Implementation of the Information Resources Protection Based on the CentOS Operating System

被引:0
|
作者
Korniyenko, Bogdan [1 ]
Galata, Liliia [2 ]
机构
[1] Natl Tech Univ Ukraine, Igor Sikorsky Kyiv Polytech Inst, Kiev, Ukraine
[2] Natl Aviat Univ, Kiev, Ukraine
关键词
information; simulation; security; threats;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article presents the process of implementing the information security system by using Linux to protect confidential information from the unauthorized influence of intruders. The Unix core protection model was explored. The information communication network was chosen as the object of protection, which is located in the simulated system, based on EVE. Using certain criteria, the optimal software and the virtual hardware were selected. The information and communication network's attacks and tests were implemented by using Kali Linux.
引用
收藏
页码:1007 / 1011
页数:5
相关论文
共 50 条
  • [1] The information protection level assessment system implementation
    Trapeznikov, E. V.
    [J]. METROLOGY, STANDARDIZATION, QUALITY: THEORY AND PRACTICE, (MSQ-2017), 2018, 998
  • [2] Research and implementation of network protection system based on integrated and wide area information
    Chen, Zhao-Hui
    Zhao, Man-Yong
    Zhou, Hong-Yang
    Gong, Jian-Ping
    Wang, Li
    Xu, Zhen-Yu
    Yao, Bin
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2009, 37 (24): : 106 - 108
  • [3] Thesaurus implementation in integrated system of information resources (ISIR)
    Hung, NM
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2004, 30 (04) : 230 - 240
  • [4] Thesaurus implementation in integrated system of information resources (ISIR)
    Hung N.M.
    [J]. Programming and Computer Software, 2004, 30 (4) : 230 - 240
  • [5] Knowledge-Based Environmental Information System Support for Wetland Resources Protection and Utilization
    Luo, Jun
    Zhang, Weiguo
    Wu, Bingshan
    [J]. ENVIRONMENT MATERIALS AND ENVIRONMENT MANAGEMENT PTS 1-3, 2010, 113-116 : 1256 - 1260
  • [6] Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa
    Botha, Johnny
    Eloff, M. M.
    Swart, Ignus
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 39 - 48
  • [7] Impact of Inverter Based Resources on System Protection
    Haddadi, Aboutaleb
    Farantatos, Evangelos
    Kocar, Ilhan
    Karaagac, Ulas
    [J]. ENERGIES, 2021, 14 (04)
  • [8] On the Implementation of a Intellectual Property Protection based on Information Hiding
    Basu, Abhishek
    Sur, Susmita
    Mallick, Rabiul
    Sarkar, Subir Kumar
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC), 2012,
  • [9] The Design and Implementation of Human Resources Management Information System(HRMIS) Based on B/S Structure
    Min, Wang
    [J]. MATERIALS, INFORMATION, MECHANICAL, ELECTRONIC AND COMPUTER ENGINEERING (MIMECE 2016), 2016, : 143 - 147
  • [10] System protection based on local information
    Dong, Xin-Zhou
    Ding, Lei
    Liu, Kun
    Shi, Shen-Xing
    Wang, Bin
    Cui, Liu
    Bo, Zhi-Qian
    [J]. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2010, 30 (22): : 7 - 13