Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2020.10
Published:
2020-12-24
Title
Title
1-3
Abstract views: 485 | PDF Downloads: 129
PDF (Українська)
Content
Contents
4-5
Abstract views: 403 | PDF Downloads: 152
PDF (Українська)
Articles
CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
6-28
Abstract views: 660 | PDF Downloads: 314
DOI:
https://doi.org/10.28925/2663-4023.2020.10.628
PDF (Українська)
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS
Andrii Halchenko, Sergiy Choporov
29-44
Abstract views: 434 | PDF Downloads: 324
DOI:
https://doi.org/10.28925/2663-4023.2020.10.2944
PDF (Українська)
PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE
Andrii Andreichenko, Stanislav Нorbachenko, Oleh Dykyi
45-53
Abstract views: 626 | PDF Downloads: 407
DOI:
https://doi.org/10.28925/2663-4023.2020.10.4553
PDF (Українська)
ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS
Andrii Karpenko, Tetiana Bondarenko, Viacheslav Ovsiannikov, Valerii Martyniuk
54-66
Abstract views: 662 | PDF Downloads: 430
DOI:
https://doi.org/10.28925/2663-4023.2020.10.5466
PDF (Українська)
MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR
Yanina Roy, Olena Riabchun, Valeriy Yermoshin
67-74
Abstract views: 571 | PDF Downloads: 331
DOI:
https://doi.org/10.28925/2663-4023.2020.10.6774
PDF (Українська)
METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS
Anna Ilyenko , Sergii Ilyenko , Oleksandr Vertypolokh
75-87
Abstract views: 671 | PDF Downloads: 637
DOI:
https://doi.org/10.28925/2663-4023.2020.10.7587
PDF (Українська)
ANALYSIS OF THE USE OF SOFTWARE BAITS (HONEYPOTS) AS A MEANS OF ENSURING INFORMATION SECURITY
Ivan Opirskyy, Sviatoslav Vasylyshyn , Andrian Piskozub
88-97
Abstract views: 632 | PDF Downloads: 386
DOI:
https://doi.org/10.28925/2663-4023.2020.10.8897
PDF (Українська)
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM
Iryna Litvinchuk, Ruslan Korchomnyi , Nataliia Korshun , Maksym Vorokhob
98-112
Abstract views: 1760 | PDF Downloads: 680
DOI:
https://doi.org/10.28925/2663-4023.2020.10.98112
PDF (Українська)
MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS
Valeriy Lakhno, Andriy Blozva, Maksym Misiura , Dmytro Kasatkin , Borys Gusev
113-122
Abstract views: 649 | PDF Downloads: 280
DOI:
https://doi.org/10.28925/2663-4023.2020.10.113122
PDF (Українська)
THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION
Anna Ilyenko , Sergii Ilyenko , Olena Prokopenko
123-134
Abstract views: 488 | PDF Downloads: 268
DOI:
https://doi.org/10.28925/2663-4023.2020.10.123134
PDF
METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY
Iryna Litvinchuk, Nataliia Korshun , Maksym Vorokhob
135-143
Abstract views: 525 | PDF Downloads: 362
DOI:
https://doi.org/10.28925/2663-4023.2020.10.135143
PDF (Українська)
ORGANIZATION OF PROTECTION OF KNOWLEDGE CONTROL RESULTS IN DISTANCE LEARNING SYSTEMS
Oleh Harasymchuk, Ivan Opirskyy, Yaroslav Sovyn, Ivan Tyshyk, Yevhenij Shtefaniuk
144-157
Abstract views: 498 | PDF Downloads: 332
DOI:
https://doi.org/10.28925/2663-4023.2020.10.144157
PDF (Українська)
CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva , Pavlo Skladannyi
158-168
Abstract views: 1444 | PDF Downloads: 692
DOI:
https://doi.org/10.28925/2663-4023.2020.10.158168
PDF (Українська)
CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
Serhii Tolіupa , Oleksandr Pliushch , Ivan Parkhomenko
169-183
Abstract views: 963 | PDF Downloads: 610
DOI:
https://doi.org/10.28925/2663-4023.2020.10.169183
PDF (Українська)
WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
Sergiy Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
184-196
Abstract views: 682 | PDF Downloads: 397
DOI:
https://doi.org/10.28925/2663-4023.2020.10.184196
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue