The article describes the basic methods of the analysis of information risks and determination on this basis the necessary level of object security, stands the concept of "risk", studies the quantitative or qualitative assessment of potential risks, analyzes their advantages and disadvantages, and explores the method of justification of requirements to the security system, based on verifying the compliance level security requirements of one of standards in the field of information security.
This article discusses the use of laser microphones, as a technical means of intelligence, the basic scheme of designing laser acoustic intelligence systems, analyzes the advantages and disadvantages of each of them. The article considers the main advantages of using laser microphones.
The article deals with the creation of individual signatures of different versions of executable elf-files installed on various Linux distributions in order to identify them. Identifying here should be understood as the process of file recognition with its identification with a particular program. A new method of signature’s creation of program is based on the frequency characteristics of the files identified with it, and the average frequency characteristics of the different versions of the program. Files identification is made on the basis of their binary codes using F-test. The construction of a frequency distribution is made for a more precise process of files identification. The article deals with 64-bit operating systems and programs.
This article describes the modern data transfer protocol for implementing secure data transfer. The author describes interconnection with private security firms. This work describes the features of some wireless data transfer protocoland ensuring the confidentiality, integrity and availability of data. The result of the research is recommendation on the use of wireless protocols.