scholarly journals Model of Threats to Computer Network Software

Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1506 ◽  
Author(s):  
Aleksey Novokhrestov ◽  
Anton Konev ◽  
Alexander Shelupanov

This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.

2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Yi-Kuei Lin ◽  
Louis Cheng-Lu Yeng

Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN). This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs). Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu) to one sink (New York) that goes through a submarine and land surface cable between Taiwan and the United States.


2020 ◽  
Author(s):  
Olyeg Isachyenko

The tutorial includes information about the main types of computer network software, modern Web technologies, and popular Web application development tools. Meets the requirements of the Federal state educational standards of secondary professional education of the last generation. Designed for students of secondary professional education, enrolled in the enlarged group of specialties 09.02.00 "computer science" and studying discipline "Software, computer networks and Software, computer networks and Web servers." It can also be useful for students of higher educational institutions.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Long Chen

With the development of society, we have entered the information age.Computer network technology is widely used in people’s life and production, and has played an important role in promoting social progress. However, due to its own nature and characteristics, some security risks have appeared in the process of application in the development of computer network technology, which interferes with the safe use of computer networks. This article combines the information security risk of computer network, making an analysis of the information security architecture of computer network based on WPDRRC model, and the strategy of how to prevent computer network security risk.


Author(s):  
Uri Blumenthal ◽  
Joshua Haines ◽  
William Streilein ◽  
Gerald O’Leary

Situational awareness – the perception of “what is going on” – is crucial in every field of human endeavor, especially so in the cyber world where most of the protections afforded by physical time and distance are taken away. Since ancient times, military science emphasized the importance of preserving your awareness of the battlefield and at the same time preventing your adversary from learning the true situation for as long as possible. Today cyber is officially recognized as a contested military domain like air, land, and sea. Therefore situational awareness in computer networks will be under attacks of military strength and will require military-grade protection. This chapter describes the emerging threats for computer SA, and the potential avenues of defense against them.


2014 ◽  
Vol 687-691 ◽  
pp. 1806-1809
Author(s):  
Kai Zhang ◽  
Liang Zhao ◽  
Hai Qing Cao

Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.


2014 ◽  
Vol 496-500 ◽  
pp. 2162-2165
Author(s):  
Zhen Lu ◽  
Zhen Xiong ◽  
Ke Qin Tu

The modern computer network has been everywhere in our daily life and working. People obtain information from a computer network or use it to improve working efficiency. The computer network becomes more and more important. The information security decides the long-term stable application of the network. Actually, information security receives various security threats during the practical application. If we cannot support effective, reasonable, and comprehensive protection strategy on time, computer network information or data will be stolen and destroyed. This article analyzes and researches various security loopholes that aiming at computer network information security, and provides related protection strategy.


Author(s):  
Александр Григорьевич Остапенко ◽  
Евгений Валерьевич Зарочинцев ◽  
Ольга Александровна Остапенко ◽  
Ксения Владимировна Сибирко ◽  
Виктория Витальевна Сафронова ◽  
...  

Целью исследований является повышение защищённости распределенных компьютерных сетей за счет формализации поливирусных эпидемических процессов в них на основе специально созданного методического поливирусного обеспечения оценки и регулирования рисков. В работе продемонстрированы поливирусные модели, позволяющие моделировать поливирусное воздействие на компьютерную сеть. При помощи представленных моделей было произведено моделирование поливирусного воздействия на сетевую структуру. Полученные результаты могут быть использованы исследователями в области моделирования эпидемических процессов, данные модели позволят более точно и качественно оценивать протекание поливирусных эпидемических процессов в распределённых компьютерных сетях, а также специалистами по защите информации при разработке мер противодействия распространения компьютерных вирусов и реализовать задел к рассмотрению скоростных и качественных особенностей протекания поливирусных эпидемических процессов в компьютерных сетях. The purpose of the research is to increase the security of distributed computer networks by formalizing the multivirus epidemic processes in them on the basis of a specially created methodological multivirus support for risk assessment and management. The work demonstrates polyviral models that allow simulating a polyviral effect on a computer network. The presented models were used to simulate the polyviral effect on the network structure. The results obtained can be used by researchers in the field of modeling epidemic processes, these models will allow for a more accurate and high-quality assessment of the course of polyviral epidemic processes in distributed computer networks, as well as information security specialists in the development of measures to counter the spread of computer viruses, and features of the course of polyviral epidemic processes in computer networks.


Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

Let us make a statement of fact here that three principles define computer network security. These principles are: prevention, detection, and response. The high degree of iIternetworking and our growing dependence on computers have both, along with others factors, created an insatiable demand for information on and about people and products. This, in turn, has created a new class of hackers and information thieves determined to raid computer networks for proprietary information. All of a sudden, computer networks have come to be pots of honey attracting many. Consequently, the stampede for information from computer networks must be met with strong mechanisms, first to detect those trying to penetrate the system, secondly to prevent them from trying, and thirdly to respond to the attempt, successful or not. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention, because if we are able to detect all security threats and prevent them, then there is no need for response. So we will focus on prevention in this chapter, but before we do, let us define the working terms.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Sign in / Sign up

Export Citation Format

Share Document