19 research outputs found

    Comparative Analysis of Computer Network Security Scanners

    No full text
    The paper is devoted to the analysis of the problem of comparison of security scanners computer network. A common comprehensive assessment of security control is developed on the base of comparative analysis of data security controls. We have tested security scanners available on the market

    Secure software development training course

    No full text
    Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations

    Application Virtualization Technology to Automate the Testing Software and Hardware Information Protection Tools

    No full text
    The paper considers the problem of application virtualization technology for test automation software and hardware protection of information

    The Formulation of the Problem of Optimization of Exchange of Special Cargo Transportation Mobile Monitoring Data

    No full text
    This paper is devoted to research special materials transportation control effectiveness in real time by using data exchange optimization in mobile communication complexes

    Changes in Bacterial and Fungal Community of Soil under Treatment of Pesticides

    No full text
    Experiments were carried out in soil microcosms with the treatment of pesticide formulations—imidacloprid, benomyl, and metribuzin in single and tenfold application rates. For additional stimulation of microorganisms, a starch–mineral mixture was added to some variants. For all samples, high-throughput sequencing on the Illumina MiSeq platform of the V4 (16S rRNA) and ITS1 (18S rRNA) fragments was carried out. As a result, it was possible to establish the characteristic changes in the structure of the soil fungal and bacterial communities under pesticides application. The application of pesticides was accompanied by dramatic shifts in alfa-diversity of the fungal community. The phylum Basidiomycota was likely to be involved in the degradation of pesticides. The changes in the relative abundance of the genera Terrabacter, Kitasatospora, Streptomyces, Sphingomonas, Apiotrichum, Solicoccozyma, Gamsia, and Humicola can be proposed as an indicator of pesticide contamination. It is suggested to use these markers for large-scale assessment of the effect of pesticides on soil microbial communities instead of classical integral methods, including within the framework of state registration of pesticides. It is also recommended to research the effect of pesticides on the soil microbiome during artificially initiated successions using the additional source of carbon

    Statement of the Problem of Recognition of the Users in E-learning Systems

    No full text
    The aim of this paper is to research the characteristics of the recognition of the users in E-learning systems and to explain the use of the combined method on basis of the known means of identification and authentication

    Authentication and common key generation cryptographic protocol for vehicle tachographs

    No full text
    We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms. It ensures integrity and authenticity of data transmitted through communication channel between the on-board devices and vehicle tachograph cards. The protocol was developed in accordance with the Rosstandart recommendations and complies with the development and modernization principles for data protection encryption (cryptographic) means. The protocol was suggested as a national standard draft and is open for public discussion in accordance with the established procedure. The main results of our study is the formulation of certain security tasks identical to those used by potential infringers to compromise the protocol. This allows one to account for structural features that will ensure further protocol compliance to the target security characteristics, as well as to guarantee subsequent justification of feature set sufficiency

    Information security threats in web-portals on the open journal systems platform

    No full text
    This article addresses the problem of security threats while working with web portals built on the Open Journal Systems platform. The Open Journal Systems (OJS) platform was originally developed as part of the Public Knowledge Project and it is one of the most popular open-source platforms for web journals today. Based on the data available in the Public Knowledge Project, there were more than 10,000 active journals using the open journal systems platform by the end of 2016. A migration of a journal to such advanced and complex platform helps to handle the entire workflow over a single web portal. Therefore it is an important move and only peer-reviewed journals that are part of Russian and Worldwide citation systems go for it. At the same time the problem of keeping privacy for a manuscript before it is published is very important for these journals and for authors who submit it to the journal. The paper describes the most common threats for the web portals on the OJS platform as well as a particular model of the security threats, and suggests the measures that could help to neutralize these threats

    The Software Package for Multicriteria Choice of Trusted Session Tools

    No full text
    In practice when designing complex IT-systems the known challenge is to solve the problem of multi-criteria analysis analysis of alternatives in order to select the most preferred choices of specific hardware and software for protection of large sets of solutions offered by the market. In particular, this problem is typical of the process of organizing a trusted session IT-systems of distance learning. The paper proposes a solution to this problem based on the analytic hierarchy process (AHP), which allows to automate the selection of an appropriate option using the visualization results of AHP

    Automated Testing Software and Hardware Protection of Information in Virtualized Environments

    No full text
    The paper considers the problem of application virtualization technology for test automation software and hardware protection of information
    corecore