authentication

A Blockchain-Enhanced Self-Sovereign Identity Platform for Corporate Resource Security

In an era dominated by concerns of data breaches, and identity theft, security of corporate resources and assets has become paramount. Centralized identity management systems traditionally present vulnerabilities that can fundamentally threaten corporate security. This paper introduces a novel platform to identity management in organizations, leveraging the principles of Self-Sovereign Identity (SSI) and the technological robustness of block- chain.

SECURITY PROBLEMS IN SMART HOME SYSTEMS

This paper investigates the vulnerability of data transmission protocols used in smart home control systems, focusing on analyzing the communication protocols used in these systems. The spread of interconnected devices and the Internet of Things (IoT) has led to growing concerns about data privacy, unauthorized access, and potential cyberattacks. An in-depth analysis of various communication protocols used in the smart home environment was conducted, which allowed us to identify their advantages and disadvantages from a security perspective.

Intelligent system for clustering users of social networks based on the message sentiment analysis

The main objective of this article is the analysis of the intelligent system for clustering users of social networks based on the messages sentiment analysis. The main goal of this intelligent system is to form a general image of the user of the system by analyzing the sentiment of the data of the user's social networks and their subsequent clustering. An intelligent system was designed, which, using the Identity and Access/Refresh JWT token algorithms, provides fast  and maximally secure registration, authentication and processing of various system user sessions.

AUTHENTICATION SYSTEM BASED ON ACOUSTIC SIGNAL ANALYSIS

The paper has been devoted to the issues of authentication and authorization of users in systems running on the Internet are investigated, the problem of reliability of access and options for improving and enhancing the level of security and preservation of user data are considered. The article offers a solution to the problem of increasing reliability through the developed authentication system using the analysis of audio signals.

Biometric Data Based Method of Adaptive User Authentication in Computer Networks

According to the analysis of peculiarities of data protection in computer networks the necessity of usage of biometric data in user authentication services is founded. Adaptive method of user authentication in multilevel data protection system of computer network based on biometric data of fingerprints is introduced.

Information Protection in the System of Competence-based Characteristics Increasing and Evaluation of Auditor’s Knowledge Level

Continuous increasing knowledge of auditors is very important and yet difficult task Implementation of new technologies and automation of the learning process much easier and even cheaper this task. However, the automation of the process increasing the competence of auditor entails a number of threats related to unauthorized access, damage or theft of the information contained in the system.