首页 > 最新文献

Bezopasnost informacionnyh tehnology最新文献

英文 中文
Functionality of the critical information infrastructure cybersecurity network 关键信息基础设施网络安全网络功能
Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.02
V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov
{"title":"Functionality of the critical information infrastructure cybersecurity network","authors":"V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov","doi":"10.26583/bit.2023.1.02","DOIUrl":"https://doi.org/10.26583/bit.2023.1.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software implementation of protection against unauthorized access 防止未经授权访问的软件实现保护
Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.06
A. S. Ismagilova, N. D. Lushnikov
{"title":"Software implementation of protection against unauthorized access","authors":"A. S. Ismagilova, N. D. Lushnikov","doi":"10.26583/bit.2023.1.06","DOIUrl":"https://doi.org/10.26583/bit.2023.1.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of authentication methods in the industrial internet of things 工业物联网认证方法研究
Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.03
I. B. Getmanyuk, Ivan Fedorov, Ravil S. Engalychev
{"title":"Research of authentication methods in the industrial internet of things","authors":"I. B. Getmanyuk, Ivan Fedorov, Ravil S. Engalychev","doi":"10.26583/bit.2023.1.03","DOIUrl":"https://doi.org/10.26583/bit.2023.1.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134643277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodological approach to the integration of information resources in a distributed information processing system 分布式信息处理系统中信息资源集成的方法学方法
Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.08
Anatoliy A. Chuprinov
{"title":"Methodological approach to the integration of information resources in a distributed information processing system","authors":"Anatoliy A. Chuprinov","doi":"10.26583/bit.2023.1.08","DOIUrl":"https://doi.org/10.26583/bit.2023.1.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132084650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of laser scanning methods for microelectronic semiconductor structures investigation 微电子半导体结构研究中的激光扫描方法综述
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.09
R. Mozhaev, A. Pechenkin, Arseniy A. Baluev, O. B. Mavritskii, A. N. Egorov
{"title":"Review of laser scanning methods for microelectronic semiconductor structures investigation","authors":"R. Mozhaev, A. Pechenkin, Arseniy A. Baluev, O. B. Mavritskii, A. N. Egorov","doi":"10.26583/bit.2022.4.09","DOIUrl":"https://doi.org/10.26583/bit.2022.4.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confucius and the formation of information security culture in the context of the digital economy development (The new is what has been forgotten) 孔子与数字经济发展背景下信息安全文化的形成(新即忘)
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.08
A. Malyuk, I. Alekseeva
{"title":"Confucius and the formation of information security culture in the context of the digital economy development (The new is what has been forgotten)","authors":"A. Malyuk, I. Alekseeva","doi":"10.26583/bit.2022.4.08","DOIUrl":"https://doi.org/10.26583/bit.2022.4.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THERE IS AN OPINION: "Trusted ECB for the automotive industry: task and realities" 有一种观点是:“值得信赖的汽车行业欧洲央行:任务与现实”
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.01
A. S. Chistov
{"title":"THERE IS AN OPINION: \"Trusted ECB for the automotive industry: task and realities\"","authors":"A. S. Chistov","doi":"10.26583/bit.2022.4.01","DOIUrl":"https://doi.org/10.26583/bit.2022.4.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"503 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling of information security threats for the wireless standard IEEE 802.11 无线标准IEEE 802.11的信息安全威胁建模
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.04
A. P. Durakovskiy, Vitaly N. Tsymbal
{"title":"Modelling of information security threats for the wireless standard IEEE 802.11","authors":"A. P. Durakovskiy, Vitaly N. Tsymbal","doi":"10.26583/bit.2022.4.04","DOIUrl":"https://doi.org/10.26583/bit.2022.4.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware protection of UEFI-firmware and NVRAM of the computer with Resident Security Component 带有常驻安全组件的计算机uefi固件和NVRAM的硬件保护
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.07
Aleksandr V. Bolodurin, Andrey A. Altuhov
. The issue of protecting the firmware and the memory area for storing variables (NVRAM - Non Volatile Random Access Memory) of the UEFI (Unified Extensible Firmware Interface) system are discussed in the paper. The research methodology is a deduction. The problem of trusted computer loading, in particular, the proprietarity of the UEFI stage, is relevant in the field of computer security. For an introduction to the context and subject field, the components and environment of the UEFI system, attack vectors on the system, the consequences of successful attacks for the user and built-in security tools are briefly described. The advantages and disadvantages of using two memory areas with different access modes as a way to protect critical UEFI system data are considered. As a memory area with a configurable access policy, it is proposed to use the hardware implementation of the resident security component (HRSC). Finally, the functionality of the HRSC and the applicability of this solution for
。本文讨论了UEFI(统一可扩展固件接口)系统中固件和存储变量的存储区域(NVRAM - Non - Volatile Random Access memory)的保护问题。研究方法是一种演绎法。可信计算机加载的问题,特别是UEFI阶段的专有性,是与计算机安全领域相关的问题。对于背景和主题领域的介绍,简要描述了UEFI系统的组件和环境,系统上的攻击向量,成功攻击对用户和内置安全工具的后果。考虑了使用具有不同访问模式的两个存储区域作为保护关键UEFI系统数据的方法的优点和缺点。作为一个具有可配置访问策略的存储区域,建议使用驻留安全组件(HRSC)的硬件实现。最后,介绍了HRSC的功能和该解决方案的适用性
{"title":"Hardware protection of UEFI-firmware and NVRAM of the computer with Resident Security Component","authors":"Aleksandr V. Bolodurin, Andrey A. Altuhov","doi":"10.26583/bit.2022.4.07","DOIUrl":"https://doi.org/10.26583/bit.2022.4.07","url":null,"abstract":". The issue of protecting the firmware and the memory area for storing variables (NVRAM - Non Volatile Random Access Memory) of the UEFI (Unified Extensible Firmware Interface) system are discussed in the paper. The research methodology is a deduction. The problem of trusted computer loading, in particular, the proprietarity of the UEFI stage, is relevant in the field of computer security. For an introduction to the context and subject field, the components and environment of the UEFI system, attack vectors on the system, the consequences of successful attacks for the user and built-in security tools are briefly described. The advantages and disadvantages of using two memory areas with different access modes as a way to protect critical UEFI system data are considered. As a memory area with a configurable access policy, it is proposed to use the hardware implementation of the resident security component (HRSC). Finally, the functionality of the HRSC and the applicability of this solution for","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127116651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of changes in personal data legislation since September 1, 2022 分析自2022年9月1日起个人资料法例的变化
Pub Date : 2022-11-01 DOI: 10.26583/bit.2022.4.06
Alexei A. Sirotskiy
{"title":"Analysis of changes in personal data legislation since September 1, 2022","authors":"Alexei A. Sirotskiy","doi":"10.26583/bit.2022.4.06","DOIUrl":"https://doi.org/10.26583/bit.2022.4.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Bezopasnost informacionnyh tehnology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1