DATA PROTECTION FROM NETWORK ATTACKS

Authors

  • G. Zhangisina Kazakh National Technical University named after K. I. Satpayev
  • E. Kuldeev Kazakh National Technical University named after K. I. Satpayev
  • A. Shaikhanova Kazakh National Technical University named after K. I. Satpayev

DOI:

https://doi.org/10.18372/2310-5461.18.4939

Keywords:

DAN (data-area networks), information security, network attack, the offender, the characteristics of security, unauthorized access

Abstract

Due to the widespread dissemination of informational distributed computing networks reveals problems in information protection from unauthorized access. This article deals with the security problem of informational computer networks from network informational attacks. Revealed in the article stages of unauthorized access to computing informational network, showed that even the protected computing system acquires certain vulnerability when it is connected to the public network. Have been described the characteristics of protection against network attacks. The proposed specifications are of good quality and are expressed requirements to ensure the resistance of certain offender actions. The proposed model of offender actions gives more accurately determine the list of threats, which must be taken into account in the designing of data protection and in security policy of an informational computing network. Considered characteristics give possibility to assess security of the distributed informational computing networks, which consist of geographically dispersed components of various network informational attacks.

References

Shangin V. Protection of information in computer systems and networks/ V. Shangin. — DMK-Press, 2012. — 592 p.

Domarev V. Safety of information technology. The systems approach. / V. Domarev — K. : TID Dia Software Ltd., 2004. — 992 With.

Zegzhda D. Fundamentals of Information Systems Security / D. Zegzhda, A. M. Ivashko. — Moscow Hotline-Telecom, 2000. — 452 pp.

Smoked A. Information security audit /A. Smoked, S. Zefirov, V. Golovanov. — BDC-press, 2006. — 304.

Stoling William. Cryptography and network security: Principles and Practice, 2nd ed.: Trans. from English / William Stoling. — M. : Publishing house “Williams”, 2001. — 672 s.

Torokina A. Engineering and technical protection of information / A. Torokina. — Publisher “Helios ART”, 2005. — 960.

Published

2013-06-26

Issue

Section

Control systems