This article was analyzed the threats to computer data in computer systems and classified these threats by their attributes. The relationships between threat classes, attributes, and related security methods and tools have defined the mathematical model of the computer threat classification problem. Based on the model analysis was concluded that the computer threats classification problem belongs to difficult formalized problems and requires for its solution methods of intellectual analysis, one of which is the subsystem of logical inference implemented in this article.
В статті проведено аналіз статистик Державного центру кіберзахисту Державної служби спеціального зв’язку та захисту інформації України по кількісному та якісному складу атак, та звітів IBM по збиткам, що вони завдали. Проаналізовано системи контролю та аналізу трафіку, визначено загальну направленість таких засобів на виявлення атак на мережу. Визначено типи атак, що зазвичай проводяться з ЗКМ та дано опис їх дій. Представлено архітектуру загальнодоступних комп’ютерних мереж (ЗКМ), визначено її складові, місце зловмисника та системи захисту. Показано, що типове місце зловмисника за межами мережі не відповідає дійсності саме для ЗКМ. Запропоновано структуру ЗКМ, яка дозволяє захищати мережу як від зовнішніх так і від внутрішніх зловмисників.
The tasks of analysis and classification of detection of existing mechanisms for the implementation of attacks and threats to information security, which can lead to unauthorized access to confidential information, disruption of the functioning of information systems, are relevant and prioritized at the current stage. The importance of the problems is connected with the following main factors: growth of variety and quantity of means of computer technology and spheres of human activity; a high level of trust in information and search systems for data processing and management; the growth of the number of users of the information space of interaction; accumulation of large volumes of various types of information, intensive exchange of data flow in the network between users, using a wide range of access mechanisms to confidential resources, information processes; industrial espionage and competitive struggle in the sphere of information services of society; insufficient number at the present stage of highly qualified specialists in the field of information security, market relations in the field of software development, maintenance, distribution, production of computing equipment for the implementation of information security. The presented model of the flow of text messages of thematic Internet resources of the information security forecasting system and the information model of the forum database of the thematic Internet resource, which differs from the known ones in its universality, allows to analyze and study the data flow of Internet forums implemented on the basis of popular software platforms for the development of discussion information thematic resources The model of the flow of text messages of thematic Internet forums allows statistical analysis and semantic filtering of messages, taking into account authorship, author rating, forum, time of creation, number of messages, forum topic, allows analysis and research of text messages of thematic Internet resources. Solving the set tasks will allow: to improve the quality of decisions made in the process of identifying and counteracting malicious information; sort information objects of influence for the operator by priority; set the input data settings of the system of detection and countermeasures against the spread of malicious information in networks.
The rapid penetration of the banking market of mobile banking creates not only new opportunities and conveniences, but also new risks and threats, which leads to increased requirements for information security of mobile services. One of the important components of the security of the mobile banking service of the client-bank system is the protection mechanisms based on the use of cryptographic keys. The stability of cryptographic keys is a guarantee of system reliability and, in turn, is based on the mechanisms of generating pseudo-random numbers using primary sources of entropy, for the effective use of which it is necessary to determine the type and capabilities of the source. The paper presents the results of the study of sensors of mobile communication devices as a source of entropy for generating cryptokeys of a mobile application of the client-bank system. An accelerometer, a temperature sensor, a gyroscope, a light brightness sensor, a magnetic field sensor, an atmospheric pressure sensor, a distance sensor, and a humidity sensor are considered as a source of entropy. The results of the research confirm the presence in the values of the sensors of mobile communication devices of a component suitable for use as a source of primary entropy for generators of pseudo-random numbers by cryptographic algorithms. In turn, pseudo-random number generators built with the use of mobile device sensors can be the basis of high-entropy cryptographic key generators in the client-bank system mobile banking services. The obtained results are focused on the implementation of algorithms and means of generating high-entropy pseudo-random numbers and can be used to reduce the risks of unauthorized access to customer information in the client-bank system by disclosing cryptokeys in mobile banking services.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.