• Media type: E-Article
  • Title: Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
  • Contributor: Morozova, Olga; Nicheporuk, Andrii; Tetskyi, Artem; Tkachov, Vitalii
  • Published: National Aerospace University - Kharkiv Aviation Institute, 2021
  • Published in: RADIOELECTRONIC AND COMPUTER SYSTEMS (2021) 4, Seite 145-156
  • Language: Not determined
  • DOI: 10.32620/reks.2021.4.12
  • ISSN: 2663-2012; 1814-4225
  • Origination:
  • Footnote:
  • Description: The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional knowledge. The purpose of the article is to ensure the cybersecurity of industrial and web-oriented systems and networks by developing and implementing appropriate methodologies (concepts, principles, set of models, methods) and technologies in the industry, as well as in training the cybersecurity specialists during the acquisition of professional knowledge. The problem of developing models, methods, and technologies for ensuring the cybersecurity of mobile systems, web-oriented systems based on content management systems, virtual networks that provide their interaction, and a methodology for training cybersecurity specialists are formulated. Based on the analysis the particular tasks of developing convolutional neural network model, information technology methods and models for ensuring the cybersecurity of web-oriented systems and networks, a methodological framework of creating information technology, and a model of digital knowledge platform for use in the field of cybersecurity specialists training and security of industrial systems were formulated. The basic theoretical decisions, which underlie the construction of real industrial and web-oriented systems and networks, were described in the article. The results of work are increased reliability value of detecting the malware in the Android operating system, reduced rates of false positives, provided an allowable value of the success rate of attacks at a minimum cost, reduced time spent on building and rebuilding the structure of the virtual network, increased efficiency of cybersecurity specialists training and security of industrial systems. From the above, it is possible to conclude that the obtained results can be used in a line of existing and prospective approaches at designing difficult, complex, hybrid, technical, cyber-physical systems with a web-oriented interface for users and administrators.
  • Access State: Open Access