• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 15
Sort:
by name
by year
Article
Черников Б. В. Безопасность информационных технологий. 2009. № 3. С. 131-140.
Added: Nov 26, 2012
Article
Конявский В. А. Безопасность информационных технологий. 2010. № 3.
Added: Apr 5, 2012
Article
Нестеренко А. Ю., Билык Т. А. Безопасность информационных технологий. 2012. № 2. С. 38-42.

We present a new algorithm for message and data authentication. Some security properties are inspected and efficiency of realization inspected too.

Added: Nov 30, 2012
Article
Костылова Н. А., Сорокин А. В. Безопасность информационных технологий. 2014. № 4. С. 53-59.

The results of the experimental attempts of elaboration of the previously proposed method for identifying clusters belonging to JPEG files are described. Type II errors rates for different file formats are estimated. The possible ways of their improvement for some file formats are offered.

Added: Oct 23, 2014
Article
Сорокин А. В. Безопасность информационных технологий. 2013. № 4. С. 97-100.

A possible application of the author’s method of differentiation of clusters belonging to JPEG files from other clusters on the digital media for expanding of existing data recovery methods is described in the work. The decrease in the number of operations needed to reach the correct result is estimated. A way of using described method for automated improvement of data carving results is considered.

Added: Feb 3, 2014
Article
Царегородцев А. В., Малюк А. А., Макаренко Е. В. Безопасность информационных технологий. 2014. № 4. С. 68-74.

Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justify the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment.

Added: Mar 26, 2015
Article
Царегородцев А. В., Качко А. К., Лавриненко М. М. Безопасность информационных технологий. 2014. № 1. С. 22-27.
In response to the ever growing needs in the storage and processing of data the main position are occupied by informational-telecommunication systems, operating on the basis of cloud computing. In this case, the key point in the use of cloud computing is the problem of information security. This article is primarily intended to cover the main information safety issues that occur in cloud environments and ways of their solutions in the construction of an integrated information security management system on the cloud architecture.
Added: Mar 26, 2015
Article
Царегородцев А. В., Макаренко Е. В. Безопасность информационных технологий. 2014. № 4. С. 59-67.

Achieving the goals of information security is a key factor in the decision to outsource information technology and, in particular, to decide on the migration of organizational data, applications, and other resources to the infrastructure, based on cloud computing. And the key issue in the selection of optimal architecture and the subsequent migration of business applications and data to the cloud organization information environment is the question of the total cost of ownership of IT infrastructure. This paper focuses on solving the problem of minimizing the total cost of ownership (TCO) cloud.

Added: Mar 26, 2015
Article
Царегородцев А. В., Лавриненко М. М., Лапенкова Н. В. Безопасность информационных технологий. 2014. № 1. С. 36-40.
Cloud computing will be one of the most common IT technologies to deploy applications, due to its key features: on-demand network access to a shared pool of configurable computing resources, flexibility and good quality/price ratio. Migrating to cloud architecture enables organizations to reduce the overall cost of implementing and maintaining the infrastructure and reduce development time for new business applications. There are many factors that influence the information security environment of cloud, as its multitenant architecture brings new and more complex problems and vulnerabilities. And the approach to risk estimation used in making decisions about the migration of critical data in the cloud infrastructure of the organization are proposed in the paper.
Added: Mar 26, 2015
Article
Царегородцев А. В., Макаренко Е. В. Безопасность информационных технологий. 2014. № 4. С. 112-117.
Today organizations are increasingly considering cloud computing as an alternative way of using information technology. At the same time, the use of different vulnerabilities of infrastructure components, network services and applications remains are the major threat to the cloud. The article proposes a methodology for vulnerability assessment for any type of cloud structures, which will allow to determine the coefficient of counter possible attacks and to correlate the amount of damage to the total cost of ownership of organization IT-infrastructure.
Added: Mar 26, 2015
Article
Зыков С. В., Кукушкин А. В. Безопасность информационных технологий. 2014. № 1. С. 65-66.
Added: Feb 16, 2016
Article
Зыков С. В. Безопасность информационных технологий. 2009. № 3.
Added: Jan 24, 2010
Article
Налютин Н. Ю., Синицын С., Хлытчиев О. Безопасность информационных технологий. 2008. № 3. С. 99-103.
Added: Oct 31, 2010
Article
Зыков С. В. Безопасность информационных технологий. 2009. № 1. С. 105-106.
Added: Jan 30, 2010
Article
Зыков С. В. Безопасность информационных технологий. 2008. № 1. С. 87-90.
Added: Mar 9, 2009