Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2020.10
Published:
2020-12-24
Title
Title
1-3
Abstract views: 407 | PDF Downloads: 123
PDF (Українська)
Content
Contents
4-5
Abstract views: 362 | PDF Downloads: 139
PDF (Українська)
Articles
CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
6-28
Abstract views: 602 | PDF Downloads: 300
DOI:
https://doi.org/10.28925/2663-4023.2020.10.628
PDF (Українська)
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS
Andrii Halchenko, Sergiy Choporov
29-44
Abstract views: 397 | PDF Downloads: 303
DOI:
https://doi.org/10.28925/2663-4023.2020.10.2944
PDF (Українська)
PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE
Andrii Andreichenko, Stanislav Нorbachenko, Oleh Dykyi
45-53
Abstract views: 594 | PDF Downloads: 392
DOI:
https://doi.org/10.28925/2663-4023.2020.10.4553
PDF (Українська)
ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS
Andrii Karpenko, Tetiana Bondarenko, Viacheslav Ovsiannikov, Valerii Martyniuk
54-66
Abstract views: 628 | PDF Downloads: 410
DOI:
https://doi.org/10.28925/2663-4023.2020.10.5466
PDF (Українська)
MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR
Yanina Roy, Olena Riabchun, Valeriy Yermoshin
67-74
Abstract views: 543 | PDF Downloads: 309
DOI:
https://doi.org/10.28925/2663-4023.2020.10.6774
PDF (Українська)
METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS
Anna Ilyenko , Sergii Ilyenko , Oleksandr Vertypolokh
75-87
Abstract views: 621 | PDF Downloads: 626
DOI:
https://doi.org/10.28925/2663-4023.2020.10.7587
PDF (Українська)
ANALYSIS OF THE USE OF SOFTWARE BAITS (HONEYPOTS) AS A MEANS OF ENSURING INFORMATION SECURITY
Ivan Opirskyy, Sviatoslav Vasylyshyn , Andrian Piskozub
88-97
Abstract views: 550 | PDF Downloads: 366
DOI:
https://doi.org/10.28925/2663-4023.2020.10.8897
PDF (Українська)
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM
Iryna Litvinchuk, Ruslan Korchomnyi , Nataliia Korshun , Maksym Vorokhob
98-112
Abstract views: 1686 | PDF Downloads: 655
DOI:
https://doi.org/10.28925/2663-4023.2020.10.98112
PDF (Українська)
MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS
Valeriy Lakhno, Andriy Blozva, Maksym Misiura , Dmytro Kasatkin , Borys Gusev
113-122
Abstract views: 582 | PDF Downloads: 261
DOI:
https://doi.org/10.28925/2663-4023.2020.10.113122
PDF (Українська)
THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION
Anna Ilyenko , Sergii Ilyenko , Olena Prokopenko
123-134
Abstract views: 442 | PDF Downloads: 248
DOI:
https://doi.org/10.28925/2663-4023.2020.10.123134
PDF
METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY
Iryna Litvinchuk, Nataliia Korshun , Maksym Vorokhob
135-143
Abstract views: 483 | PDF Downloads: 341
DOI:
https://doi.org/10.28925/2663-4023.2020.10.135143
PDF (Українська)
ORGANIZATION OF PROTECTION OF KNOWLEDGE CONTROL RESULTS IN DISTANCE LEARNING SYSTEMS
Oleh Harasymchuk, Ivan Opirskyy, Yaroslav Sovyn, Ivan Tyshyk, Yevhenij Shtefaniuk
144-157
Abstract views: 409 | PDF Downloads: 320
DOI:
https://doi.org/10.28925/2663-4023.2020.10.144157
PDF (Українська)
CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva , Pavlo Skladannyi
158-168
Abstract views: 1339 | PDF Downloads: 658
DOI:
https://doi.org/10.28925/2663-4023.2020.10.158168
PDF (Українська)
CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
Serhii Tolіupa , Oleksandr Pliushch , Ivan Parkhomenko
169-183
Abstract views: 902 | PDF Downloads: 577
DOI:
https://doi.org/10.28925/2663-4023.2020.10.169183
PDF (Українська)
WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
Sergiy Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
184-196
Abstract views: 635 | PDF Downloads: 378
DOI:
https://doi.org/10.28925/2663-4023.2020.10.184196
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue