2021
DOI: 10.1007/978-3-030-65722-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Technologies for Building a System of Data Centres for Defence and Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…The presented modified network port scanner for Windows based operating systems in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [1,2,15,16,17,18,19,20,21,22,27,31,32].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The presented modified network port scanner for Windows based operating systems in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [1,2,15,16,17,18,19,20,21,22,27,31,32].…”
Section: Methodsmentioning
confidence: 99%
“…-Damages the reputation of a chosen victim, which can be a host, corporation, government institution, etc [1,3,4,7,9,14,15,21,22,23,24,28,30,31].…”
Section: Introductionmentioning
confidence: 99%
“…In order to perform a full scan and identify open ports and services, it is necessary to perform a check for active computer systems. Active host detection provides an accurate state of the systems on the network, allowing an attacker to avoid scanning every port on every system in the IPv4 or IPv6 address space to identify whether the target host is running [19,21,22,23,27].…”
Section: Methodsmentioning
confidence: 99%
“…Nmap is a security scanner for network exploration and hacking. Through it, it is possible to discover hosts, ports and services in a computer network, thereby creating a map and topology of the computer network [3,4,6,10,11,13,22]. The scanner sends specially crafted network packets to the target host and then analyzes the received responses to achieve its goal.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation