Data protection from network attacks
DOI:
https://doi.org/10.18372/2225-5036.19.4685Keywords:
DAN (data-area networks), information security, network attack, the offender, the characteristics of security, unauthorized accessAbstract
This article describes the steps of unauthorized access to the informational computing network. Proposedaction model is providing a violator to more accurately determine the list of threats that must be taken into account in the development of data protection and security policy of informational computing network.References
Shangin V.G. Protection of information in computer systems and networks. - DMK-Press, 2012, 592 p.
Domarev V.V. Safety of information technology. The systems approach. / V. Domarev - K.: TID Dia Software Ltd., 2004. - 992 p.
Zegzhda D.P. Fundamentals of Information Systems Security / DP Zegzhda, A.M.Ivashko - Moscow Hotline - Telecom, 2000. 452 p.
Smoked A.P. , Zefirov S.L. , Golovanov V.B. Information security audit. - BDC-press, 2006. – 304 p.
Stoling William. Cryptography and network security: Principles and Practice, 2nd ed.: Trans. from English. -M.: Publishing house "Williams", 2001. – 672 p.
Torokina A.A. Engineering and technical protection of information. Publisher "Helios ART", 2005. – 960 p.