Кафедра безпеки інформаційних технологій (БІТ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра безпеки інформаційних технологій (БІТ) за датою видання
Зараз показано 1 - 20 з 349
Результатів на сторінку
Варіанти сортування
Публікація Розробка заходів захисту від ЛСАР(ХНУРЭ, 2009) Резніченко, С. О.; Ковальчук, Ю. М.The given work is devoted to research of possibilities of laser systems of acoustic reconnaissance. Research consists in building and the analysis of corresponding quantitative models, for obtaining the results which can be used in process of assessment of the information leakage channel and building the measures of protection.Публікація Анализ уязвимостей системы доменных имен в сетях TCP/IP(ХНУРЭ, 2009) Килипко, С. В.This report considers approach to describing the security issues for Domain Name System. Also author describes extensions to DNS that provide data integrity and authentication to security aware resolvers and applications thought the use of cryptographic digital signatures.Публікація Системы цифровой подписи и направленного шифрования на идентификаторах(ХНУРЭ, 2009) Козулин. A. A.This work is devoted applications of bilinear pairings in cryptography and contains basic concepts and ideas of the use of the id-based systems.Публікація Оптимізація витрат підприємства на захист інформації(ХНУРЭ, 2009) Левітін, П. Є.State standard DSTU 3396.1-96 defines the order or work on organization of information security. In the report the the question of optimization of information security cost is discussed for achieving the maximum profit from enterprise.Публікація Оцінка спектрального складу випромінювань ЗОТ в умовах відбиття від кількох поверхонь з різними характеристиками(ХНУРЭ, 2009) Ясиновий, С. Ю.Іп scientific the situation of providmg ot detence ot side electromagnetic radiations of facilities of the computing engineering is considered to facilities of radiorozvidki on small distances, taking into account the reflection of signal from a terrene and other substantial surfaces on the way of distribution of viprominyuvach-priymach. Research purpose - a construction of theoretical model of channel of side electromagnetic radiations is with the factor of interference.Публікація Технологии защиты информации на основе применения тестирования(ХНУРЭ, 2009) Семченко, Д. А.; Дейнеко, А. А.The given work is devoted to construction of model informational safety in ITS on the basis of carrying out of testing. The purpose of the work is creation of protected ITS system from the malefactor by research of various attacks for ITS system. The software is developed, permitting to create the protected information system.Публікація Корреляционные свойства блочных симметричных шифров, представленных на открытый конкурс(ХНУРЭ, 2009) Дроботько, Е. В.; Еригорьев, A. B.Analytical review of correlated characteristic’s estimation procedures of encryption transformation is given in the article. Authors provide some new results about an application of these estimation procedures for scaled versions of symmetric block ciphers, e.g. LABIRINT.Публікація Разработка показателей оценки эффективности систем обнаружения вторжений(ХНУРЭ, 2009) Герцог, А. Н.Intrusion detection system evaluation is considered. Qualitative and quantitative indicators of practical functionality IDSs are investigated for developing a scoring system.Публікація Анализ эффективности применения представлений больших целых чисел по множественным основаниям в несимметричной криптографии(ХНУРЭ, 2009) Шепляков, Р. И.The efficiency of using double oase ana multiple oase number representations in public-key cryptography is consideredПублікація Порівняльний аналіз методів аналізу ризиків Magerit та MEHARI(ХНУРЭ, 2009) Хоменко, А. В.Main deficiencies of risk analysis (RA) documentation were discussed. Methods Magerit and MEHARI were chosen as those are containing system features. Results of their comparison were given. A task of creating enhanced RA method suitable for practical appliance was posed.Публікація Анализ и оценивание информационных рисков(ХНУРЭ, 2009) Одарченко, А. С.; Дейнеко, А. А.In the given report questions of methods of an estimation of information risks are discussed. Existing techniques and algorithms of an estimation of risks and also an urgency and expediency of an estimation of information risks are considered. Ordered results possible adapt in different organizations with different levels of IMS.Публікація Функциональное тестирование программноаппаратных комплексов(ХНУРЭ, 2009) Мостовая, К. Л.; Денисов. Е. А.The given work is devoted to the functional testing approach of modern HW/SW systems in order to confirm that product meets the initial functional expectations. The work presents the approach of testing HW and SW components of complex digital systems.Публікація Пути повышения практической подготовки студентов по дисциплине «техническая защита информации»(ХНУРЭ, 2009) Халина, О. М.The given work is devoted consideration of problems of upgrading preparation of specialists with higher education, control of educational work and estimation of knowledges of studentsПублікація Стан створення та застосування методів генерування ЗСП(ХНУРЭ, 2009) Фролов, О. С.Qualified work contains the analysis of algorithms of generation general system parameters to the cryptography systems realized in group of points of elliptic curves. The comparative analysis of resistance of unsymmetrical systems realized in rings, fields and groups of points of elliptic curves is resulted. And also resistance of various algorithms of a digital signature attack of a selective fake. The advanced method of definition about random generated curve is developed.Публікація Анализ и исследование схемы разворачивания ключей шифра «Калина»(ХНУРЭ, 2009) Дырявый, B. C.This work is devoted to research and analysis of key expansion scheme of symmetric block cipher “Kalina” proposed as a candidate to a national standard of Ukraine. Statistic properties of “Kalina” 128 bit version were tested by NIST STS. Collision properties were researched on reduced versions of the cipher. Important facts and assumptions were received.Публікація Перспективний генератор випадкових бітів на геш-функціях та його властивості(ХНУРЭ, 2009) Шапочка, Н. В.The requirements to pseudorandom bit generators are proved and determined. The technique is offered and the result of research of statistical characteristics random bit generator on hash function is resultedПублікація Види політик безпеки інформації та вимоги до них(ХНУРЭ, 2009) Лисенко, К. О.Providing information security it is one of the most important and difficult problems which every modem company has to solve. This is a complicated task which demands system approach and considerable financial costs. Security policy is the core element of information security. The work is devoted to types of security policies and requirements to them.Публікація Повышение характеристик систем передачи данных в информационных системах(ХНУРЭ, 2009) Филиппенко, И. В.For increase properties of transport information the communication channel and for provide high intervenient reliability there is actual using spread spectrum technology.Публікація Порядок розроблення заходів захисту відомостей з обмеженим доступом(ХНУРЭ, 2009) Бакликов, О. О.The sequence of operations for working out measures to information security was developedПублікація Аналіз та дослідження ефективності використання нових методів еліптичного скалярного множення(ХНУРЭ, 2009) Танцура, Д. В.During realization of electronic digital signature (DSA) standards, using cryptotransformation in the groups of points of elliptic curves (EC), are more frequent than all used in the modern systems of defence of commercial and other valuable information.