Network security systems
https://doi.org/10.21822/2073-6185-2022-49-3-61-67
Abstract
Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.
Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.
Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.
Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.
About the Authors
M. A. GanzhurRussian Federation
Senior Lecturer, Department of Computing Systems and Information Security
1 Gagarin Square, Rostov-on-Don 344000, Russia
A. I. Bryukhovetsky
Russian Federation
Undergraduate, Department of Computing Systems and Information Security
1 Gagarin Square, Rostov-on-Don 344000, Russia
References
1. The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center / [Electronic resource]. Access Mode: https://securityintelligence.com/the-emergence-of-virtualreality-and- augmented-reality-in-the-security-operations-center/
2. What is a Security Operations Center (SOC) / [Electronic resource]. Access Mode: https://www.mcafee.com/enterprise/enus/security-awareness/operations/what-is-soc.html).
3. Novikova E.S., Models of graphical representation of information about the security of a computer network. St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. 2013; 126-131. (In Russ)
4. Shangin V.F., Information security and information protection // DMK-Press.2017. pp. 254-296) IBM QRadar SIEM / [Electronic resource]. Access Mode: https://www.ibm.com/fi-en/marketplace/ibm-qradar-siem (In Russ)
5. The Future of Augmented Reality and Cybersecurity / [Electronic resource]. Access mode: https://fedtechmagazine.com/article/2016/03/future-augmented-reality-and-cybersecurity.
6. The Important Difference Between Virtual Reality, Augmented Reality and Mixed Reality / [Electronic resource]. Access mode: https://www.forbes.com/sites/bernar dmarr/2019/07/19/the-important-difference-between-virtual-reality-augmented-reality-andmixed-reality/#2155407935d3).
7. Shangin V.F., Information security in computer systems and networks. DMK-Press .2017; 94-120
8. V.A. Fathi, N. V. Dyachenko Application Security Testing. Don Engineering Bulletin, 2021; 5 URL: http://www.ivdon.ru/uploads/article/pdf/IVD_38__9_Fathi_Dyachenko.pdf_a11917c479.pdf (In Russ)
9. Evsin V.A., Tikhonov N.A., Vorobyov S.P. Development of a module for the optimal placement of information resources on the nodes of a computer network: a description of the implemented methods and data structures. Engineering Bulletin of the Don, 2019; 1. URL: ivdon.ru/ru/magazine/archive/n1y2019/5493 (In Russ)
10. Bereza N. V. Modern trends in the development of the world and Russian market of information services. Engineering Bulletin of the Don, 2012; 2. URL: ivdon.ru/magazine/archive/n2y2012/758 (In Russ)
11. Zotov A.I., Ganzhur M.A., Avakyants A.V., Characteristics of the managerial structure and the command passing system, Problems of modern pedagogical education. 2018;58-3:111-116 (In Russ)
12. Zmitrovich A.I. Intelligent information systems. Minsk: NTOOO "TetraSystems", 1997;368
13. Fathi V.A., Fathi Dm.V., Fathi D.V. Reachability function and network derivative of a fuzzy Petri net based on μ-valued logic. Mathematical methods in engineering and technology - MMTT-19: collection of works of the XIX Intern. scientific conf.: in 10 volumes. T.6 / under the general. ed. V.S. Balakirev. - Voronezh, Voronezh. state technol. Acad., 2006; 33-37. (In Russ)
14. Ganzhur M.A., Ganzhur A.P., Smirnova O.V. Modeling of critical systems implementing negative events using dual Petrinets. MATEC Web of Conferences Volume 226 (2018), XIV International Scientific-Technical Conference “Dynamic of Technical Systems” (DTS-2018). URL:doi.org/10.1051/matecconf/201822604001
15. Marković N., Živanić J., Lazarević Z., Iričanin B. The Mathematical Model for Analysis and Evaluation of the Transient Process of the three‒phase Asynchronous Machine Performance. Serbian journal of electrical engineering (DTS-2018). URL: journal.ftn.kg.ac.rs/Vol_15-3/05-Markovic-ZivanicLazarevicIricanin.pd
16. Ginis L.A. Development of cognitive modeling tools for the study of complex systems // Engineering Bulletin of the Don, 2013, no. 3. URL: ivdon.ru/ru/magazine/archive/n3y2013/1806 (In Russ)
17. Gasfield D. Lines, trees and sequences in algorithms: Informatics and computational biology / Per. from English. I.V. Romanovsky. St. Petersburg. Nevsky Dialect; BHV-Petersburg, 2003; 654. (In Russ)
18. Polikarpova N.I., Shalyto A.A. Automatic programming. St. Petersburg. SPbGPU, 2008;227. (In Russ)
19. Andreev A.A. Technique for choosing the basic architecture of a reconfigurable computing system based on game-theoretic optimization methods // Engineering Bulletin of the Don, 2013, No. 1. URL: ivdon.ru/magazine/archive/n1y2013/1569 (In Russ)
20. Fathi Dm. V. et al. Binary Petri nets with alternative labeling [Text] Mathematical methods in engineering and technology -MMTT22: coll. Proceedings of the XXII Intern. scientific conf.: in 10 volumes. Vol. 5. Section 5 / under the general. ed. V. S. Balakireva. Pskov: Pskov publishing house. state polytechnic in-ta, 2009. (In Russ)
Review
For citations:
Ganzhur M.A., Bryukhovetsky A.I. Network security systems. Herald of Dagestan State Technical University. Technical Sciences. 2022;49(3):61-67. (In Russ.) https://doi.org/10.21822/2073-6185-2022-49-3-61-67