About one approach to increasing the security of computer systems against intrusion

: pp. 21 - 27
Lviv Polytechnic National University, Computer Engineering Department

The article considers an approach to increasing the security of computer systems from intrusion. The importance of the problem of information security and cybersecurity is substantiated. Strategies of attack and destructive actions used by intruders (hackers) are considered. 16 different attack and intrusion strategies are identified.

The reasons for the vulnerability of computer systems are analyzed. Two groups of reasons are considered: objective reasons depending on the hardware and software components of the computer system and subjective reasons depending on the human factor. It is noted that one of the main reasons that objectively complicate the protection of a computer from intrusion is that the same computer is assigned the solution of two unrelated problems: the direct solution of tasks, which are essentially an internal problem, and the tasks of communication, which can be seen as an external problem.

An approach is proposed to increase the security of computer systems from intrusion through hardware redundancy, in particular, instead of one computer, use a computer unit consisting of two computers – internal and external. The internal computer is used for the direct solution of tasks. The external computer is responsible for performing communication tasks. Additionally, the issues of physical protection of computer systems are considered.

  1. Kianpour M.; Kowalski S.; Øverby H. (2021). Systematically Understanding Cybersecurity Economics: A Survey, Sustainability. 13 (24): 13677. – Pp. 1–28. DOI:10.3390/su132413677.
  2. Santos J. C. S., Tarrit K., Mirakhorli M. (2017). A Catalog of Security Architecture Weaknesses, in Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA). – Pp. 220–223. DOI:10.1109/ICSAW.2017.25.
  3. Deb R. & Roy S. (2022). A comprehensive survey of vulnerability and information security in SDN. Computer Networks. Vol. 206, 108802. – Pp. 1–21. DOI: 10.1016/j.comnet.2022.108802.
  4. Williams P., Dutta I., Daoud H. & Bayoumi M. (2022). A Survey on Security in Internet of Things with a Focus on the Impact of Emerging Technologies. Internet of Things. 19. 100564. – Pp. 1–24. DOI:10.1016/j.iot. 2022.100564.
  5. Bergh Johnsson D., Deogun D., Sawano D. (2019). Secure By Design, Manning Publications. – 410 p.
  6. Xiaojuan M. (2017). Research and Implementation of Computer Data Security Management System. Procedia Engineering. Vol. 174. – Pp. 1371–1379. DOI: 10.1016/j.proeng.2017.01.290.
  7. Morozova O., Nicheporuk A., Tetskyi A. & Tkachov V. (2021). Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks. Radioelectronic And Computer Systems. No. 4. – Pp. 145–156. DOI: 10.32620/reks.2021.4.12.
  8. Gupta V., Singh S., Singh C. & Mangla A. (2022). A Systematic review on Cybersecurity: Models, Threats and Solutions, in Proceedings of the 10th International Conference on Emerging Trends in Engineering and Technology – Signal and Information Processing (ICETET-SIP-22). – Pp. 1–6. DOI: 10.1109/ICETET-SIP- 2254415.2022.9791666.
  9. Yemets V., Melnyk A., Popovych R. (2003). Modern cryptography. Basic concepts. Lviv: BaK. – 144 p. (in Ukrainian).
  10. Villasenor J. (2010). The Hacker in Your Hardware: The Next Security Threat. Scientific American. 303 (2). – Pp. 82–88. DOI:10.1038/scientificamerican0810-82.
  11. Neumann J. von. (2016). Probabilistic Logics and the Synthesis of Reliable Organisms From Unreliable Components, Automata Studies. (AM-34). Vol. 34, ed. by C. E. Shannon and J. McCarthy. Princeton: Princeton University Press. – Pp. 43–98. DOI: 10.1515/9781400882618-003.
  12. Shannon C. E., Warren W. (1998). The Mathematical Theory of Communication. University of Illinois Press. – 144 p.