Pub Date : 2021-01-01DOI: 10.22937/ijcsns.2021.21.12.21
O. Kuchai, S. Yakovenko, T. Zorochkina, T. Okolnycha, I. Demchenko, T. Kuchai
The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.
{"title":"Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19","authors":"O. Kuchai, S. Yakovenko, T. Zorochkina, T. Okolnycha, I. Demchenko, T. Kuchai","doi":"10.22937/ijcsns.2021.21.12.21","DOIUrl":"https://doi.org/10.22937/ijcsns.2021.21.12.21","url":null,"abstract":"The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68345628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-10DOI: 10.5772/intechopen.82434
A. O. Mulani, P. B. Mane
{"title":"High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform","authors":"A. O. Mulani, P. B. Mane","doi":"10.5772/intechopen.82434","DOIUrl":"https://doi.org/10.5772/intechopen.82434","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85733521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-10DOI: 10.5772/intechopen.82580
T. Fatayer
The keys which are generated by cryptography algorithms have still been compromised by attackers. So, they extra efforts to enhance security, time consumption and communication overheads. Encryption can achieve confidentiality but cannot achieve integrity. Authentication is needed beside encryption technique to achieve integrity. The client can send data indirectly to the server through a covert channel. The covert channel needs pre-shared information between parties before using the channel. The main challenges of covert channel are security of pre-agreement information and detectability. In this chapter, merging between encryption, authentication, and covert channel leads to a new covert channel satisfying integrity and confidentiality of sending data. This channel is used for secure communication that enables parties to agree on keys that are used for future communication.
{"title":"Secure Communication Using Cryptography and Covert Channel","authors":"T. Fatayer","doi":"10.5772/intechopen.82580","DOIUrl":"https://doi.org/10.5772/intechopen.82580","url":null,"abstract":"The keys which are generated by cryptography algorithms have still been compromised by attackers. So, they extra efforts to enhance security, time consumption and communication overheads. Encryption can achieve confidentiality but cannot achieve integrity. Authentication is needed beside encryption technique to achieve integrity. The client can send data indirectly to the server through a covert channel. The covert channel needs pre-shared information between parties before using the channel. The main challenges of covert channel are security of pre-agreement information and detectability. In this chapter, merging between encryption, authentication, and covert channel leads to a new covert channel satisfying integrity and confidentiality of sending data. This channel is used for secure communication that enables parties to agree on keys that are used for future communication.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84593983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1002/9781119706762.ch6
{"title":"Putting in Place an Intrusion Prevention System (IPS)","authors":"","doi":"10.1002/9781119706762.ch6","DOIUrl":"https://doi.org/10.1002/9781119706762.ch6","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"334 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90103714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1002/9781119706762.ch3
{"title":"Supervising a Computer Network","authors":"","doi":"10.1002/9781119706762.ch3","DOIUrl":"https://doi.org/10.1002/9781119706762.ch3","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86343154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1002/9781119706762.ch7
{"title":"Securing a Local Network","authors":"","doi":"10.1002/9781119706762.ch7","DOIUrl":"https://doi.org/10.1002/9781119706762.ch7","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90304067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-28DOI: 10.1002/9781119706762.ch1
{"title":"Fundamentals of Network Security","authors":"","doi":"10.1002/9781119706762.ch1","DOIUrl":"https://doi.org/10.1002/9781119706762.ch1","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78919202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}