The article presents a method of assessing the stability of the information and telecommunication network in terms of informational impact. In modern war, the primary objects of directed counteraction and defeat are presented with control systems rather than troops and weapons. The predicted nature of the enemy’s impact on the military control system and the information and telecommunication network as its technical basis leads to the emergence of new requirements for the quality of the latter. The presented approach allows us to determine the order and type of impact on each element of the TCS, which in turn will allow us to assess the comprehensive indicator of the stability of the network (the coefficient of downtime or serviceable action).
В работе представлены предложения по созданию эффективных комплексных систем обеспечения безопасности противодействия негативным воздействиям на автоматизированные системы управления технологическими процессами на основе имитационного моделирования процессов. Описаны схема исследования качества обеспечения безопасности защищаемых объектов и алгоритм негативных воздействий на автоматизированные системы управления технологическими процессами. Рассмотрены основные принципы построения имитационной моделирующей системы, порядок ее разработки и вопросы реализации. Результаты работы могут использоваться для получения количественных оценок показателей качества (эффективности) обеспечения безопасности защищаемых объектов. Ключевые слова: информационная безопасность, автоматизированные системы управления производственными и технологическими процессами, модель негативного воздействия, система обеспечения безопасности.
The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.
In the age of information technology, it is becoming increasingly difficult to maintain privacy. Sometimes anonymity on the Internet helps to protect everyone’s right. Anonymity on the Internet also helps to protect against possible illegal actions of third parties. There is a number of technologies that you can use to monitor site user activity. These include technologies such as cookies and fingerprints. Today, cookies technology is an important component of most operations on the Internet. This technology is considered to be one of the main tools that Internet resource owners use to track customers. However, this technique is gradually becoming obsolete and often does not give the desired effect. Fingerprint technology is a global identifier. Browser typos make its owner more recognizable not only on frequently visited Internet resources, but also in other electronic sources. Fingerprints capture the holistic picture that a resource receives from a web browser. This allows you to identify the client even if you make changes to your browser settings. This article deals with the problem of anonymity preservation in a network. The authors describe the main technologies for tracking the users’ website activity, the principles of their work, and the protection methods against these technologies. The advantages and disadvantages of the cookies and fingerprint technologies have also been determined.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.