information protection

Analysis and Improvement of Information Security Technologies in Distributed and Asymmetric Systems

The article discusses modern information security technologies in distributed and asymmetric systems, as well as problems arising from their implementation in the context of growing cyber threats. An analysis of cryptographic methods, authentication systems, access control, and intrusion detection has been provided. Particular attention has been paid to the limitations of existing technologies and promising areas for their improvement, in particular the use of machine learning methods, block chain technologies, and the Zero Trust concept.

Research Into the Possibility of Integrating the Compartmentalization Method Into the Protection of Information in Open Sources

The article examines the integration of the compartmentalization method as a fundamental cybersecurity principle in the strategy of protecting information in open sources, in particular to counter OSINT technologies. The authors emphasize that modern cyber threats, enhanced by the massive use of open sources, create risks of leakage of personal data and confidential information, especially through social networks and other platforms where the human factor is a key element of vulnerability.

HYBRID MODEL OF NETWORK ANOMALIES DETECTION USING MACHINE LEARNING

The increasing complexity of cyber threats requires the development of effective methods for detecting and classifying attacks in network traffic. This study analyzes the effectiveness of three popular machine learning algorithms: Random Forest, which is used for anomaly detection, Support Vector Machines (SVM), which performs cyber threat classification, and autoencoders, which are used for data preprocessing and deep traffic analysis.

Docker Container Image Scanning Methods

With the development of containerized environments, the issue of security is becoming critical for application deployments. This article provides a comparative analysis of static and dynamic methods for scanning Docker container images. Static analysis is used to identify potential vulnerabilities before container deployment, while dynamic analysis is performed in an isolated environment at runtime, ensuring product reliability.

Establishment of the ukrainian national instituteof information security:institutional aspect of information security policy of national state formations of 1917–1921

The institutional aspect of the information protection policy of Ukrainian national state
formations of the revolutionary wave of 1917–1921 is researched. The opinion on the general insufficient
attention of national Ukrainian state formations regarding the development of institutions aimed at
ensuring their information security is expressed. It is emphasized that the underestimation of the factor
of information security not only negatively affected the process of state building, but also to some extent

Assessing Protection Means of Information Resources

The paper considers specifics of information resources protection in corporate networks and systems. An approach to assessing protection means is described which allows to reduce their deployment cost and adapts easily to specific needs of any organization with an allowance for specifics of its activities and business. Such an approach makes it possible to describe information resources more precisely through their characteristic vulnerabilities and resources cost. It also helps to rank the risks and information resources according to their criticality for organization activities.