Preview

Bulletin of Shakarim University. Technical Sciences

Advanced search

REVIEW AND ANALYSIS OF PREVIOUS RESEARCH IN THE FIELD OF CYBER PROTECTION OF THE INFORMATION SPACE OF EDUCATIONAL INSTITUTIONS

https://doi.org/10.53360/2788-7995-2024-1(13)-4

Abstract

The article considers the prerequisites for the formation of a secure information and educational environment of a modern university. Publications of domestic and leading foreign studies were analyzed. An overview and analysis of previous research in the field of cybersecurity of the information space of educational institutions was carried out. The analysis of publications published on this topic was carried out. The analysis confirmed the relevance of the problem of further development of models for VHS in the tasks of continuous mutual investment of the system of higher education institutions. Analysis of publications based on the results of research on the use of Petri nets to describe the model of cyber threats of informatization objects was carried out. Although these works make a significant theoretical contribution to this task, in our opinion, the programmatic implementation of the models proposed by the authors, in particular, The an in the ICIS and ICS on ICS, is somewhat difficult. This, in turn, requires additional research.

About the Authors

B. S. Akhmetov
Abai atyndagi Kazakh ulttyk pedagogicalyk University
Kazakhstan

Bakhytzhan Bogatdinovich Akhmetov – Doctor of Technical Sciences, Professor

050010, Republic of Kazakhstan, Almaty city, 13 Dostyk Avenue 



V. A. Lakhno
National University of Bioresources and Environmental Management
Ukraine

Valery Anatolyevich Lakhno – Doctor of Technical Sciences, Professor

030414, Ukraine, Kiev, Geroyev Oborona str., 15 



L. M. Kydyralina
Shakarim University of Semey
Kazakhstan

Lazat Muktarovna Kydyralina – PhD

071412, Republic of Kazakhstan, Semey, Glinka str., 20 A 



References

1. Korchenko A. Sistema otsenivaniya riskov informatsionnoi bezopasnosti / A. Korchenko, B. Akhmetov, S. Kazmirchuk, Ye. Chasnovskiy // Ukrainian Scientific Journal of Information Security. Kiev. – 2017. – V. 23. Iss. 2. – P. 145-152. (In Russian).

2. Kotenko I.V. Perspektivnye napravleniya issledovanii v oblasti komp'yuternoi bezopasnosti / I.V. Kotenko, R.M. Yusupov // Zashchita informatsii. – Kiev. – 2006. – № 2. – S. 46-57. (In Russian).

3. Primenenie matematicheskogo apparata setei Petri-Markova dlya opredeleniya vremennykh i veroyatnostnykh kharakteristik sistemy upravleniya vysokonagruzhennymi veb-portalami s povyshennoi otkazoustoichivost'yu / R.N. Akinshin, A.N. Ivutin, D.O. Esikov, I.A. Strakhov // Nauchnyi Vestnik. – Moskva. – 2014. – № 210. – S. 85-90. (In Russian).

4. Atighetchi M. Adaptive Cyberdefenese for Survival and Intrusion Tolerance / M. Atighetchi // Proccedins of 3 rd International Workshop Distributed Auto- adaptive and Reconfigurable Systems. – USA. – 2003. – P. 74-84. (In English).

5. Attack directories, not caches: Side channel attacks in a non-inclusive world / R.H. Campbell, M. Yan, R. Sprabery et al // IEEE Symposium on Security and Privacy. – 2019. – P. 888-904. (In English).

6. Dawkins J. A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks / J. Dawkins, K. Clark, G. Manes // Journal of Network and Systems Management. – 2005. – V. 13, No. 3. – P. 253-267. (In English).

7. Chris D. Data Protection Law: An Overview / D. Chris // Congressional Research Service. – 2019. – P. 1-27. (In English).

8. The mobile hub concept: Enabling applications for the internet of mobile things / M. Endler, L. Talavera, I. Vasconcelos s // IEEE International Conference on Pervasive Computing and Communication Workshops. – 2015. – P. 123-128. (In English).

9. Development of decision support system based on feature matrix for cyber threat assessment / T. Kartbayev, B. Akhmetov, A. Doszhanova et al // Intl Journal of Electronics and Telecommunications. – 2019. – V.65, № 4. – P. 545-550. (In English).

10. Akhmetov B.S. Tekhnologiya situatsionnogo upravleniya informatsionnoi bezopasnost'yu uchebnogo protsessa kaznu imeni al'-Farabi / B.S. Akhmetov, U.A. Tukeev // Journal of Mathematics, Mechanics and Computer Science. – Almaty. – 2009. – V. 63, №. 4. – P. 66-70. (In Russian).

11. Biyashev R.G. Primenenie nepozitsionnykh sistem schisleniya pri kriptograficheskoi zashchite informatsii. / R.G. Biyashev, V.M. Amerbaev, S.E. Nysanbaeva // Izvestiya Natsional'noi akademii nauk Respubliki Kazakhstan. – Almaty. – 2005. – № 3. – S. 84-89. (In Russian).

12. Khutorskoi A.V. Chelovek i ego izmenenie v telekommunikatsionnykh sistemakh / A.V. Khutorskii // Materialy Vseros. nauch.-prakt. konf. – Moskva. – 2004. – S. 145-152. (In Russian).

13. Puhakainen P. Improving employees' compliance through information systems security training: an action research study / P. Puhakainen, M. Siponen // MIS Quarterly. – 2010. – Vol. 34, Issue 4. – P. 767. (In English).

14. Ortalo R. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security / R. Ortalo, Y. Deswarte, M. Kaaniche // IEEE Transactions on Software Engineering. –1999. – V. 25. – P. 633-650. (In English).

15. Akhmetov B.S. Vliyanie metodicheskoi sistemy obucheniya na razrabotku i primenenie sredstv informatizatsii v vuze / B.S. Akhmetov, E.Y. Bidaibekov, A.G. Kazmagambetov // Mezhdunarodnyi kongress konferentsii «Informatsionnye tekhnologii v obrazovaniI». – Moskva. – 2003. – S. 112-113. (In Russian).

16. Akhmetov B.S. Modelirovanie informatsionnoi obrazovatel'noi sredy vuza: nauchnoe izdanie / B.S. Akhmetov, V.V. Yavorskii; M-vo obrazovaniya i nauki RK, Karagandinskii gosudarstvennyi tekhnicheskii universitet. – Karaganda: KaRGTU, 2006. – 251 s. (In Russian).


Review

For citations:


Akhmetov B.S., Lakhno V.A., Kydyralina L.M. REVIEW AND ANALYSIS OF PREVIOUS RESEARCH IN THE FIELD OF CYBER PROTECTION OF THE INFORMATION SPACE OF EDUCATIONAL INSTITUTIONS. Bulletin of Shakarim University. Technical Sciences. 2024;(1(13)):20-28. (In Kazakh) https://doi.org/10.53360/2788-7995-2024-1(13)-4

Views: 247


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2788-7995 (Print)
ISSN 3006-0524 (Online)
X