首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Hybrid Containerized Computing Technology for High-Performance Data Processing in Cluster Systems 集群系统中高性能数据处理的混合容器化计算技术
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-39-44
M. M. Rovnyagin, Pao Sberbank, I. Chugunkov, N. Savchenko
{"title":"Hybrid Containerized Computing Technology for High-Performance Data Processing in Cluster Systems","authors":"M. M. Rovnyagin, Pao Sberbank, I. Chugunkov, N. Savchenko","doi":"10.21681/2311-3456-2019-3-39-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-39-44","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MANAGEMENT OF ACCESS TO ELECTRONIC INFORMATION AND EDUCATIONAL ENVIRONMENT OF UNIVERSITIES OF FEDERAL EXECUTIVE AUTHORITIES 联邦行政机关大学电子信息获取与教育环境管理
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-73-84
Igor Kotenko, I. Saenko, R. Zakharchenko, A.A. Kapustin, Mazen Al-Barri
The purpose of the article: analysis of the problem of ensuring timely authorized access to the resources of the electronic information and educational environment of universities of federal executive authorities and identification of possible directions for its solution. Research methods: system analysis of the problem of ensuring access of officials of universities of federal executive authorities to the resources of the electronic information and educational environment. The result obtained: approaches to improving the existing access control model, optimizing the role-based access scheme and determining unauthorized access attempts based on machine learning methods are proposed. Scope of the proposed approach: access control system of the electronic information and educational environment of universities of federal executive authorities. Scientific novelty: consists in a comprehensive analysis of the problem of creating and functioning of the electronic information and educational environment of universities of federal executive authorities, during which the structure of this environment is determined and its characteristic features are highlighted. Based on the analysis of information security threats in the electronic information and educational environment, the necessity of creating an access control system to its resources, which provides timely authorized access, is substantiated. The proposed approaches to improving the access control system affect not only the improvement of the existing access model by supplementing it with solutions available in the attribute-based access model, but also the optimization of the role- based access scheme using the developed genetic algorithm and the detection of unauthorized access attempts associated with overcoming access rules, based on application of machine learning methods. Experimental results are presented that confirm the effectiveness of the proposed approaches. Contribution: Igor Kotenko – analysis of the state of the art in the creation and application of the electronic information and educational environment of universities of federal executive authorities, setting the task and developing proposals for developing the functionality of the access control system, development of approaches to genetic optimization of the access scheme and detection of unauthorized access attempts using machine learning methods; Igor Saenko – development of approaches to improving the access control system related to the use of an attribute-based access model, genetic optimization of the access scheme and detection of unauthorized access attempts using machine learning methods; Roman Zakharchenko – analysis of technical solutions that ensure the implementation of the access control system to the resources of the electronic information and educational environment of universities of federal executive authorities, Alexander Kapustin – analysis of security threats and access control models to resources of the elect
本文的目的是:分析联邦行政机关大学电子信息资源和教育环境的及时授权访问问题,并确定其解决的可能方向。研究方法:系统分析联邦行政机关大学官员获取电子信息资源和教育环境的保障问题。结果:提出了改进现有访问控制模型、优化基于角色的访问方案和基于机器学习方法确定未经授权访问尝试的方法。建议的方法范围:联邦行政机关大学电子信息和教育环境的访问控制系统。科学新颖性:包括对联邦行政机关大学电子信息和教育环境的创建和运作问题的全面分析,在此期间确定该环境的结构并突出其特征。在分析电子信息和教育环境中信息安全威胁的基础上,论证了建立对其资源的访问控制系统以提供及时授权访问的必要性。所提出的改进访问控制系统的方法不仅通过补充基于属性的访问模型中可用的解决方案来改进现有的访问模型,而且利用所开发的遗传算法来优化基于角色的访问方案,以及基于机器学习方法的应用,通过克服访问规则来检测未经授权的访问企图。实验结果证实了所提方法的有效性。贡献:Igor Kotenko -分析了联邦行政机关大学电子信息和教育环境的创建和应用的最新技术,为开发访问控制系统的功能设定任务并制定建议,开发访问方案的遗传优化方法,并使用机器学习方法检测未经授权的访问尝试;Igor Saenko -开发改进访问控制系统的方法,涉及使用基于属性的访问模型,访问方案的遗传优化以及使用机器学习方法检测未经授权的访问企图;罗曼·扎哈尔琴科(Roman Zakharchenko) -分析了确保联邦行政机关大学电子信息资源和教育环境访问控制系统实施的技术解决方案,亚历山大·卡普斯廷(Alexander Kapustin) -分析了联邦行政机关大学电子信息资源和教育环境的安全威胁和访问控制模型,Mazen Al-Barri -基于机器学习方法的使用,开发和实验研究了一种方法,用于检测未经授权访问联邦行政机关大学电子信息资源和教育环境的企图
{"title":"MANAGEMENT OF ACCESS TO ELECTRONIC INFORMATION AND EDUCATIONAL ENVIRONMENT OF UNIVERSITIES OF FEDERAL EXECUTIVE AUTHORITIES","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, A.A. Kapustin, Mazen Al-Barri","doi":"10.21681/2311-3456-2023-2-73-84","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-73-84","url":null,"abstract":"The purpose of the article: analysis of the problem of ensuring timely authorized access to the resources of the electronic information and educational environment of universities of federal executive authorities and identification of possible directions for its solution. Research methods: system analysis of the problem of ensuring access of officials of universities of federal executive authorities to the resources of the electronic information and educational environment. The result obtained: approaches to improving the existing access control model, optimizing the role-based access scheme and determining unauthorized access attempts based on machine learning methods are proposed. Scope of the proposed approach: access control system of the electronic information and educational environment of universities of federal executive authorities. Scientific novelty: consists in a comprehensive analysis of the problem of creating and functioning of the electronic information and educational environment of universities of federal executive authorities, during which the structure of this environment is determined and its characteristic features are highlighted. Based on the analysis of information security threats in the electronic information and educational environment, the necessity of creating an access control system to its resources, which provides timely authorized access, is substantiated. The proposed approaches to improving the access control system affect not only the improvement of the existing access model by supplementing it with solutions available in the attribute-based access model, but also the optimization of the role- based access scheme using the developed genetic algorithm and the detection of unauthorized access attempts associated with overcoming access rules, based on application of machine learning methods. Experimental results are presented that confirm the effectiveness of the proposed approaches. Contribution: Igor Kotenko – analysis of the state of the art in the creation and application of the electronic information and educational environment of universities of federal executive authorities, setting the task and developing proposals for developing the functionality of the access control system, development of approaches to genetic optimization of the access scheme and detection of unauthorized access attempts using machine learning methods; Igor Saenko – development of approaches to improving the access control system related to the use of an attribute-based access model, genetic optimization of the access scheme and detection of unauthorized access attempts using machine learning methods; Roman Zakharchenko – analysis of technical solutions that ensure the implementation of the access control system to the resources of the electronic information and educational environment of universities of federal executive authorities, Alexander Kapustin – analysis of security threats and access control models to resources of the elect","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logical-Linguistic Modeling of Security Threats Information in Information Systems 信息系统中安全威胁信息的逻辑语言建模
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-4-13-25
Yury Yazov, S. Soloviev, Mikhail Tarelkin
Purpose: assessment of the possibility, definition of conditions and a brief description of the relational languages of logical-linguistic modeling for a formalized description and presentation of the processes of implementing information security threats in information systems. Method: application of the logical-linguistic modeling apparatus, which makes it possible to formally describe information security threats and a set of actions performed in the course of their implementation, taking into account the capabilities of relational description languages, such as Codd’s language, context-free plex-language, RX-code language, syntagmatic chains and semantic networks. Result: a brief description and comparative analysis of relational description languages and features that affect the possibility of their use for describing threats to information security and logical-linguistic modeling of their implementation processes are given. The expediency of such modeling is shown when creating promising expert systems designed for automated and automatic analysis of threats, when maintaining a data bank of threats based on the results of monitoring publications about them on the Internet. Examples of constructing formal logical-linguistic descriptions of well-known threats of computer attacks on information systems using RX-code languages and semantic networks are given, proposals are made for expanding the language of semantic networks to describe threats, taking into account new data on threats and methods for their implementation. It is noted that the proposed approach to modeling the processes of implementation of information security threats, as a rule, is applicable in the absence of the need to take into account the time factor when assessing the possibilities of their implementation.
目的:评估可能性,条件的定义和逻辑语言建模的关系语言的简要描述,以形式化描述和表示信息系统中实施信息安全威胁的过程。方法:应用逻辑语言建模装置,考虑到关系描述语言的能力,如Codd语言、上下文无关的复数语言、RX-code语言、语法链和语义网络,使正式描述信息安全威胁及其实施过程中执行的一组动作成为可能。结果:对关系描述语言和影响其用于描述信息安全威胁的可能性的特征进行了简要描述和比较分析,并给出了其实现过程的逻辑语言建模。当创建为自动和自动分析威胁而设计的有前途的专家系统时,当根据对互联网上有关威胁的出版物的监测结果维护威胁数据库时,这种建模的方便性就显示出来了。给出了使用RX-code语言和语义网络构建已知计算机攻击信息系统威胁的形式化逻辑语言描述的实例,并提出了扩展语义网络语言来描述威胁的建议,同时考虑到有关威胁的新数据及其实现方法。值得注意的是,建议的信息安全威胁实施过程建模方法通常适用于评估其实施可能性时不需要考虑时间因素的情况。
{"title":"Logical-Linguistic Modeling of Security Threats Information in Information Systems","authors":"Yury Yazov, S. Soloviev, Mikhail Tarelkin","doi":"10.21681/2311-3456-2022-4-13-25","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-4-13-25","url":null,"abstract":"Purpose: assessment of the possibility, definition of conditions and a brief description of the relational languages of logical-linguistic modeling for a formalized description and presentation of the processes of implementing information security threats in information systems. Method: application of the logical-linguistic modeling apparatus, which makes it possible to formally describe information security threats and a set of actions performed in the course of their implementation, taking into account the capabilities of relational description languages, such as Codd’s language, context-free plex-language, RX-code language, syntagmatic chains and semantic networks. Result: a brief description and comparative analysis of relational description languages and features that affect the possibility of their use for describing threats to information security and logical-linguistic modeling of their implementation processes are given. The expediency of such modeling is shown when creating promising expert systems designed for automated and automatic analysis of threats, when maintaining a data bank of threats based on the results of monitoring publications about them on the Internet. Examples of constructing formal logical-linguistic descriptions of well-known threats of computer attacks on information systems using RX-code languages and semantic networks are given, proposals are made for expanding the language of semantic networks to describe threats, taking into account new data on threats and methods for their implementation. It is noted that the proposed approach to modeling the processes of implementation of information security threats, as a rule, is applicable in the absence of the need to take into account the time factor when assessing the possibilities of their implementation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130313013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approaches to Mathematical Simulation of Cyber Attacks on Mobile Devices 移动设备网络攻击的数学模拟方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-62-67
D. Mikhailov, S. Dvoryankin, Vera Chumanskaya
The relevance of the topic of protecting mobile devices from cyber attacks is due to a significant increase in the number and share of mobile gadgets among modern devices for accessing the Internet. The purpose of the article is to mathematically substantiate and formalize the models of the most common attacks on mobile devices. On the basis of the constructed models, methods are proposed to prevent and neutralize intrusions into the system of smartphones and tablet computers. Method: applied system analysis of the results of generalization and classification of typical types of attacks on mobile devices, elements of the theory of probability. Results: the features of mechanisms for the formation of vulnerabilities of mobile devices were determined. The important aspects of determining the effectiveness of modern technologies for protecting against cyber attacks on mobile devices are identified. A brief overview of the main approaches to mathematical modeling of the most common attacks is given. Additional requirements are formulated for an adequate choice of protection methods depending on the type of attacks. Recommendations are formulated to ensure the security of a mobile device against threats. Methods for reducing the probability of system damage by the most common attacks are proposed.
保护移动设备免受网络攻击这一主题的相关性是由于现代设备中用于访问互联网的移动设备的数量和份额显着增加。本文的目的是在数学上证实和形式化移动设备上最常见的攻击模型。在构建模型的基础上,提出了智能手机和平板电脑系统入侵的预防和中和方法。方法:应用系统分析结果对典型的移动设备攻击类型进行归纳和分类,运用概率论的要素。结果:确定了移动设备漏洞形成机制的特点。确定防止移动设备网络攻击的现代技术有效性的重要方面。简要概述了对最常见的攻击进行数学建模的主要方法。根据攻击类型,制定了适当选择保护方法的附加要求。为了保证移动设备的安全,避免受到威胁,需要制定安全建议。针对最常见的攻击,提出了降低系统破坏概率的方法。
{"title":"Approaches to Mathematical Simulation of Cyber Attacks on Mobile Devices","authors":"D. Mikhailov, S. Dvoryankin, Vera Chumanskaya","doi":"10.21681/2311-3456-2021-6-62-67","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-62-67","url":null,"abstract":"The relevance of the topic of protecting mobile devices from cyber attacks is due to a significant increase in the number and share of mobile gadgets among modern devices for accessing the Internet. The purpose of the article is to mathematically substantiate and formalize the models of the most common attacks on mobile devices. On the basis of the constructed models, methods are proposed to prevent and neutralize intrusions into the system of smartphones and tablet computers. Method: applied system analysis of the results of generalization and classification of typical types of attacks on mobile devices, elements of the theory of probability. Results: the features of mechanisms for the formation of vulnerabilities of mobile devices were determined. The important aspects of determining the effectiveness of modern technologies for protecting against cyber attacks on mobile devices are identified. A brief overview of the main approaches to mathematical modeling of the most common attacks is given. Additional requirements are formulated for an adequate choice of protection methods depending on the type of attacks. Recommendations are formulated to ensure the security of a mobile device against threats. Methods for reducing the probability of system damage by the most common attacks are proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128799133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control Method of the Correct Execution of Programs by Monitoring and Analyzing the Route-Time Parameters of the Computing Process 通过监测和分析计算过程的路径-时间参数实现程序正确执行的控制方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-63-71
A. Mirzabaev, Alexander Samonov
Objective: develop a method and means to ensure sustainable functioning of the software mission-critical information systems under impact malicious software. Methods: analysis and classification of malicious software and means of protection against it, synthesis and modeling of correct behavior of programs, temporary automata. Study results: the characteristic of methods and means of detecting malware, which using masking methods, rootkit mechanisms and hardware virtualization technologies is given. A methodology for constructing profiles of the correct functioning of controlled programs in the form of a set of permissible execution routes has been developed. A method for monitoring and controlling the correctness of the current state of the computing process by comparing it with reference profiles has been developed. The method allows real-time detection and counteraction of malicious programs, which using various techniques of implementation and masking, including rootkit mechanisms, hypervisors based on hardware virtualization technology, interception and introduction in system functions in RAM.
目的:开发一种方法和手段,以确保软件关键任务信息系统在恶意软件的影响下持续运行。方法:恶意软件的分析与分类及防护手段,程序正确行为的合成与建模,临时自动机。研究结果:给出了利用屏蔽方法、rootkit机制和硬件虚拟化技术检测恶意软件的方法和手段的特点。一种以一组允许的执行路线的形式构造受控程序正确功能概况的方法已经被开发出来。提出了一种通过与参考剖面相比较来监测和控制计算过程当前状态正确性的方法。该方法允许实时检测和对抗恶意程序,恶意程序使用各种实现和屏蔽技术,包括rootkit机制,基于硬件虚拟化技术的管理程序,拦截和在RAM中引入系统功能。
{"title":"Control Method of the Correct Execution of Programs by Monitoring and Analyzing the Route-Time Parameters of the Computing Process","authors":"A. Mirzabaev, Alexander Samonov","doi":"10.21681/2311-3456-2022-2-63-71","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-63-71","url":null,"abstract":"Objective: develop a method and means to ensure sustainable functioning of the software mission-critical information systems under impact malicious software. Methods: analysis and classification of malicious software and means of protection against it, synthesis and modeling of correct behavior of programs, temporary automata. Study results: the characteristic of methods and means of detecting malware, which using masking methods, rootkit mechanisms and hardware virtualization technologies is given. A methodology for constructing profiles of the correct functioning of controlled programs in the form of a set of permissible execution routes has been developed. A method for monitoring and controlling the correctness of the current state of the computing process by comparing it with reference profiles has been developed. The method allows real-time detection and counteraction of malicious programs, which using various techniques of implementation and masking, including rootkit mechanisms, hypervisors based on hardware virtualization technology, interception and introduction in system functions in RAM.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Language of the Program Code Uniform Presentation for Searching Medium and High-Level Vulnerabilities: the Basic Provisions of Paradigm 面向中高级漏洞搜索的程序代码统一表示语言:范式的基本规定
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-78-89
M. Buinevich, K. Izrailov, V. Pokussov
Purpose of the study: increasing the efficiency of an expert in searching for medium-level (in algorithms) and high-level (in architecture) vulnerabilities in the program code due to the innovative paradigm of the language for its presentation. Method: consists in the analysis of relevant works on the subject of approaches, methods and notations for representing algorithms and software architecture with highlighting the strengths and weaknesses of solutions, synthesizing the paradigm for the presentation of the program code and qualitatively assessing the effectiveness of each of the provisions of the paradigm (by contradiction method); efficiency is understood as a combination of its three indicators: the number of type I and II errors, the search time and the cognitive stress of the expert. The results obtained: description of the idea and 7 main provisions of the paradigm of the pseudocode language for a unified description of algorithms and architecture with the maximum necessary and minimum sufficient degree of formalization; the main practical significance of the representations of the program code obtained in this way is their intended use for analysis by an information security expert for the presence of medium and high-level vulnerabilities; also, for each position, their qualitative influence on the performance indicators of vulnerability search by an expert was established.
研究的目的:提高专家在程序代码中搜索中级(算法)和高级(架构)漏洞的效率,这是由于该语言在其表示方面的创新范式。方法:包括分析有关表示算法和软件架构的方法、方法和符号的相关作品,突出解决方案的优点和缺点,综合表示程序代码的范例,并定性地评估范例中每个条款的有效性(通过矛盾法);效率被理解为它的三个指标的组合:第一类和第二类错误的数量,搜索时间和专家的认知压力。得到的结果是:描述了伪代码语言的思想和范式的7个主要规定,实现了对算法和体系结构的统一描述,具有最大必要和最小充分的形式化程度;以这种方式获得的程序代码表示的主要实际意义是,信息安全专家可以将其用于分析中、高级漏洞的存在;此外,对于每个职位,建立了其对专家脆弱性搜索绩效指标的定性影响。
{"title":"Language of the Program Code Uniform Presentation for Searching Medium and High-Level Vulnerabilities: the Basic Provisions of Paradigm","authors":"M. Buinevich, K. Izrailov, V. Pokussov","doi":"10.21681/2311-3456-2021-6-78-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-78-89","url":null,"abstract":"Purpose of the study: increasing the efficiency of an expert in searching for medium-level (in algorithms) and high-level (in architecture) vulnerabilities in the program code due to the innovative paradigm of the language for its presentation. Method: consists in the analysis of relevant works on the subject of approaches, methods and notations for representing algorithms and software architecture with highlighting the strengths and weaknesses of solutions, synthesizing the paradigm for the presentation of the program code and qualitatively assessing the effectiveness of each of the provisions of the paradigm (by contradiction method); efficiency is understood as a combination of its three indicators: the number of type I and II errors, the search time and the cognitive stress of the expert. The results obtained: description of the idea and 7 main provisions of the paradigm of the pseudocode language for a unified description of algorithms and architecture with the maximum necessary and minimum sufficient degree of formalization; the main practical significance of the representations of the program code obtained in this way is their intended use for analysis by an information security expert for the presence of medium and high-level vulnerabilities; also, for each position, their qualitative influence on the performance indicators of vulnerability search by an expert was established.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129997899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Levels of Confidence to Identification and Authentication Results During Digital Transformations 数字转换过程中对识别和认证结果的置信度
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-19-25
A. Sabanov
{"title":"Levels of Confidence to Identification and Authentication Results During Digital Transformations","authors":"A. Sabanov","doi":"10.21681/2311-3456-2019-5-19-25","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-19-25","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Threats and Vulnerabilities of DBMS Oracle 数据库管理系统Oracle的威胁与漏洞分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2018-2-16-23
M. Mironov, Mikhail Kleptsov, Larisa V. Lyubimova, Telecommunications on Railway Transport
{"title":"Analysis of Threats and Vulnerabilities of DBMS Oracle","authors":"M. Mironov, Mikhail Kleptsov, Larisa V. Lyubimova, Telecommunications on Railway Transport","doi":"10.21681/2311-3456-2018-2-16-23","DOIUrl":"https://doi.org/10.21681/2311-3456-2018-2-16-23","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Russian Federation. A Trendy Term or the Priority Technologic Area of Enhancing National and International Security of the XXI Century 俄罗斯联邦的网络安全。二十一世纪加强国家安全与国际安全优先技术领域的流行术语
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-61-72
A. Dobrodeev, Fgup Zniis
The purpose of the article: the study of the roleand and meaningof cybersecurity at the present stage of world development as the main factor for ensuring national and international security of the 21st century. Research method: synthesis and scientific forecasting, peer review, comparative analysis of the cybersphere within the system approach. Results: the state and ways of developing cybersecurity of leading foreign countries on the example of the United States, the state and ways of developing cybersecurity and cybersecurity technology in the Russian Federation are presented with justification for discussion proposals on the disclosure of the term and the concept of “cybersecurity.”
本文的目的是:研究网络安全作为确保21世纪国家和国际安全的主要因素在世界发展的现阶段的作用和意义。研究方法:综合科学预测、同行评议、系统内比较分析等方法。结果:介绍了以美国为例的国外主要国家发展网络安全的现状和方式,以及俄罗斯联邦发展网络安全和网络安全技术的现状和方式,并就“网络安全”一词及其概念的披露提出了讨论建议的理由。
{"title":"Cybersecurity in Russian Federation. A Trendy Term or the Priority Technologic Area of Enhancing National and International Security of the XXI Century","authors":"A. Dobrodeev, Fgup Zniis","doi":"10.21681/2311-3456-2021-4-61-72","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-61-72","url":null,"abstract":"The purpose of the article: the study of the roleand and meaningof cybersecurity at the present stage of world development as the main factor for ensuring national and international security of the 21st century. Research method: synthesis and scientific forecasting, peer review, comparative analysis of the cybersphere within the system approach. Results: the state and ways of developing cybersecurity of leading foreign countries on the example of the United States, the state and ways of developing cybersecurity and cybersecurity technology in the Russian Federation are presented with justification for discussion proposals on the disclosure of the term and the concept of “cybersecurity.”","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensurin APCS Information Security Using the Predictive Protection Method 运用预测保护方法确保APCS信息安全
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-63-71
S. Garbuk, D. Pravikov, A. Polyansky, Stc «Stankoinformzaschita»
{"title":"Ensurin APCS Information Security Using the Predictive Protection Method","authors":"S. Garbuk, D. Pravikov, A. Polyansky, Stc «Stankoinformzaschita»","doi":"10.21681/2311-3456-2019-3-63-71","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-63-71","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132658417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1