
Целью работы ÑвлÑетÑÑ Ð¿Ð¾Ð²Ñ‹ÑˆÐµÐ½Ð¸Ðµ защищенноÑти информационных реÑурÑов в корпоративной Ñреде, путем мониторинга ÑоÑтоÑÐ½Ð¸Ñ Ð¸ ÐºÐ¾Ð½Ñ‚Ñ€Ð¾Ð»Ñ Ð¸Ð½Ñ„Ñ€Ð°Ñтруктуры. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ð¼ÐµÑ‚Ð¾Ð´Ñ‹ мониторинга инфраÑтруктуры и антивируÑных решений в корпоративной Ñреде и методы мониторинга конфиденциальноÑти и доÑтупноÑти информационных реÑурÑов. Задачи, решаемые в ходе иÑÑледованиÑ: 1. ПоÑтановка задач и требований к разрабатываемой ÑиÑтеме мониторинга. 2. Ðнализ ÑущеÑтвующих методов и ÑредÑтв мониторинга информационных реÑурÑов. 3. Разработка методики мониторинга информационных реÑурÑов в корпоративной Ñреде Ð´Ð»Ñ Ð²Ñ‹ÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð¸Ð½Ñ†Ð¸Ð´ÐµÐ½Ñ‚Ð¾Ð² информационной безопаÑноÑти. 4. Создание и теÑтирование программного прототипа разработанной ÑиÑтемы мониторинга. Ð’ ходе работы иÑÑледованы и проанализированы методы и ÑредÑтва мониторинга. Ð’Ñ‹Ñвлены недоÑтатки ÑущеÑтвующих методов и предложена ÑÐ²Ð¾Ñ Ð¼ÐµÑ‚Ð¾Ð´Ð¸ÐºÐ° мониторинга. Ð’ результате работы разработан программный прототип мониторинга информационных реÑурÑов. Проведение теÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾ÐºÐ°Ð·Ð°Ð»Ð¾, что Ð´Ð°Ð½Ð½Ð°Ñ Ð¼ÐµÑ‚Ð¾Ð´Ð¸ÐºÐ° полноÑтью ÑправлÑетÑÑ Ñ Ð¿Ð¾Ñтавленными задачами. Полученные результаты могут быть иÑпользованы любой компанией Ñ Ñ†ÐµÐ»ÑŒÑŽ Ð¿Ð¾Ð²Ñ‹ÑˆÐµÐ½Ð¸Ñ Ð¸Ð½Ñ„Ð¾Ñ€Ð¼Ð°Ñ†Ð¸Ð¾Ð½Ð½Ð¾Ð¹ безопаÑноÑти.
The purpose of the work is to increase the security of information resources in the corporate environment by monitoring the state and control of the infrastructure. The subject of the research is methods of monitoring infrastructure and antivirus solutions in a corporate environment and methods of monitoring confidentiality and availability of information resources. Tasks to be solved during the research: 1. Setting tasks and requirements for the monitoring system being developed 2. Analysis of existing methods and means of monitoring information resources. 3. Development of a methodology for monitoring information resources in a corporate environment to identify information security incidents. 4. Creation and testing of a software prototype of the developed monitoring system. During the work, existing methods and monitoring tools were investigated and analyzed. The shortcomings of existing methods were identified and our own monitoring methodology was proposed. As a result of the work, a software prototype for monitoring information resources was developed. Testing has shown that this technique fully copes with the assigned tasks. The results obtained can be used by any company to improve information security.
monitoring, ÑÑедÑÑва заÑиÑÑ Ð¸Ð½ÑоÑмаÑии, мониÑоÑинг, инÑиденÑÑ, incidents, information security tools
monitoring, ÑÑедÑÑва заÑиÑÑ Ð¸Ð½ÑоÑмаÑии, мониÑоÑинг, инÑиденÑÑ, incidents, information security tools
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
