Application of wireless networks in the course of the organization and intelligence telecommunication systems
DOI:
https://doi.org/10.18372/2410-7840.15.5711Keywords:
the information, information and telecommunication systems, investigation of systems of telecommunicationsAbstract
Uncontrolled distribution and use of information and cyber space has gradually led to a significant complication of problems finding information warring parties in the open and getting it in a relatively open and closed electronic sources to each other and to protect their own information resources from unauthorized cybernetic influence. The solution of such problems is impossible without building now an overwhelming majority of the world's own systems cyber security, and the development and introduction of new, more effective methods and methods of intelligence information and telecommunication (IT) systems. First of all, this is due to the continuous growth of information that circulates is stored and processed in the information and cyberspace these countries, the need to protect such information from the influence of internal and external cyber threats and interventions, the rapid development of new IT technologies and global computerization. With this in mind, the article discussed the purpose and the main varieties of intelligence information and telecommunication systems. Proposed definition of intelligence in telecommunication systems (1ST). Defines the scope of the possible interests of the 1ST and the method of its conduct, and place of the 1ST in the overall process of getting information. An example of the use of wireless technologies during the execution of the tasks of exploration of the 1ST.
References
Закон України “Про телекомунікації”: за станом на 15.10.2011 р. / Затверджений ВР України, 18.11.2003, № 1280-ІУ. [Електронний ресурс]. — Режим доступу: http://zakon1.rada.gov.ua/cgi- bin/laws/main.cgi. — Офіц. вид. — К.: Урядовий кур’єр від 24.12.2003, № 243.
Бурячок В.Л. Основи формування державної системи кібернетичної безпеки: Монографія. —
К.:НАУ, 2013. - 432 с.
Семенов Ю.А. Обзор по материалам ведущих фирм, работающих в сфере сетевой безопасности. [Електронний ресурс]. — Режим доступу: http://book.itep.ru/10/2012.htm
Григорьев В.А., Лагутенко О.И., Распаев Ю.А. Сети и системы радио доступа. — М.: КУДИЦ- ПРЕСС, 2005. - 384 с.
Сергей Пахомов. История успеха WiFi. Компьютерпресс №5, 2003.
Г.В. Башилов. IP-телефония по WiFi. Вестник связи, 9/2004. — С. 45-50 .
А.В. Голышко. Сети WiFi, ТСС, 2/2005. — С. 75-79.
Гольдштейн Б.С. Протоколы сети доступа. Т.2. — М.: Радио и связь, 1999. — 298 с.
М. Лукин. Стандарты беспроводной связи. Современная электроника, 1/2005, с. 10-12.
С. Пахомов. Протоколы беспроводных сетей семейства 802.11. — Компьютер пресс, 5/2005. —
С. 26-37.
http://esnet.ru/estelecom/resh.shtml?base=&news=9
http://www.ultra-net.ru/dostup.html
http://www.intel.com/ru/update/ contents/st08031.htm
http://www.winzone.ru/articles/304/
http://www.dataexpress.ru/review/ccc/2/
http://www.thg.ru/network/20030828/print.html
Ю.Г. Писарев. В ожидании WiMax. Вестник связи, 4/2005. — С. 126-130.
Г. Большова. В чью дверь стучится WiMax? — ИКС, 7/2005. — С. 12-16.
The law of Ukraine "About telecommunications": as of 15.10.2011 / Is authorized by the Supreme Body of Ukraine, 18.11.2003, № 1280-IV., Mode of access: http: // zakon1.rada.gov.ua/cgi-bin/laws/ main.cg i. - Official publishing house, К.: the governmental courier from 24.12.2003, № 243.
Buryachok V.L. Bases of formation of state system of cybernetic safety: the monography, K: NAU, 2013, 432 p.
Semenov U.A. The review on materials of leading firms working in sphere of network safety., Mode to access: http: // book.itep.ru/10/2012.htm
Grigoriev VA., Lagytenko О.1., Raspaev UA. Networks and systems of radio of access., M.: KYDIC-Press, 2005, 384 p.
Serg Pahomov. A history of success WiFi. Computerpress №5, 2003.
G.V.Bashilov. A IP-telephony on WiFi. The bulletin of communication(connection), 9/2004. - P. 45-50.
AV.Golishko. Networks WiFi, ТСС, 2/2005, P. 75-79.
Goldshteyjn B.S. The protocols of a network of access. Т.2., M.: radio and communication (connection), 1999, 298 p.
M. Lykin. The standards of wireless communication (connection). Modern electronics, 1/2005, p. 10-12.
S. Pahomov. The protocols of wireless networks of family 802.11, Computerpress, 5/2005, P. 26-37.
http://esnet.ru/estelecom/resh.shtml?base=&news=9
http://www.ultra-net.ru/dostup.html
http://www.intel.com/ru/update/ contents/st08031.htm
http://www.winzone.ru/articles/304/
http://www.dataexpress.ru/review/ccc/2/
http://www.thg.ru/network/20030828/print.html
U.G. Pisarev. In expectation WiMax. The bulletin of communication(connection), 4/2005, P. 126-130.
G. Bolshova. On whose door is knocked WiMax?, 7/2005, P. 12-16.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).