security

Using Kali Linux and Metasploitable for Penetration Testing for Studying Purposes

This paper comprises information about penetration testing methodology, its methods and ways of implementation. The current free and open-source software has been analyzed. It has been done the example of penetration testing in academic field for studying purposes on the base of Kali Linux and Metasploitable2 Linux. This tests and techniques purpose proactive methods of defense and must help to improve security of computer systems and corporate networks.

Energy diplomacy as an important aspect of state's foreing policy: European experience for Ukrainians

The article considers a notion of energy diplomacy and peculiarities of its conduction, defines primary tasks for development of energy diplomacy in the foreign policy of Ukraine. With the help of historical, systemic, and structural functional methods, it is revealed that interstate collaboration in the form of energy diplomacy pursues the national interest of a state through applying a wide range of classical and specific foreign policy actions, and creates additional means of counteracting global contemporary challenges connected with the energy sector.

Prospects for the eastern partnership under geopolitical and security changes in the Eastern European region

The article dwells upon “Eastern Partnership” (EaP) initiativeand proves that the issue of its reforming has been acquiring considerable relevance under conditions of the aggressive foreign policy of the Russian Federation, contradictions within the European Union, and lack of a unified position on the solution of pressing political and security problems in the European region.

Optimal codes on vector combinatorial configurations

Concept of coding systems optimizations based on vector combinatorial configurations (the Ideal Vector Rings models), with the optimization being embedded in the underlying combinatorial models, is regarded in this paper. This paper  is aimed at improving the qualitative indices of multidimensional vector data information technologies and computer systems with respect to transmission speed of vector data  with automatic error correction, and data security using a variety of multidimensional combinatorial configuration and finite cyclic group theory.