Abstract

Each institution and enterprise has communication and technological systems, the protection of which is one of the important tasks to keep them in an efficient and functional condition. Failure of one of the systems can lead to collapse, namely: loss of air communications or loss of control over the banking system. So, critical information infrastructure facilities of the Ministry of Defense of Ukraine may be exposed to the same risks, considering the Ukrainian conflict in eastern Ukraine with Russia.In order to prevent illegal actions over the Information Systems of the Armed Forces of Ukraine, the seizure of information contained on servers or computers and to prevent unauthorized access, systems with authentication and user identification procedures should be used.Currently, depending on the number of user authentication methods, there is single-factor and multi-factor authentication is used. Multifactor authentication is increasingly displacing one-factor authentication, which is justified by the difficulty of an attacker obtaining two or three keys from the Information System at once but biometric authenticator will be more difficult to counterfeit. The use of any password or authentication devices along with the uniqueness of each person's appearance makes it possible to create the best protection for information systems.The method of user authentication using the Luscher test is promising for use when logging in and maximizing its protection, using only human’s characteristics. Further work will be focused to the creation an algorithm for entering the system using the Luscher test and the possibility use to use this method in practice.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.