ASSESSMENT METHOD OF THE ATTAKS INFLUENCE ON THE INFOCOMUNICATION NETWORK ACCORDING TO EXISTING VARIABILITY
Journal Title: Вчені записки Таврійського національного університету імені В. І. Вернадського. Серія: Технічні науки - Year 2018, Vol 29, Issue 4
Abstract
The article explores methods for assessing vulnerabilities and the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the of existing vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.
Authors and Affiliations
М. О. Євдокименко, А. С. Шаповалова
LOG FILES PROCESSING AND ANALYSIS BY LOGHELPER SOFTWARE PRODUCT
The article discusses a software product that works with log files that are unclear to the simple user. The method of saving log files, their analysis and making decisions on corrections of detected errors of the user in...
THE MAIN INDICES OF FRUIT AND BERRIES’ SUITABILITY TO FREEZING
The author of the article presented the results of researching the biochemical composition of various wild and cultivated fruit and berries, according to the certain indices recommended by other scientists to examine as...
IMPROVING THE PROPERTIES OF CONCRETE FOR 3D PRINTING
In work the analysis of used materials is carried out at 3D printing in construction. To increase productivity and ensure high quality 3D printing, it is necessary to use concrete with enhanced properties. It is proposed...
SOME ASPECTS OF GEOMETRICAL MODELING OF TECHNICAL OBJECTS AND PROCESSES FOR FORMING POLYMER COMPOSITES. 2. MODELING OF THE STRUCTURE OF DISPERSE-FILLED THERMOSETS, AS WELL AS THE DESIGN OF TECHNOLOGY AND EQUIPMENT FOR MOLDING POLYMER COMPOSITES
Various aspects of geometric modeling of technical objects and processes of molding of unfilled and filled polymer composites are analyzed. The problems of modeling the structure and properties of disperse-filled thermos...
HTTP DATA CIPHERING ALGORITHM
Purpose. Modern tends of IT systems evolution are to fill all spheres of human life. Most of all, for connection and data transfer the HTTP protocol is used. Due to its oldness many modern problems find no simple solutio...