local computer network
Recently Published Documents


TOTAL DOCUMENTS

51
(FIVE YEARS 3)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
pp. 17-25
Author(s):  
Mikhail Dobryshin ◽  
◽  
Pavel Zakalkin ◽  

Abstract: The purpose of the article is to inform information security specialists and researchers of the identified analytical dependencies that take into account the parameters that characterize the process of conducting computer attacks of the “Phishing” type. New dependencies provide an increase in the reliability of the results of assessing the security of a local computer network that has access to the global information space from the specified threat. Research method: simulation of computer attacks of the “Phishing” type and determination of the analytical model based on the approximation of the simulation results. The result: a set of tools for engineering and technical personnel has been created to assess the security of a local computer network from a “Phishing” type of computer attack and, if the result is unsatisfactory, determine measures to protect the network.


Author(s):  
S. N. Goryachev ◽  
◽  
N. S. Kobyakov ◽  
S. N. Kostarev ◽  
◽  
...  

The mechanism of computer virus infection of workstations is considered, the transmission of a virus from an infected workstation to an uninfected one. The impact of a computer virus on a local area network is analyzed. An instrumental model for the study of the system "computer virus-carrier-automated workstation-local-computer network" is presented.


Author(s):  
O. V. Shefer ◽  
G. V. Golovko ◽  
Ye. A. Chaika ◽  
M. A. Luchko

The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the Regional Office of Water Resources in Poltava region. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. Results. All possible types of network applications and components were identified and the most optimal process for updating and improving the computer network at the Regional Office of Water Resources in Poltava region was chosen. Also, with the introduction of a new local computer network, the possibility of choosing from the most widespread local networks was analyzed and having come to a conclusion that the local computer network topology of the star is the most optimal option for this enterprise. The article analyzes and points out that the implementation of this computer network also increases the network security, and significantly increases the speed of fixing the emerging problems in any workstation without affecting the overall network performance. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health


Author(s):  
G. Golovko ◽  
Ye. Chaika ◽  
M. Luchko

The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the enterprise Magnetic Corporation. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health.


Sign in / Sign up

Export Citation Format

Share Document