METHOD OF ENSURING PROTECTION OF INFORMATION IN SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE

Authors

  • M. STETSYUK Khmelnytskyi National University

DOI:

https://doi.org/10.31891/2219-9365-2021-68-2-7

Keywords:

information systems, information protection, efficiency, method of information protection

Abstract

The paper analyzes the use of information systems (IS) for various purposes, which continues to grow rapidly. Attackers seek financial gain, and this encourages them to develop malicious software, which they use against IP. Therefore, the urgent task today is to develop specialized IT for various purposes, which would provide opportunities to protect information in the face of SDR and computer attacks.

The results of the work are the creation of integrated into the hardware and software components of IP information security, which together form a comprehensive information security subsystem: network segmentation, separation of the server part into a separate network with the ability to flexibly configure security policies for each segment. ZPZ; the use of cryptographic means of protection ensures the absence of unauthorized access to information in physically uncontrolled channels of information transmission, as well as reduces the ability to conduct intelligence of the computer network IP; the applied method of running client workstations with two-factor authentication of software and user makes it impossible to connect illegal programs and unregistered copies of regular software; non-trivial procedures for control over data manipulation operations, execution of all data operations under transaction management guarantee the integrity and consistency of information in the IS, and the use of workstation activity control, flexible two-tier system for managing access to IP resources further reduces the likelihood of unauthorized access to information; automated backup system with territorial delimitation of places of storage of copies and check of their working ability prevents non-recoverable loss of information.

The conducted experiments confirm the efficiency of IP information protection means and the conclusions are made. The response of the IP to the effects simulated in both experiments was expected and within the established time limits.

The developed method of protection of IP information in combination with organizational and legal measures used as a single complex, allows to obtain technology, the use of which in the development of specialized IP, guarantees a high level of protection of its resources from destructive influences.

Published

2021-12-15

How to Cite

STETSYUK М. (2021). METHOD OF ENSURING PROTECTION OF INFORMATION IN SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (2), 57–68. https://doi.org/10.31891/2219-9365-2021-68-2-7