Tag Archives: information security

THE ANALYSIS APPROACHES THAT GUARANTEE THE SECURITY OF MODERN COMPUTER SYSTEMS

UDC 519.862

T.V. Glotova, H.I.Besher

The paper discusses issues related to using different approaches to improve the efficiency of computer systems security. The importance of integration of different security technologies together to provide comprehensive protection of information resources of the enterprise is demonstrated. It is shown that firewalls are the main means of controlling access to resources on the corporate network from the outside. The classification of user groups that are subject to recognition in the analysis of network traffic is discussed. The importance of using user credentials stored in the directory service network is shown. The characteristics of the authentication based on certificates are given. The main properties of the means of intrusion detection are stated. The authors refer to the need of the hardware implementation of typical functions used in authentication.

Keywords: information security, computer system, information network, network traffic protection information.

Full text:
GlotovaBesher_3_16_3.pdf

THE FEATURES OF INFORMATION SECURITY DISTRIBUTED SYSTEMS

UDC 519.862

T.V. Glotova, H.I.Besher

The paper is devoted to analysis of peculiarities of information security in distributed systems. It states the reasons for the formation of systems. The basic components of information security of computer systems are given. The motives of committing computer crimes are discussed. A classification of channels of unauthorized access is shown. The levels of creation of regimes of information security are concretized. The principles form a reliable protection system are given. It Specified how the system selects information on the basis of which there procedures for identification and authentication of users. There is a trend of advanced development for the use of biometric identification systems.

Keywords: information security, system, computer, information, user, protection.

Full text:
GlotovaBesher_3_16_2.pdf

THE APPLICATION OF INFORMATION TECHNOLOGY IN BUSINESS PROCESSES

UDC 338.436

S.Y.Chernikov, E.V.Bolyuh

The paper considers the role of information technology in business. The analysis of the characteristics of automated systems in the organization is shown.

Keywords: business, information technology, information security.

Full text:
ChernikovBoluh_3_14_2.pdf

THE SOFTWARE SOLUTIONS FOR THE ANALYSIS OF INFORMATION SECURITY

UDC 681.3

V.N.Kostrova, O.V.Miloshenko

In the paper the analysis of the modern software solutions intended for an assessment of characteristics of information security is carried out. The features of protection of workstations are noted. The characteristics of programs for an assessment of information risks are specified.

Keywords:  : information security, program, safety, computer.

Full text:
KostrovaMiloshenko_1_15_2.pdf