CONSTRUCTION OF A PROTECTED INFOCOMMUNICATION NETWORK UNDER THE CONDITIONS OF INFORMATION-TECHNICAL INFLUENCES ON THE ELEMENTS OF THE MEMORY COMMUNICATION NETWORK

DOI: 10.31673/2412-4338.2022.040413

Authors

  • Г. О. Гринкевич, (Grynkevych G. O.) State University of Telecommunications, Kyiv
  • А. Г. Захаржевський, (Zakharzhevsky A. H.) State University of Telecommunications, Kyiv

Abstract

Ensuring a secure information and communication network with memory requires a comprehensive approach that includes the use of modern encryption algorithms, hash functions, firewalls, VPN, and multi-factor authentication, as well as continuous monitoring and auditing of the network. Only such a comprehensive approach will allow for a high level of network security.
Digitization, informatization, and globalization have provided the foundation for the formation of one of the most complex systems - cyberspace, which provides a wide range of information and communication services to the international community in various areas of life. The increasing pace of development of this system, its coverage and penetration into all spheres have led to the emergence of new forms of threats in cyberspace.
The maximum damage from the realization of threats in cyberspace, which are carried out through information and technical influences, is determined by the potential harm caused to the target during its critical operational mode. Critical infrastructure has an especially high potential for harm. Its operation is usually ensured by an automated system for managing the technological process, the components of which communicate through communication networks.
The issue of building a secure information and communication network in conditions of information and technical influences on communication network elements with memory has been investigated. A methodology for building a secure information and communication network in conditions of information and technical influences on communication network elements with memory has been presented. The possibility of transitioning from object protection of correspondents and communication network elements to group protection, as well as increasing the likelihood of data transmission in the event of blocking the spread of destructive influences and nodes of their sources, has been substantiated. It has been found that ensuring the stability of the information flow can be achieved, firstly, by increasing the security of correspondents and communication network elements through controlled physical placement of transmission and reception paths, as well as the use of modern means of protection, and secondly, by creating a system of continuous monitoring and auditing of the network.

Keywords: information communication networks, information directions, information and technical influences, destructive influences, information security.

References
1. Damage from cyber attacks on critical infrastructure: ransomware mechanisms / O. O. Bashkov, V. M. Kuzmin // Information Security Problems. - 2018. - Vol. 21, No. 1. - P. 36-45. (https://doi.org/10.20535/2307-7502.2018.21.1.128456)
2. Ministry of Digital Transformation of Ukraine. Cybersecurity: protection of critical infrastructure (https://thedigital.gov.ua/ua/post/kiberbezpeka-zahist-krytychnoi-infrastruktury)
3. Protection of critical infrastructure from cyber threats / Yu. P. Volkov, V. V. Kutsenko, A. S. Rak // Scientific Bulletin of the International Humanities University. - 2017. - Issue 25, Part 1. - P. 39-41. (http://nbuv.gov.ua/UJRN/Nvmgu_2017_25_1_13)
4. Cybersecurity of critical infrastructure: problems and ways to solve them / V. M. Borisenko, O. O. Lishchuk, I. V. Kolin'ko et al. // Information Security Problems. - 2019. - Vol. 22, No. 1. - P. 43-49. (https://doi.org/10.20535/2307-7502.2019.22.1.178439)
5. Cybersecurity of critical infrastructure: technologies and protection methods / N. V. Kolodyazhna, S. V. Parkhomenko, I. V. Rohovenko et al. // Electronic Scientific Professional Publication "Information Technologies and Computer Engineering". - 2020. - Issue 1(47). - P. 37-48. (http://ite.khpi.edu.ua/article/view/195054/193638)
6. Kshetri, N. (2018). Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80-89. https://doi.org/10.1016/j.ijinfomgt.2017.12.011
7. Cisco Systems, Inc. (2017). VPNs and VPN Technologies. https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/index.html
8. Microsoft Corporation. (2022). Virtual Private Network (VPN). https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/about-vpn-devices-for-always-on-vpn
9. Zhang, J., Huang, D., & Zhang, Y. (2019). A novel hybrid intrusion detection system for network security in the IoT environment. Journal of Network and Computer Applications, 136, 108-119. https://doi.org/10.1016/j.jnca.2019.03.020
10. Symantec Corporation. (2022). Endpoint Protection. https://www.symantec.com/products/endpoint-protection
11. McAfee, LLC. (2022). Antivirus Software. https://www.mcafee.com/enterprise/en-gb/products/antivirus-software.html

Published

2023-05-02

Issue

Section

Articles