Abstract

For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man in the middle” network attacks has been developed in the NRNU MEPhI. In the framework of the ELC four basic attacks of this type are modeled: UDP Hijacking, Session Hijacking, TCP Hijacking and Bucket brigade attack. The paper presents two ELC applications: the instructor’s application and the student’s application. To assess the students’ knowledge after performing laboratory work, the “Testing” module for assessing progress testing has been created, which includes questions for testing using the ELC software shell. Methodical instructions on performance of laboratory work have been written. Within the framework of the “Protected Information Systems” discipline of the Information Security of Banking Systems Department of the NNIU MEPhI, implementing the above-mentioned Mastre’s program, a successful approbation of the developed ELC has been carried out. In conclusion the ways to further improvement of the ELC are suggested.

Highlights

  • Введение Современный мир предъявляет к грамотному специалисту повышенные требования, которые не существовали в старых образовательных программах

  • study the “Man in the middle” network attacks has been developed in the NRNU MEPhI. In the framework

  • Апробация разработанного УЛК прошла успешно, что показало его работоспособность и соответствие поставленным целям, а также позволило собрать статистику прохождения студентами отдельных лабораторных модулей

Read more

Summary

Introduction

Введение Современный мир предъявляет к грамотному специалисту повышенные требования, которые не существовали в старых образовательных программах. ‒ навыками распознавания атак типа «Человек посередине» на ИС для выбора адекватной защиты от них. Целью данной статьи является описание разработанного УЛК по изучению атак типа «Человек посередине» и опыта его использования в рамках учебного процесса НИЯУ

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.