Abstract

The relevance The urgency of ensuring information security (IS) is due to the increase in the volume of information circulating in local area networks (LAN) and the expansion of the range of tasks solved with the help of information systems (IS), there is a problem associated with an increase in the number of threats and increased vulnerability of information resources. This is due to the action of factors such as: expanding the range of tasks solved by the IP; increasing the complexity of information processing algorithms; increasing the volume of processed information; complication of LAN software and hardware components, and, accordingly, an increase in the likelihood of errors and vulnerabilities; increased aggressiveness of external data sources (global networks); the emergence of new types of threats. Traditional means of ensuring the information security of corporate networks include antiviruses, vulnerability detectors, firewalls and intrusion detectors. The functions of such information security systems are specific and solve individual tasks of ensuring the information security of a corporate network and, as a rule, can be overcome with the teamwork of a qualified group of violators. Such groups are aware of the capabilities of the security tools used in the corporate network, respond to updates of the vulnerability database of widely used software (software) published in special publications and the Internet, promptly exchange the results of probing the protection of the attacked corporate network and flexibly change the tactics of the invasion. Aim of research Implementation of Zabbix SCS monitoring system and pfsense firewall/ router with implementation of information traffic management. Research methods: — Zabbix programming environment; — pfsense programming environment. Results This article discusses the creation of the Zabbix monitoring system and the pfsence system at the AST LLC enterprise, Bashkortostan Republic, Sterlitamak. As a result of the configuration and creation of rules, as well as the implementation of SCS monitoring, the enterprise receives a system of protection against unauthorized access and a system of protection against corporate network attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call