Features of technology of protection against unauthorizedly installed monitoring software products.

Keywords: monitoring software, Log-file, database signature, Spyware.

Abstract

The article considers the problem of software products (modules) designed to ensure the observability of computer systems, recording the activities of users and processes, the use of passive objects, as well as clearly identified identifiers of users and processes involved in certain events - to prevent security and / or ensuring responsibility for certain actions.

References

Addicott J. Cyberterrorism: Legal Policy Issues / Jeffrey F. Addicott // Legal Issues in the Struggle against D. Ankov, K. Seiger, W. Fonstorh. Computer crimes. Guide to Combating Computer Crimes: Per. from English. - M.: Mir, 2009. - 351 p.

ND TZI 1.1-003-99. Terminology in the field of information protection in computer systems from unauthorized access. // Department of Special Telecommunication Systems and Information Protection of the Security Service of Ukraine. - Kiev, 2009.

Zolotov S. Protocols of the Internet - SPb .: BHV - Saint Petersburg, 2008. - 304 p.

RFC 1180. TCP/IP tutorial. T.J. Socolofsky, C.J. Kale. Jan-01-1991.

Prokofeva D.M. Pidpryamnytske spying in the information system. // Information Technologies and Information Technologies: Collection of Science Works. - Zaporizhzhya: Legal Institute of the Ministry of Internal Affairs of Ukraine, 1998. - VIP. 2.

Kutsenko V.N., Golubov V.O. Recommendations for securing the software and technical information retrieval in computer fences. // Information Technologies and Information Technologies: Collection of Science Works. - Zaporizhzhya: Legal Institute of the Ministry of Internal Affairs of Ukraine, 2018. - VIP. 2.

Krasnostup M.D. Information security of Ukraine: the day and the problem. // Information Technologies and Information Technologies: Collection of Science Works. - Zaporizhzhya: Legal Institute of the Ministry of Internal Affairs of Ukraine, 2019. - VIP.

Abstract views: 134
PDF Downloads: 147
Published
2020-12-16
How to Cite
Martsenyuk, V., Sverstiuk А., Andrushchak, I., Kosheliuk, V., & Poteichuk, M. (2020). Features of technology of protection against unauthorizedly installed monitoring software products . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (41), 76-81. https://doi.org/10.36910/6775-2524-0560-2020-41-13