ON THE ISSUE OF NETWORK SECURITY

Author:

Labinsky Alexander1

Affiliation:

1. Saint-Petersburg university of State fire service of EMERCOM of Russia

Abstract

The following are considered:  principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission;  principles and measures to ensure the security of the corporate network, as well as the types of information protection provided by these security measures;  virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer;  systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools;  Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection. The Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.

Publisher

St. Petersburg University of the State Fire Service of EMERCOM of Russia

Reference11 articles.

1. Зайцев О.В. Методики обнаружения вредоносного ПО // КомпьютерПресс. 2005. № 6., Zajcev O.V. Metodiki obnaruzheniya vredonosnogo PO // Komp'yuterPress. 2005. № 6.

2. Зайцев О.В. Шпионские программы как угроза безопасности ПК // КомпьютерПресс. 2008. № 7., Zajcev O.V. Shpionskie programmy kak ugroza bezopasnosti PK // Komp'yuterPress. 2008. № 7.

3. Лабинский А.Ю., Ильин А.В. Фракталы и защита информации // Природные и техногенные риски (физико-математические и прикладные аспекты). 2016. № 1. С. 82–86., Labinskij A.Yu., Il'in A.V. Fraktaly i zashchita informacii // Prirodnye i tekhnogennye riski (fiziko-matematicheskie i prikladnye aspekty). 2016. № 1. S. 82–86.

4. Лабинский А.Ю. Нейронные сети и защита информации // Проблемы управления рисками в техносфере. 2019. № 1. С. 68–73., Labinskij A.Yu. Nejronnye seti i zashchita informacii // Problemy upravleniya riskami v tekhnosfere. 2019. № 1. S. 68–73.

5. Joseph Migga Kizza. Computer Network Security. Springer Science & Business Media, 2005. 535 p., Joseph Migga Kizza. Computer Network Security. Springer Science & Business Media, 2005. 535 p.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3