Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and underage teenagers play online games in 80% of cases. According to the Ofcom article "Children and parents: media use and attitudes report 2021/22", already 30% of children under seven use messengers and social media applications, 93% use online video platforms such as YouTube, 33% watch online streams, and 88% watch TV and use the video on demand system. The older the children get, the greater the percentage of them use the Internet. Thus, the issues of protecting children from destructive information from the Internet are relevant. The article provides an analytical review of modern software solutions for the protection of children and adolescents such as SafeKiddo Parental Control, mSpy, Kids Place, KidLogger. In addition, the description of the developed software product is carried out, which allows detecting destructive content that can negatively affect children, as well as introducing new prohibited links and words.
Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific direction is currently relevant, since it is related to the problem of security and data protection in current information and communication networks. The article is devoted to quantum cryptography; it describes the development of quantum protocols as quantum key distribution systems. Grounded on the laws of quantum mechanics, the elaboration of modifications of secure data transfer protocols is shown. The authors considered the best-known protocol to be BB84 of quantum key distribution; a more modern modification of this protocol is BB84 Info-Z. Comparative analysis of these has also been carried out. It has been established that the BB84-Info-Z quantum protocol works more efficiently than BB84 since its lower error threshold allows the interceptor to obtain much less information about the secret key. The authors put forward a new idea to improve the BB84 protocol (which has been quite outdated for almost 40 years), due to the increase in modern requirements for quantum cryptography protocols. The modification is called CSLOE-2022. It enables significant intensification of cryptographic strength and the entanglement degree of the interceptor (cryptanalyst), which greatly complicates the very possibility of intercepting information. The ultimate goal of the CSLOE-2022 modification is to complicate the eavesdropping process so much that it can be considered completely useless for an attacker in terms of wasting time and resources. The modification allows exceeding the known speed limit of key generation without repeaters since it uses two sources, the phases of which, in addition to the hundreds of kilometers of fiber between them, are very difficult to stabilize. Comparison of the protocols by working distance showed that for BB84, this distance does not exceed 70 km; for BB84-Info-Z it is similar, at no more than 70 km, and the modification of CSLOE-2022 proposed by the authors theoretically allows increasing the working distance of the quantum protocol to 511 km (7.3 times).
This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee communication and detecting malicious messages using artificial neural network analysis and full-text dictionary search is proposed. A software package designed according to the described scheme has been developed. The scheme of interaction of the program components is considered: a keylogger, a keyboard input analyzer, a user interface, a server coordinating interaction. The schemes of interaction with the analyzer by means of the WebSocket protocol were shown. The interaction of the neural network and the dictionary helped to increase the percentage of accuracy of detecting a dangerous or suspicious message, for example, when the neural network does not consider the text dangerous, and the dictionary considers the opposite, then such text is considered dangerous and is shown to the administrator. Thus, the combination of neural network analysis and dictionary analysis makes it possible to detect more suspicious messages. The work of the software product and its advantages in comparison with other similar systems are demonstrated.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.