?
The Use of Hardware Virtualization in the Context of Information Security
Programming and Computer Software. 2012. Vol. 38. No. 5. P. 276-280.
The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development in the field are discussed.
Research target:
Computer Science
Language:
English
Silakov D., Системный администратор 2020 № 10 С. 28-31
Установка и настройка компонентов Kubernetes никогда не была сверхсложным делом, но и совсем тривиальной ее не назовешь. Традиционный подход с использованием kubeadm подразумевает изрядный набор ручных действий со стороны системного администратора ...
Added: October 13, 2020
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Baranov P., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 152-159
The article's task is to analyze risk management methods both presented in written sources such as technical literature, standards, recommendations and experienced on practice. The analysis' goal is to propose a classification, highlight strong and weak 2 spots concerning practical appliance for information security (IS) purposes. The second goal is to propose ways of implementation ...
Added: March 17, 2015
Baranov A., Информационная безопасность 2016 № 4 С. 58-60
Если десять лет назад о том, что такое электронная подпись, знали десятки, максимум сотни челове по всей России, то сегодня с ней знакомы миллионы. За эти годы мы накопили достаточно опыта, чтобы решить все технические вопросы. Решена даже проблемы визуализации в разных операционных системах, которая вначале представлялась катастрофичной. И вот, когда все технические аспекты кажутся ...
Added: January 17, 2017
Baranov P., Baranov A., Проблемы информационной безопасности. Компьютерные системы 2017 № 4
The article analyzes possibilities of errors in telecommunication protocols using packet data transmission. Probabilistic model of a prolonged-action additive interference is represented as a sequence of executions of independent interference blocks with definite length. The paper shows that in certain conditions concerning a polynomial of degree k, used for creation of CRC code, with block ...
Added: February 26, 2018
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Baranov A., Системы высокой доступности 2012 Vol. 8 No. 2 P. 12-15
The direction of cloud computing protection development is considered in the article. It is suggested to consider the structure of a queuing system based on processing data centers (PDC), as the combination of six components: the hardware PDC element; telecommunication PDC resources access element; users and the software associated to them; the «middle» PDC layer, ...
Added: December 2, 2012
Baranov P., СПб. : Санкт-Петербургский государственный политехнический университет, 2014
Сборник составлен по материалам 23-ей научно-технической конференции "Методы и технические средства обеспечения безопасности информации", Санкт-Петербург 30 июня - 03 июля 2014 года, посвященный решению проблем кибербезопасности, относящихся к чрезвычайно актуальной, динамически развивающейся отрасли обеспечения безопасности обработки и передачи информации в системах критического назначения, к которым принято относить системы управления финансами, связью, транспортом и ядерной энергетики. ...
Added: March 17, 2015
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2017 № 2 С. 39-45
The paper considers certain probability-theoretic models of packet mode-transferred information distortions. Attention is drawn mainly to distortions, including possible interferences influencing multiple transfer cycles. Distortions are modeled by a consequential impacts that are defined by dependent random variables. K-dimensioned values of CRC, respectively allow representation as a sum of k-dimensioned independent random variables.
In some cases ...
Added: September 11, 2017
Silakov D., Труды Института системного программирования РАН 2011 Т. 20 С. 25-36
Статья посвящена возможностям использования аппаратной виртуализации для решения различных задач информационной безопасности. Предлагается обзор подходов к повышению безопасности программных систем, основанных на использовании виртуализации. Также приводится обзор возможных сценариев использования виртуализации злоумышленниками. Указываются области применения и ограничения существующих решений и дальнейшие перспективы развития рассматриваемой области. ...
Added: September 22, 2015
Baranov A., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 9-16
The basic principle of this article is structured representation of computer technologies. Application of this principle shows that any independent part of information computing system could be represented as a set of connection hardware units and different computers with specialized roles in the system. The items of the set, in turn, are operated through an ...
Added: November 4, 2016
Isaev E., Dumsky D., Samodurov V. et al., Математическая биология и биоинформатика 2015 Т. 10 № 2 С. 567-579
The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This ...
Added: December 19, 2015
Suvorov A., Матанцева М. О., Plotnikova E. G., Безопасность в техносфере 2018 Т. 7 № 5 С. 35-42
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among ...
Added: October 2, 2019
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Vnukov A., Билык Т. А., Вестник Российского университета дружбы народов. Серия «Инженерные исследования» Научный журнал. 2012 № 2 С. 68-77
Information security with Message Authentication Code
T.A. Bilyk, A.A. Vnukov
This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on. Also the results of testing the software implementation of ...
Added: March 19, 2013
Tsaregorodtsev A. V., Дербин Е. А., Мухин И. Н., Информация и безопасность 2015 Т. 18 № 3 С. 408-411
The use of cloud computing to build of IT-infrastructure of the organization implies the refusal of the organization direct control over the security aspects. There is a need for solving the problem of data privacy in the design architecture based on cloud computing technology. In the article the simulation method of data processing using Petri ...
Added: March 15, 2016
Tsaregorodtsev A. V., Мухин И. Н., Боридько С. И., Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
Fomin S. S., Качество. Инновации. Образование 2014 № 12 (115) С. 26-32
The experience of virtual environments application for doing of practical works in a field of information-telecommunication technologies is described. Variants of virtual environments realizations for work with a part of local network are considered. Information about realization of virtual environment in a personal computer is reported. ...
Added: March 11, 2015
Silakov D., Труды Института системного программирования РАН 2019 Т. 31 № 4 С. 29-38
The paper is devoted to the problem of early error detection and analysis in hyperconverged systems. One approach to organizing hyperconverged systems is to install on each physical server a separate instance of an operating system (OS) that carries virtualization tools and tools for administering and using a distributed data warehouse. Errors can occur both ...
Added: October 24, 2019
Silakov D., Системный администратор 2017 № 4 С. 18-23
Virtuozzo Automator which provides Web interface for managing a set of machines with Virtuozzo is targeted to system administrators. But what if one wants to provide ordinary user with possibility to manage his virtual environments?
This task is solved by Birtuozzo PowerPanel described in this paper. ...
Added: August 17, 2017
Evsyutin O., Култаев П. И., Multimedia Tools and Applications 2021 Vol. 80 No. 7 P. 11217-11238
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the ...
Added: December 24, 2020
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2016 № 1 С. 70-75
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. It is shown in research [1] that CRC value could be represented as a sum of special-way formed random vectors over k-dimension vector space GFk(2) over a two-element 0,1-field (GF(2)).If the message or errors are modeled using independent random ...
Added: December 5, 2015