ПРОГРАММНЫЙ КОМПЛЕКС ДЛЯ АКТИВНОГО МОНИТОРИНГА И АУДИТА БЕЗОПАСНОСТИ КОРПОРАТИВНОЙ СЕТИ ОРГАНИЗАЦИИ
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

SOFTWARE FOR MONITORING AND ACTIVE SECURITY AUDIT CORPORATE NETWORK

Oladko V.S.  

UDC 004.056
DOI:

  • Abstract
  • List of references
  • About authors

In the paper the author identified the main causes of violations of information security in the enterprise. Proposed approach to active monitoring and security auditing corporate network resources, taking into account the causes of security. Implemented software package that allows you to diagnose security incidents, assess their criticality and make recommendations aimed at combating and eliminating the consequences.

1. Kostrova V.N., Miloshenko O.V. Analysis Software Solutions Information Security / Modeling, Optimization and information Technology. 2015.№1 (8). P.21 [Electronic resource] .- Access mode: http://moit.vivt.ru/wpcontent/uploads/2015/04/KostrovaMiloshenko_1_15 _2.pdf (accessed September 15, 2015).

2. Emm D., Garnaeva M., Chevyshev V. Development of information threats in Q3 2014 // SecureList. [Electronic resource].- Access Mode: https: //securelist.ru/analysis/malwarequarterly/24365/razvitie-informacionnyx-ugroz-v-tretem-kvartale-2014- goda / (accessed September 4, 2015)

3. Symantec Intelligent report. July 2014 // Publications of the Security Service Response Symantec [Electronic resource] .- Access mode: http://www.symantec.com/content/en/us/enterprise/other_resources/bintelligence_report_07-2014.en-us.pdf (accessed September 1, 2015)

4. Atkina V.S. Disaster-Resistant Monitoring information system using a hybrid immune network. News SFU. Technical science. 2012. No 12 (137). S. 90-96

5. Zaitsev S.A., Subbotin S.A. Generalized model of artificial immune network // Neuroinformatics. 2010. Part 2.P. 98 - 107.

Oladko Vladlena Sergeevna

Email: VSOLADKO@mail.ru

Volgograd State University

Volgograd, Russian Federation

Keywords: corporate network, monitoring, auditing, security, reliability, threat

For citation: Oladko V.S. SOFTWARE FOR MONITORING AND ACTIVE SECURITY AUDIT CORPORATE NETWORK. Modeling, Optimization and Information Technology. 2015;3(3). Available from: https://moit.vivt.ru/wp-content/uploads/2015/10/Oladko_3_15_1.pdf DOI: (In Russ).

479

Full text in PDF