2019
DOI: 10.17721/ists.2019.1.36-41
|View full text |Cite
|
Sign up to set email alerts
|

Modeling of Information Security System in Computer Network

Abstract: This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Traditional media has developed rapidly under the drive of global information networks and computer technology, and many new tools have begun to be put into application, which has greatly promoted the development of the media industry. Related studies have also found that the time people spend on general reading and newspaper reading is decreasing, and their attention to paper media is decreasing, while the time spent on online media is increasing [1]. ese phenomena also show that new media has occupied an important position in the media industry, and people's methods of obtaining media information and learning habits have undergone important changes.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional media has developed rapidly under the drive of global information networks and computer technology, and many new tools have begun to be put into application, which has greatly promoted the development of the media industry. Related studies have also found that the time people spend on general reading and newspaper reading is decreasing, and their attention to paper media is decreasing, while the time spent on online media is increasing [1]. ese phenomena also show that new media has occupied an important position in the media industry, and people's methods of obtaining media information and learning habits have undergone important changes.…”
Section: Introductionmentioning
confidence: 99%
“…e content of people's needs for sports, ideas, theoretical methods, and other ideological forms and various sports activities externalized in the real world, as well as the organizational forms of activities, the norms of activities, and the facilities are composed, including a variety of complex spiritual and material factors. Overall, Korniyenko and Galata [17] wrote sports activities usually serve people for a long time in the form of direct feelings and deep impressions. It belongs to the dynamic mode of sports venue construction and other forms.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of risk quantification, the literature [11] compared the difference between ICPS security quantification and IT systems based on the analysis of ICPS availability, integrity, confidentiality, and other security attributes and gave overall recommendations for index system research. The literature [12] has long been committed to the research of risk assessment based on the mechanism of the controlled process and proposed system availability metrics based on downtime and some other risk quantitative auxiliary indicators. The literature [13] designed quantitative strategies for security attributes such as reliability, availability, and controllability from a statistical perspective.…”
Section: Related Workmentioning
confidence: 99%