Implementation of the Information Resources Protection Based on the CentOS Operating System

被引:0
作者
Korniyenko, Bogdan [1 ]
Galata, Liliia [2 ]
机构
[1] Natl Tech Univ Ukraine, Igor Sikorsky Kyiv Polytech Inst, Kiev, Ukraine
[2] Natl Aviat Univ, Kiev, Ukraine
来源
2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019) | 2019年
关键词
information; simulation; security; threats;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article presents the process of implementing the information security system by using Linux to protect confidential information from the unauthorized influence of intruders. The Unix core protection model was explored. The information communication network was chosen as the object of protection, which is located in the simulated system, based on EVE. Using certain criteria, the optimal software and the virtual hardware were selected. The information and communication network's attacks and tests were implemented by using Kali Linux.
引用
收藏
页码:1007 / 1011
页数:5
相关论文
共 16 条
[1]  
Alapati Sam, 2016, MODERN LINUX ADM, P500
[2]  
Hertzog Raphael, 2017, KALI LINUX REVEALED, P347
[3]  
Korniyenko B., 2016, INT SCI J, V2, P78
[4]  
Korniyenko B., 2018, INFORM TECHNOLOGIES, V2318, P176
[5]  
Korniyenko B., 2013, ADV SCI J, V8, P53
[6]  
Korniyenko B., 2017, CEUR WORKSHOP P, V2067, P23
[7]  
Korniyenko B., 2016, SCI EUROPE, V2, P61
[8]  
Korniyenko B.Y., 2018, CUTTING EDGE SCI, P48
[9]  
Korniyenko B. Y., 2014, INFORM TECHNOLOGY OP
[10]  
Korniyenko B. Y., 2017, HAYKOMH TEHHONOR, P114