Volgograd state University (Volgograd, Russia)


Summary: The article considers the directions of information protection in the information system of the organization. The need for regular monitoring of the elements state and events of the information system is shown. The scheme for monitoring events and detecting incidents of information security is presented. The goals, objectives and levels of monitoring the security of the information system are described. A comparative analysis of system and network level monitoring is carried out.

Keywords: anomaly, events, audit, security incident, information protection, system level, network layer, attack detection.


Branch of science: Technical sciences
Read onlineDownload article (pdf)

Summary: The problems of ensuring business continuity in the enterprise are investigated. Two main strategies and solutions to ensure business continuity identified. Indicators of business continuity assessment identified. Influence of selected strategies and solutions to value business continuity indicators analyzed.

Keywords: information security, business continuity, backup, information system, recovery, business process.


Branch of science: Technical sciences
Read onlineDownload article (pdf)

Summary: The problem of choosinga web browserinvestigated. Four groupsof selection criteriaoffered. A combined approachto the choice ofa Web browser, usingmethods of multicriteriaevaluation andanalysis ofthe elementsof the vectoris designed. Flowchart verifies thatthe web browseruser requirementsdescribedin steps.

Keywords: information security, web application, web, multi-criteria evaluation, vector analysis.


Branch of science: Technical sciences
Read onlineDownload article (pdf)

Summary: The problem of security breaches of Internet technologies studied. Typical architecture of web-applications is described. Classification of threats of web-applications developed. The consequences of threats and attacks described. The authors were identified direction and protection technology. The life cycle of the process of creating and support a protected web-applications is described.

Keywords: information security, internet, statistics security threats, system protection, e-commerce, WAF, secure connection.

 


Branch of science: Technical sciences
Read onlineDownload article (pdf)

Summary: osteological characteristics of children's postcranial skeletons of the bronze age in the Lower Volga region and their comparative analysis.

Key words: children, anthropology, osteology, the bronze age, the Lower Volga region.


Branch of science: Historical science
Read onlineDownload article (pdf)