
The problem of unauthorized access to information on Web sites through the use of malicious code by an attacker leads to undesirable consequences that arise both on the server side and on the users side. This article is devoted to the review and analysis of existing methods for ensuring the information security of automated systems for authentication and distributed networks. The existence of vulnerabilities on most modern Web content management platforms allows an attacker to inject malicious files onto the server or modify existing files. Recently, there has been a large increase in cybercrime, which is a fairly lucrative business for intruders. To avoid the introduction of malicious code on the site, in addition to the above steps, you should use the SCP / SSH / SFTP protocols instead of FTP to download files to the server, which will prevent the passwords from being sent “in the clear”.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
