This article is devoted to solving the problem of information protection in radio channels, by applying comprehensive measures to protect against possible attacks aimed at intercepting and substituting transmitted data. The aim of the work is to analyze the security of wireless networks, identify methods for their protection and create a model for protecting wireless networks. In order to achieve this goal, the following list of tasks was performed: the existing solutions in the field of information protection through radio networks were analyzed; the description of the offered developed model is made; algorithms, experiments, experiments of this model are described. A means of protecting information through radio networks has been developed, the application of which has a significant increase in the level of information security in the radio channel. The practical value of this development is that the theoretical and practical results are recommended for implementation in organizations that use the radio channel to transmit confidential information with high security requirements
The widespread use of computer technology, its rapid development and use in almost all areas of human activity requires constant updating of information security issues. The activities of many enterprises in the field of IT, construction, and other areas are of a project nature and therefore further research on information security management of projects is relevant. Appearance of changes and the current state of the project results at certain points of time describe the documents that accompany it. In this paper, the information structure of the project is considered as a set of specific documents. During the life cycle of each project document, which includes the creation, transfer, preservation and transformation, there are generally threats to its confidentiality, integrity, accessibility and authenticity. This paper develops a method for assessing the risks of violation of the availability of project documents in solving information security problems. A formal description of many project documents in the form of a generalized hierarchical structure is presented, the connection of documents with the operations performed on them and information systems used during these operations is formalized. Given the incompleteness and dimension of the data, the based on fuzzy logic model was developed to assess the risk of document accessibility. Approaches to the assessment of the damage from the violation of the availability of the project document and the method of calculating the overall assessment of the risk of violation of the documents availability are proposed. The results presented in this paper can be used in decision-making processes regarding information security of projects in organizations that have project activities. The approaches proposed in this paper can serve as a basis for the creation of specialized information technologies to automate the calculation of project risk assessments.
Background. Open multiservice network of telecommunications the Internet has become the most used source of such vital information as: scientific and technical, information, entertainment, and, especially, commercial. Today, it unites 3.36 billion users and provides high economic efficiency of human activity. However, there are many different technologies for accessing Internet services that compete with each other.Objective. The aim of the paper is to create the Internet network model and a content access model, as the main value of the network from the point of view of the end user, for building an effective network infrastructure.Methods. Analysis of all known publications on the construction and evaluation of Internet service quality parameters. Analysis of technologies for accessing the network and content. Synthesis of the model of formation and distribution of traffic between levels of the hierarchy of the Internet.Results. Enlarged indicators of Internet services provision were received. An enlarged scheme for building a global Internet network is proposed. Based on the generalized "end-to-end" scheme of user access to services and network resources, an estimate of the amount of sufficient access speed was obtained. The concepts of hierarchy level and gravitational coefficient are defined for which mathematical relations are derived.Conclusions. The main task of the providers of any level is to close the traffic as close as possible to the client, i.e. to reduce the gravity coefficient. The task of theoreticians and engineers is to determine theoretically the optimal number of levels (there were only three of them in the model in question) of closure or aggregation of traffic.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.