Data protection from network attacks

Authors

  • Gulnur ZHANGISSINA Kazakh National Technical University named after K.I.Satpayev
  • Erjan KULDEEV Kazakh National Technical University named after K.I.Satpayev
  • Ajgul SHAIKHANOVA Kazakh National Technical University named after K.I.Satpayev

DOI:

https://doi.org/10.18372/2225-5036.19.4685

Keywords:

DAN (data-area networks), information security, network attack, the offender, the characteristics of security, unauthorized access

Abstract

This article describes the steps of unauthorized access to the informational computing network. Proposedaction model is providing a violator to more accurately determine the list of threats that must be taken into account in the development of data protection and security policy of informational computing network.

Author Biographies

Gulnur ZHANGISSINA, Kazakh National Technical University named after K.I.Satpayev

Date and place of birth: 1958, Almaty, Kazakhstan.

Education: Kazakh National University named after Al-Farabi, 1980.

Research interests: information security, computer security, parallel computing, information systems and distance education.

Current position & Functions: Head of the Computer Science Department.

Publications: more than 200 publications, including 4 monographs, over 20 books

& 180 papers.

E-mail: gul_zhd@mail.ru

Erjan KULDEEV, Kazakh National Technical University named after K.I.Satpayev

Date and place of birth: 1973, Aralsk, Kyzyl-Orda region.

Education: Geological Department of the Kazakh Polytechnic Institute named after Lenin, in "Geophysical methods of exploration" for qualified mining engineer-geophysicist.

Research interests: information security, computer security, GIS.

Current position & Functions: Vice Rector for science and innovation.

E-mail: kuldeev@ntu.kz

Ajgul SHAIKHANOVA, Kazakh National Technical University named after K.I.Satpayev

Education: GU "Semey", 1998, KazFEA, 2011

Research interests: information security, computer security, parallel computing, information systems.

Current position & Functions: PhD student.

Publications: more than 30 publications, 8 e-books.

E-mail: igul7@mail.ru

References

Shangin V.G. Protection of information in computer systems and networks. - DMK-Press, 2012, 592 p.

Domarev V.V. Safety of information technology. The systems approach. / V. Domarev - K.: TID Dia Software Ltd., 2004. - 992 p.

Zegzhda D.P. Fundamentals of Information Systems Security / DP Zegzhda, A.M.Ivashko - Moscow Hotline - Telecom, 2000. 452 p.

Smoked A.P. , Zefirov S.L. , Golovanov V.B. Information security audit. - BDC-press, 2006. – 304 p.

Stoling William. Cryptography and network security: Principles and Practice, 2nd ed.: Trans. from English. -M.: Publishing house "Williams", 2001. – 672 p.

Torokina A.A. Engineering and technical protection of information. Publisher "Helios ART", 2005. – 960 p.

Issue

Section

Network & Internet Security