А.M. Kapiton1, doct. of ped. Sciences, О.V. Skakalina1, cand. of techn. science;
D.O. Tyshсhenko 2, cand. of ec. Science, Т.M. Franchuk 2, cand. of ec. science;
1 National University «Yuri Kondratyuk Poltava Polytechnic»,
Ukraine, 36011, Poltava, Pershotravnevy prospect, 24
tel. +38 (066) 9440001, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.;
tel. +38 (066) 5770059, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.;
2 State University of Trade and Economics,
Ukraine, 02156, Kiev, Kyoto Street, 19
tel. +38 (097) 5472345, е-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Èlektron. model. 2023, 45(3):28-42
https://doi.org/10.15407/emodel.45.03.028
ABSTRACT
A model of the system for automated setting of network equipment security configuration is proposed. In order to improve the security configuration of network equipment, a set of existing security threats in modern information and communication networks was analyzed. It was determined that with the increase in the level of introduction of information technologies in the life of the individual, society and the state, the level of danger in the cyber space increases. The general trends of ensuring cyber security at all levels are considered. The types of threats to users are systematized and their properties are considered. Based on the results of the study, it was determined that the cloud approach is the most appropriate for infrastructure deployment. Cloud services are considered and approaches to the automation of infrastructure deployment are defined, which provide an opportunity to minimize errors in the configuration of the architecture.
KEYWORDS
information services, information and communication networks, security parameters, configurations of network devices, cyber security.
REFERENCES
- Bohush, V., Dovydkov, O. & Kryvutsa, V. (2010). Theoretical foundations of protected information technologies. DUIKT.
- Information and cyber security (2015).
- Buriachok, V., Korchenko, L. & Buriachok, O. (2012). Social engineering as a method of reconnaissance of information and telecommunication systems. Zakhyst informatsii, 4(57), pp. 5–12.
- Hryshchuk, R.& Danyk, Yu. (2016). Fundamentals of cyber security: a monograph.
- Haivoronskyi, M.& Novikov, O. (2009). Security of information and communication systems.
- Chumachenko, O. & Horbatiuk, S. (2018). A new model of an artificial neuron for building neural networks in the approximation problem. Mizhnarodna naukovo-praktychna konferentsiia «Informatsiini tekhnolohii ta kompiuterne modeliuvannia», pp. 296-299.
- Snigurov, A. & Chakryan, V. (2013). Approach of routing metrics formation based on information security risk. Experience of Designing and Application of CAD Systems in Microelectronics (CADSM). IEEE, pp. 339-340.
- Kraemer, S. & Carayon, P. (2017). Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics., 38, 2, pp. 143-154.
https://doi.org/10.1016/j.apergo.2006.03.010
- McCallister, E., Grance, T. & Scarfone, K. (2020). Guide to Protecting the Confidentiality of Personally Identifiable Information, PII, 59 p.
- Danylenko, D., Smirnov, O. & Meleshko, Ye. (2012). Research on methods of detecting intrusions into telecommunication systems and networks. Systemy ozbroiennia i viiskova tekhnika, 1, 92-100.
- Subach, I. (2014). Ways of improving cybernetic attack detection systems. Vseukr. nauk-prakt. konf. Aktualni problemy zabezpechennia informatsiinoi bezpeky derzhavy.
- Kazakova, N. (2010). Monitoring of information resources in protected information networks World of information and telecommunications. VII mizhnar. nauk.-tekhn. konf. studentstva ta molodi, 165-168.
- Baranov, A. (2016). POCO: ‘Perpetual’ operation of CO wireless sensor node with hybrid power supply. Sensors and Actuators, 112-121.
https://doi.org/10.1016/j.sna.2015.12.004
- Pavlysh, V.& Hlinenko, L. (2022). Basics of information technologies and systems: Study guide, BIKT.
- Liapandra, A. (2022). An approach to generalized evaluation of resources of programmable logic integrated circuits. Elektrotekhnichni ta kompiuterni systemy,7, pp. 92-96.
- Suhoniak, I. (2017). Model of the decision-making support system for optimal management of the life cycle of innovative enterprise projects. Seriia: tekhnichni nauky, 43 (4), 91-99.
- Tabunshchyk, H., Kudermetov, R. & Prytula, A. (2021). Design, modeling and analysis of information systems. Study guide.
- Dovhan, O. & Khlan, V. (2011). Cyberterrorism as a threat to information sovereignty of the state, Informatsiina bezpeka liudyny, suspilstva, derzhavy, 3 (7), 49–53.
- Stine, K., Kissel, R. & Barker, W. (2008). Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories; Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories.
https://doi.org/10.6028/NIST.SP.800-60v2r1
- Snegurov, A., Chakryan, V. & Mamedov. (2013). A The approach for selection of a routing metric in special-purpose wireless networks under the influence of radio-electronic investigation. Microwave and Telecommunication Technology (CriMiCo), 23rd International Crimean Conference, pp. 470-471.
- Lemeshko, A. (2017). Probabilistic-temporal model of QoS-routing with precomputation of routes under the terms of non-ideal reliability of telecommunication network. Telecommunications and Radio Engineering, 66, 13, pp. 1151-1166.
https://doi.org/10.1615/TelecomRadEng.v66.i13.20
Full text: PDF