信的情况下无人驾驶飞行器(UAV)的一个最紧迫的问题。因此,本文的目的是利用技术视觉的方法,开发一种针对无线电控制信号丢失的无人机自动驾驶算法和方法。最有效的地标跟踪、识别和检测方法是基于参考信息(已知导航目标数据库)与观测场景的实时对比。研制了无人机在失去无线电控制信号或gps导航条件下的自动驾驶工作系统。无人机的硬件和软件提供全自动控制。该系统的编程分为飞行任务规划和飞行轨迹计算两个阶段。飞行任务的规划是通过设置地形地标和与其相关的飞行参数来完成的。在这个阶段,形成了景观各个组成部分的概括标准,并通过等级划分它们。这项工作结合了对具有高度标记的点的识别,并固定了该地区可用的水平表面的高度。所有的水平面都以最短的击球与至少三个标高点相连。基于地形的目标选择过程直接关系到地形目标的分割,其分割结果对图像分析和无人机控制的后续处理具有重要影响。路线起点的校准在无人机发射时进行。控制系统在地形基础上相对于预先指定的地标在整个运动轨迹上自动监视UAV的位置。在飞行过程中,地形和地形基地的结构镜头进行了比较。该算法基于地标几何参数的比较。几何中心O(x, y)和面积S的参数由这些参数考虑。根据原方程的计算系数值,首次采用最小二乘法确定OX、y和OZ三轴上的控制信号。
{"title":"AUTOMATIC PILOT SYSTEM FOR UNMANNED OF AIRCRAFT IN THE ABSENCE OF RADIO COMMUNICATION","authors":"Tetyana Shabelnik, Serhii Krivenko, Olena Koneva","doi":"10.28925/2663-4023.2020.9.93103","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.93103","url":null,"abstract":"One of the most pressing problems of piloting unmanned aerial vehicles (UAV) in the absence of radio communication is considered in the article. Therefore, the aim of the article is to develop an algorithm and method of automatic piloting of UAV in terms of loss of radio control signal using the methods of technical vision. The most effective methods of tracking, identification and detection of landmarks are based on the comparison of reference information (database of known navigation objects) with the observation scene in real time.Working system of automatic piloting of UAVs in the conditions of loss of radio control signal or GPS-navigation developed. The hardware and software of the UAV provides full automatic control. The programming of the system consists of two stages: planning the flight task and calculating the trajectory of the UAV in flight. The planning of the flight task is carried out by setting the topographic landmarks and flight parameters in relation to them. At this stage, the criteria for the generalization of the various components of the landscape are formed and their division by gradations. This work is combined with the recognition of points with altitude marks, and fixing the heights of horizontal surfaces available in the area. All horizontal surfaces are tied with the shortest shooting strokes to at least of three points with elevations. The process of topography-based object selection is directly related to its segmentation, the results of which significantly affect the further process of image analysis and UAV control. The calibration of the starting point of the route occurs during the launch of the UAV. The control system automatically monitors the location of the UAV throughout the trajectory of the movement on a topographic basis relative to the prespecified landmarks. Structured shots of the terrain and topographic bases are compared during the flight. The algorithm is based on the comparison of geometric parameters of landmarks. The parameters of the geometric center O(x, y) and the area S are taken into account by such parameters. The control signal in the three axes OX, OY and OZ is determined for the first time by the method of least squares depending on the values ​​of the calculated coefficients of the original equations.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION 全球关键信息基础设施保护的最佳实践分析
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.184196
S. Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.
根据每天发生的大量网络事件,关键基础设施的保护过程不仅是一项重要的技术任务,也是一项重要的科学任务。然而,并非世界上所有国家都有机会对此类基础设施提供高质量的高水平保护。基于关键信息基础设施保护应在州一级进行管理的事实,各州需要制定一个监管框架来解决上述问题。考虑到乌克兰的法律框架,就像大多数后苏联国家一样,没有有效的方法来保护关键的信息基础设施,比如在美国或欧盟。乌克兰的立法只确定社会经济领域的某些对象,即可能导致社会危险后果的紧急情况,而没有制定确定和分类关键基础设施的单一程序。保护关键基础设施免受网络威胁领域的一些基本术语,包括“关键基础设施”术语,在规范上仍然含糊不清。关键基础设施保护过程中的活动组织机制和公私结构互动机制需要科学论证。本文对全球关键信息基础设施保护的最佳实践进行了分析,从而从国家立法层面和实践层面对乌克兰关键信息基础设施保护的过程进行了质的改进。
{"title":"WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION","authors":"S. Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova","doi":"10.28925/2663-4023.2020.10.184196","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.184196","url":null,"abstract":"According to the large number of cyber incidents that occur every day, the process of critical infrastructure protection is an important not only technical but also scientific task. However, not all states in the world have an opportunity to provide high-quality protection of such infrastructure at a high level. Based on the fact that the critical information infrastructure protection should be managed at the state level, states need to develop a regulatory framework to address the above issue. Considering the legal framework of Ukraine, as in most post-Soviet countries, there is no effective approach to the protection of critical information infrastructure, such as in the USA or in the EU. The legislation of Ukraine identifies only certain objects of the socio-economic sphere, emergencies where they can lead to socially dangerous consequences, while a single procedure for identification and classification of critical infrastructure is not developed. A number of basic terms in the field of critical infrastructure protection from cyber threats, including “critical infrastructure” term, remain normatively vague. The mechanism of organization of activity and interaction of state and private structures in the process of critical infrastructure protection needs scientific substantiation. In this paper, the analysis of the world’s best practices concerning critical information infrastructure protection was carried out, that allows to improve qualitatively, at the state legislative level and practice, process of critical information infrastructure protection of Ukraine.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES 采用c语言实现了对称加密标准,并与其他实用程序的执行时间进行了比较
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.118130
Liudmyla Hlynchuk, Tetiana Hryshanovych, A. Stupin
This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.
本研究致力于对文本信息进行加密和解密的对称加密算法- DES (Data encryption Standard,数据加密标准)的回顾、实现和分析。因为该算法不仅有口头描述,而且有执行方案和实现实例。通过实例验证了所实现算法的中间结果和信息加/解密结果,可以假设算法实现正确。比较了两个实用程序中提出的DES算法的执行时间。其中之一是OpenSSL,它使用汇编和C编程语言的功能开发。另一个实用程序是使用编程语言Java开发的。根据三个标准进行比较:从实用程序执行开始到完成的全时间;进程执行实用程序所花费的时间(停机时间和处理器执行其他未考虑的任务的时间);操作系统运行实用程序(如读取或写入文件)所花费的时间。分析表明,总执行时间不等于处理器和操作系统执行实用程序所花费的总时间。这是由于以下原因:总执行时间是用于执行实用程序的实时时间;它可以用秒表测量。然而,处理器执行实用程序所花费的时间的度量有些不同:如果两个核心执行相同的实用程序1秒,则总执行时间将是2秒,尽管实际上已经过去了1秒的时间。通过比较可以得出下一个结论:用于加密的时间少于用于解密的时间。不同实用程序的执行时间是不同的:OpenSSL实用程序的执行时间是最好的,因为这样的实现最适合硬件。就执行时间而言,Java中的实用程序是最差的。我们提出了执行时间最接近最快的DES算法的实现。因为已经发现了对称加密标准DES的许多黑客攻击可能性,特别是由于可能的密钥数量很少,因此存在覆盖它们的风险。因此,为了增加加密货币,已经开发了该算法的其他版本:双DES (2DES),三DES (3DES), DESX, G-DES。在未来,计划基于我们提出的DES算法实现开发一个实用程序,并演示其修改的操作。
{"title":"IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES","authors":"Liudmyla Hlynchuk, Tetiana Hryshanovych, A. Stupin","doi":"10.28925/2663-4023.2021.14.118130","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.118130","url":null,"abstract":"This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROCEDURE FOR USING NEURAL NETWORKS FOR SEGMENTATION OF RASTER IMAGES 程序使用神经网络分割光栅图像
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.2438
I. Tereikovskyi, Denys Chernyshev, O. Korchenko, L. Tereikovska, O. Tereikovskyi
Currently, means of semantic segmentation of images, based on the use of neural networks, are increasingly used in computer systems for various purposes. Despite significant successes in this field, one of the most important unsolved problems is the task of determining the type and parameters of convolutional neural networks, which are the basis of the encoder and decoder. As a result of the research, an appropriate procedure was developed that allows the neural network encoder and decoder to be adapted to the following conditions of the segmentation problem: image size, number of color channels, permissible minimum accuracy of segmentation, permissible maximum computational complexity of segmentation, the need to label segments, the need to select several segments, the need to select deformed, displaced and rotated objects, the maximum computational complexity of learning a neural network model is permissible; admissible training period of the neural network model. The implementation of the procedure of applying neural networks for image segmentation consists in the formation of the basic mathematical support, the construction of the main blocks and the general scheme of the procedure. The developed procedure was verified experimentally on examples of semantic segmentation of images containing objects such as a car. The obtained experimental results show that the application of the proposed procedure allows, avoiding complex long-term experiments, to build a neural network model that, with a sufficiently short training period, ensures the achievement of image segmentation accuracy of about 0.8, which corresponds to the best systems of a similar purpose. It is shown that the ways of further research in the direction of improving the methodological support of neural network segmentation of raster images should be correlated with the justified use of modern modules and mechanisms in the encoder and decoder, adapted to the significant conditions of the given task. For example, the use of the ResNet module allows you to increase the depth of the neural network due to the leveling of the gradient drop effect, and the Inception module provides a reduction in the number of weighting factors and the processing of objects of different sizes.
目前,基于神经网络的图像语义分割方法在计算机系统中的应用越来越广泛。尽管在该领域取得了重大成功,但最重要的未解决问题之一是确定卷积神经网络的类型和参数的任务,这是编码器和解码器的基础。研究的结果是,开发了一种合适的程序,使神经网络编码器和解码器适应于分割问题的以下条件:图像大小,颜色通道数,允许的最小分割精度,允许的最大分割计算复杂度,需要标记段,需要选择几个段,需要选择变形,位移和旋转的对象,学习神经网络模型的最大计算复杂度是允许的;神经网络模型的允许训练周期。应用神经网络进行图像分割的程序实现包括基本数学支持的形成、主要模块的构建和程序的总体方案。实验结果表明,所开发的方法对包含汽车等物体的图像进行了语义分割。实验结果表明,应用该方法可以避免复杂的长期实验,建立神经网络模型,在足够短的训练周期下,保证达到0.8左右的图像分割精度,相当于同类目的的最佳系统。研究表明,在改进栅格图像的神经网络分割方法支持的方向上,进一步研究的方法应该与编码器和解码器中合理使用现代模块和机制相关联,以适应给定任务的重要条件。例如,ResNet模块的使用允许你增加神经网络的深度,因为梯度下降效果的水平,盗梦空间模块提供了加权因子数量的减少和不同大小对象的处理。
{"title":"PROCEDURE FOR USING NEURAL NETWORKS FOR SEGMENTATION OF RASTER IMAGES","authors":"I. Tereikovskyi, Denys Chernyshev, O. Korchenko, L. Tereikovska, O. Tereikovskyi","doi":"10.28925/2663-4023.2022.18.2438","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.2438","url":null,"abstract":"Currently, means of semantic segmentation of images, based on the use of neural networks, are increasingly used in computer systems for various purposes. Despite significant successes in this field, one of the most important unsolved problems is the task of determining the type and parameters of convolutional neural networks, which are the basis of the encoder and decoder. As a result of the research, an appropriate procedure was developed that allows the neural network encoder and decoder to be adapted to the following conditions of the segmentation problem: image size, number of color channels, permissible minimum accuracy of segmentation, permissible maximum computational complexity of segmentation, the need to label segments, the need to select several segments, the need to select deformed, displaced and rotated objects, the maximum computational complexity of learning a neural network model is permissible; admissible training period of the neural network model. The implementation of the procedure of applying neural networks for image segmentation consists in the formation of the basic mathematical support, the construction of the main blocks and the general scheme of the procedure. The developed procedure was verified experimentally on examples of semantic segmentation of images containing objects such as a car. The obtained experimental results show that the application of the proposed procedure allows, avoiding complex long-term experiments, to build a neural network model that, with a sufficiently short training period, ensures the achievement of image segmentation accuracy of about 0.8, which corresponds to the best systems of a similar purpose. It is shown that the ways of further research in the direction of improving the methodological support of neural network segmentation of raster images should be correlated with the justified use of modern modules and mechanisms in the encoder and decoder, adapted to the significant conditions of the given task. For example, the use of the ResNet module allows you to increase the depth of the neural network due to the leveling of the gradient drop effect, and the Inception module provides a reduction in the number of weighting factors and the processing of objects of different sizes.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY 评估的前提条件形成了信息可靠性评估的方法论
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.164174
Z. Brzhevska, R. Kyrychok
The conceptual model of information reliability includes information resources, sources of information, factors of information confrontation, sources of factors of information confrontation (threats to authenticity), goals of attackers, functions, methods and means of ensuring reliability, and reliability indicators. The reliability of information (the degree of trust in data) contained in information resources is largely determined by the quality of sources and the ability of individuals to influence information processes. However, the concept of reliability of information is often associated with the categories of integrity and availability of information resources. All this must be ensured in the functioning of the information space in conditions of accidental or intentional informational influences. A necessary condition for achieving the required level of reliability of information is the construction of a comprehensive system for ensuring the reliability of the information. Information space of enterprises exists in the system of commodity-money relations, which is based on the concept of economic efficiency and can not afford to spend uncontrollably and unreasonably material resources for any activities. As a result, the assessment of the level of reliability of information and decision-making on measures to improve it raise the concomitant task of assessing the economic effect of their implementation.
信息可靠性的概念模型包括信息资源、信息来源、信息对抗因素、信息对抗因素来源(真实性威胁)、攻击者的目标、保证可靠性的功能、方法和手段、可靠性指标。信息资源所包含的信息的可靠性(对数据的信任程度)在很大程度上取决于信息来源的质量和个人影响信息处理的能力。然而,信息可靠性的概念往往与信息资源的完整性和可用性的类别相关联。所有这些都必须在偶然或有意的信息影响条件下确保信息空间的功能。信息可靠性达到要求水平的必要条件是建立全面的信息可靠性保障体系。企业的信息空间存在于商品-货币关系体系中,它是以经济效率为基础的,不能为任何活动不受控制、不合理地消耗物质资源。因此,评估信息的可靠性水平和就改进信息的措施作出决策的同时,也提出了评估执行这些措施的经济效果的任务。
{"title":"ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY","authors":"Z. Brzhevska, R. Kyrychok","doi":"10.28925/2663-4023.2022.15.164174","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.164174","url":null,"abstract":"The conceptual model of information reliability includes information resources, sources of information, factors of information confrontation, sources of factors of information confrontation (threats to authenticity), goals of attackers, functions, methods and means of ensuring reliability, and reliability indicators. The reliability of information (the degree of trust in data) contained in information resources is largely determined by the quality of sources and the ability of individuals to influence information processes. However, the concept of reliability of information is often associated with the categories of integrity and availability of information resources. All this must be ensured in the functioning of the information space in conditions of accidental or intentional informational influences. A necessary condition for achieving the required level of reliability of information is the construction of a comprehensive system for ensuring the reliability of the information. Information space of enterprises exists in the system of commodity-money relations, which is based on the concept of economic efficiency and can not afford to spend uncontrollably and unreasonably material resources for any activities. As a result, the assessment of the level of reliability of information and decision-making on measures to improve it raise the concomitant task of assessing the economic effect of their implementation.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE 网络防御项目管理的特点
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.4553
A. Andreichenko, S. Нorbachenko, O. Dykyi
The article provides a conceptual assessment of the existing definition of the term "project" and improved its management interpretation. The main essential characteristics of the project are formulated, the corresponding categorical device is given, which allows to systematize the project activity and adapt it to different objects of the application. In particular, an attempt was made to clarify the definition of the project in cybersecurity and cyberdefense. The processes influencing project activity at the level of the state, regions, and separate enterprises are defined. It is proved that although the problems of cybersecurity are gradually shifting to the state level in the context of national security, project activities in this area occur primarily at the level of the individual business. The peculiarities of cybersecurity projects such as increased level of state influence, the complexity of the initiation stage, critical implementation deadlines, significant budget differentiation, unlimited number of possible participants, high level of personalization, difficulty in calculating efficiency indicators are highlighted. The key tasks of project management in cybersecurity are defined: formulation of the main goal of the project and ranking of its goals, determination of necessary volumes and sources of financing, assessment of project risks, selection of project executors, scheduling of project implementation, resource requirements, control, etc. Proposals for optimizing project management processes in the field of cybersecurity have been formed. Emphasis is placed on the prospects of using consistent project management methods, due to simplified communication with customers, the ability to divide the process of implementing cybersecurity systems into certain stages, as well as to introduce an effective monitoring and control mechanism at these stages.
本文对“项目”一词的现有定义进行了概念性评估,并改进了其管理解释。制定了项目的主要基本特征,给出了相应的分类装置,使项目活动系统化,并使其适应不同的应用对象。特别是,试图澄清网络安全和网络防御项目的定义。定义了在州、地区和独立企业层面上影响项目活动的过程。事实证明,尽管在国家安全的背景下,网络安全问题正逐渐转移到国家层面,但该领域的项目活动主要发生在个体企业层面。强调了网络安全项目的特点,如国家影响程度提高、启动阶段的复杂性、关键的实施期限、显著的预算差异、可能的参与者数量不限、高度个性化、难以计算效率指标。定义了网络安全项目管理的关键任务:制定项目的主要目标及其目标排序,确定必要的资金数量和来源,评估项目风险,选择项目执行者,安排项目实施,资源需求,控制等。已经形成了优化网络安全领域项目管理流程的建议。重点放在使用一致的项目管理方法的前景,由于简化了与客户的沟通,将实施网络安全系统的过程划分为某些阶段的能力,以及在这些阶段引入有效的监测和控制机制。
{"title":"PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE","authors":"A. Andreichenko, S. Нorbachenko, O. Dykyi","doi":"10.28925/2663-4023.2020.10.4553","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.4553","url":null,"abstract":"The article provides a conceptual assessment of the existing definition of the term \"project\" and improved its management interpretation. The main essential characteristics of the project are formulated, the corresponding categorical device is given, which allows to systematize the project activity and adapt it to different objects of the application. In particular, an attempt was made to clarify the definition of the project in cybersecurity and cyberdefense. The processes influencing project activity at the level of the state, regions, and separate enterprises are defined. It is proved that although the problems of cybersecurity are gradually shifting to the state level in the context of national security, project activities in this area occur primarily at the level of the individual business. The peculiarities of cybersecurity projects such as increased level of state influence, the complexity of the initiation stage, critical implementation deadlines, significant budget differentiation, unlimited number of possible participants, high level of personalization, difficulty in calculating efficiency indicators are highlighted. The key tasks of project management in cybersecurity are defined: formulation of the main goal of the project and ranking of its goals, determination of necessary volumes and sources of financing, assessment of project risks, selection of project executors, scheduling of project implementation, resource requirements, control, etc. Proposals for optimizing project management processes in the field of cybersecurity have been formed. Emphasis is placed on the prospects of using consistent project management methods, due to simplified communication with customers, the ability to divide the process of implementing cybersecurity systems into certain stages, as well as to introduce an effective monitoring and control mechanism at these stages.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ANALYSIS OF DIGITAL CRYPTOCURRENCY MARKET FORECASTING METHODS AND MODELS 数字加密货币市场预测方法与模型分析
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.163174
Bohdan Bebeshko
With the development of financial institutions, this application software and related information technologies are used not only by specialists, but also by ordinary citizens to solve tasks that a few years ago seemed to be within the competence of only mathematicians specializing, for example, in building forecasting models. It can be noted that the collaboration of IT with application software, as well as with the mathematical apparatus most typical for forecasting tasks, gives good results. In particular, this applies to the Central Bank market. The study is devoted to the problem of approaches to the selection of methods and strategies for analysis and forecasting of the central bank markets, which is an urgent issue today. Far from all possible methods and strategies have sufficient coverage in the scientific information space, which prompts the need to analyze and systematize already existing information in this field. Accordingly, basically. the purpose of the study is to analyze and systematize the theoretical foundations of existing approaches to forecasting the CCV market. An analysis and systematization of the theoretical foundations of existing approaches to forecasting the CCV market was carried out. Generalized advantages and disadvantages of structural methods and models used for making market forecasts were outlined. A comparative analysis of ANN models was carried out in terms of their use for market analysis tasks. Among the analyzed ANN models are the following: CNN-2l, CNN-3l, LSTM, sLSTM, BiLSTM, GRU, CLSTM, MLP and RFBNN. The analysis and testing of existing models provided results that provide a wide scope for further research and study.
随着金融机构的发展,这种应用软件和相关的信息技术不仅被专家使用,而且也被普通市民用来解决几年前似乎只有数学家才能胜任的任务,例如,建立预测模型。值得注意的是,信息技术与应用软件的合作,以及与预测任务中最典型的数学设备的合作,取得了良好的结果。这尤其适用于央行市场。本研究致力于分析和预测中央银行市场的方法和策略选择的方法问题,这是当今的一个紧迫问题。在科学信息空间中,并非所有可能的方法和策略都有足够的覆盖范围,这促使人们需要对该领域已有的信息进行分析和系统化。因此,基本上。本研究的目的是对现有CCV市场预测方法的理论基础进行分析和系统化。对现有CCV市场预测方法的理论基础进行了分析和梳理。概述了用于市场预测的结构方法和模型的一般优缺点。对人工神经网络模型在市场分析任务中的应用进行了比较分析。所分析的ANN模型包括:cnn - 21、cnn - 31、LSTM、sLSTM、BiLSTM、GRU、CLSTM、MLP和RFBNN。对现有模型的分析和测试提供的结果为进一步的研究和研究提供了广阔的空间。
{"title":"ANALYSIS OF DIGITAL CRYPTOCURRENCY MARKET FORECASTING METHODS AND MODELS","authors":"Bohdan Bebeshko","doi":"10.28925/2663-4023.2022.18.163174","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.163174","url":null,"abstract":"With the development of financial institutions, this application software and related information technologies are used not only by specialists, but also by ordinary citizens to solve tasks that a few years ago seemed to be within the competence of only mathematicians specializing, for example, in building forecasting models. It can be noted that the collaboration of IT with application software, as well as with the mathematical apparatus most typical for forecasting tasks, gives good results. In particular, this applies to the Central Bank market. The study is devoted to the problem of approaches to the selection of methods and strategies for analysis and forecasting of the central bank markets, which is an urgent issue today. Far from all possible methods and strategies have sufficient coverage in the scientific information space, which prompts the need to analyze and systematize already existing information in this field. Accordingly, basically. the purpose of the study is to analyze and systematize the theoretical foundations of existing approaches to forecasting the CCV market. An analysis and systematization of the theoretical foundations of existing approaches to forecasting the CCV market was carried out. Generalized advantages and disadvantages of structural methods and models used for making market forecasts were outlined. A comparative analysis of ANN models was carried out in terms of their use for market analysis tasks. Among the analyzed ANN models are the following: CNN-2l, CNN-3l, LSTM, sLSTM, BiLSTM, GRU, CLSTM, MLP and RFBNN. The analysis and testing of existing models provided results that provide a wide scope for further research and study.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS 通用数据管理系统的安全问题
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.6.122133
S. Spasiteleva, Yulia Zhdanovа, Ivan Chychkan
The article deals with the security of universal data management systems. The analysis and classification of modern data management systems by different criteria has been made. Based on the analysis of the literature and the experience of creating corporate systems, two approaches to the organization of universal data management systems have been identified: the use of multimodel systems and integrated data management platforms. Based on the analysis of threats and data protection tools for database management systems SQL, NoSQL, NewSQL, Data Warehouse, Data Lake and data clouds, the main approaches to data protection of each product category have been identified. The current trends in the development of data management technologies and data security have been identified. The development of NoSQL, NewSQL systems and the exchange of functionalities between them has led to the development of systems, which have functions of many classes. The problems of data protection for multimodel database management systems and for integrated data platforms have been identified and ways to overcome the identified problems have been suggested. For a universal data management platform, it is not enough to combine security features of different types of DBMS but new approaches are needed. The Data Centric Security approach is suitable for integrated environments; it is focused on protecting critical data at all stages of their processing - from collection and transmission to analysis and deployment in data warehouses. The organization of access to data through logical data marts using semantic technologies, ontological data models provides the transformation of a set of different types of data into a single array by "data virtualization". The article has substantiated the relevance and feasibility of the use of cognitive technologies and artificial intelligence in the field of information security, which opened new opportunities for the creation of automated, "smart" security tools for data management systems. Such systems have the ability to self-analyse and configure. The use of machine learning technology allows to identify weaknesses in the database security system. The combination of intelligent security and management solutions with database technologies will allow developers to respond quickly to new challenges in the protection of integrated data management systems of various types.
{"title":"SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS","authors":"S. Spasiteleva, Yulia Zhdanovа, Ivan Chychkan","doi":"10.28925/2663-4023.2019.6.122133","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.122133","url":null,"abstract":"The article deals with the security of universal data management systems. The analysis and classification of modern data management systems by different criteria has been made. Based on the analysis of the literature and the experience of creating corporate systems, two approaches to the organization of universal data management systems have been identified: the use of multimodel systems and integrated data management platforms. Based on the analysis of threats and data protection tools for database management systems SQL, NoSQL, NewSQL, Data Warehouse, Data Lake and data clouds, the main approaches to data protection of each product category have been identified. The current trends in the development of data management technologies and data security have been identified. The development of NoSQL, NewSQL systems and the exchange of functionalities between them has led to the development of systems, which have functions of many classes. The problems of data protection for multimodel database management systems and for integrated data platforms have been identified and ways to overcome the identified problems have been suggested. For a universal data management platform, it is not enough to combine security features of different types of DBMS but new approaches are needed. The Data Centric Security approach is suitable for integrated environments; it is focused on protecting critical data at all stages of their processing - from collection and transmission to analysis and deployment in data warehouses. The organization of access to data through logical data marts using semantic technologies, ontological data models provides the transformation of a set of different types of data into a single array by \"data virtualization\". The article has substantiated the relevance and feasibility of the use of cognitive technologies and artificial intelligence in the field of information security, which opened new opportunities for the creation of automated, \"smart\" security tools for data management systems. Such systems have the ability to self-analyse and configure. The use of machine learning technology allows to identify weaknesses in the database security system. The combination of intelligent security and management solutions with database technologies will allow developers to respond quickly to new challenges in the protection of integrated data management systems of various types.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1