Analysis of hardware and software methods for protecting information from unauthorized access to the information channel of data transmission.

Keywords: information security, unauthorized access, parallel attacks, network intelligence, echo-testing, data transmission

Abstract

This article analyzes and justifies the main provisions for the protection of the information channel on the use of both technical, means and software protection against unauthorized access.

References

Petrov V.A. Information security. Information about unauthorized access in automated systems / Petrov V.A., Piskarov S.A., Shein A.V. - M.: Publishing house Orean, 1998 .-- 534 s

Antonyuk A.O. Basics of obtaining information in automated systems / A.O. Antonyuk. - K .: KM Academy, 2006 .-- 244 p.

Investigation and analysis of maladies, as well as in the sphere of information technologies: Science and practice, / For the editorial board of prof. Ya.Yu. Kondrat'va. - K., 2004.

Kaganyuk O.K. Technical and software for encryption, decryption. Synopsis of recitals for the education of the first (bachelor's) level of education in the educational and professional programs of «Cybersecurity». O.K. Kaganyuk - Lutsk: Lutsk NTU, 2021 .-- 84 p .

DSTU 3396.0-96 Information protection. Technical information manager.

Abstract views: 97
PDF Downloads: 124
Published
2022-07-01
How to Cite
Kaganyuk , O., Chernyashchuk , N., & Burchak І. (2022). Analysis of hardware and software methods for protecting information from unauthorized access to the information channel of data transmission . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (47), 76-82. https://doi.org/10.36910/6775-2524-0560-2022-47-12
Section
Computer science and computer engineering