Метод захищеності комп’ютерних мереж на етапах проектування і експлуатації
Вантажиться...
Файли
Дата
2017
Автори
Мясіщев, О.А.
Мартинюк, О.О.
Гіневська, Н.М.
Myasischev, O.A.
Martynyuk, O.O.
Ginevska, N.M.
Назва журналу
Номер ISSN
Назва тому
Видавець
Хмельницький національний університет
Анотація
У статті розглядається метод захищеності комп’ютерних мереж на основі побудови дерева атак на
етапах проектування і експлуатації. Детально описано постановку завдання дослідження та методику аналізу
захищеності комп’ютерних мереж.
In the article the method of protection of computer networks from attacks wood building during the design and operation. Described in detail the supply of research objectives and methods of security analysis of computer networks. The proposed method for analyzing the security of computer networks during the design and operation can detect vulnerabilities used software and hardware, violation of security policy "bottlenecks" in the security of a computer network to assist in planning and implementing information security during the design and operation computer networks. Also allows selecting used to justify (or planned for use) of information security and assess the effectiveness of various information security, to compare different versions of their use. The results of evaluation of the effectiveness of methods of security analysis of computer networks during the design and operation showed meet the requirements that were presented.
In the article the method of protection of computer networks from attacks wood building during the design and operation. Described in detail the supply of research objectives and methods of security analysis of computer networks. The proposed method for analyzing the security of computer networks during the design and operation can detect vulnerabilities used software and hardware, violation of security policy "bottlenecks" in the security of a computer network to assist in planning and implementing information security during the design and operation computer networks. Also allows selecting used to justify (or planned for use) of information security and assess the effectiveness of various information security, to compare different versions of their use. The results of evaluation of the effectiveness of methods of security analysis of computer networks during the design and operation showed meet the requirements that were presented.
Опис
Ключові слова
система аналізу захисту, СУБД, ПЗ, комп’ютерна мережа, ОС, безпека, protection system analysis, database, software, computer network
Бібліографічний опис
Мясіщев, О.А. Метод захищеності комп'ютерних мереж на етапах проектування і експлуатації [Текст] / О. А. Мясіщев, О. О. Мартинюк, Н. М. Гіневська // Вісник Хмельницького національного університету. Технічні науки. – 2017. – № 1. – С. 140-143.