Abstract
The relevance of this work is due to the fact that in recent years the communication forces have been constantly developing and equipped with the latest digital means of communication, which allows them to successfully perform their assigned tasks. Today, information and communication systems that are deployed at the control points of various branches of management ensure the implementation of priority tasks for the management of troops. Functionally, the communication system and information systems are deployed at control points as a single information and communication environment based on the implementation of the latest information and communication technologies, information exchange protocols, complexes, systems and means of communication, which ensures the exchange of all types of information between bodies military management (management bodies) and control points at all levels of management. An active communication system ensures the exchange of information with guaranteed security in a single information space as a set of material functions (including personnel and other resources) that combine to perform a certain task. In turn, information systems, as a set of equipment, methods and procedures, and, if necessary, personnel organized to perform information processing functions operate in accordance with a defined structure, namely: - services, in the context of communication and information systems; - architecture, in the context of communication and information systems; - functions in the context of service-oriented architecture; - interoperability; - information protection and cyber protection. It is clear that the more important the object of management, the more capacious flow of information can be directed to it. This allows the adversary/attacker to identify the most important targets and direct other types of information to them or suppress them in various ways. Thus, in the interests of ensuring cyber protection of electronic information resources, communication and technological systems of the control points of the Armed Forces of Ukraine, the technological infrastructure of cyber protection of the Armed Forces of Ukraine has been deployed and is functioning, which is a component of the unified system of information protection and cyber protection in the information and communication systems of the Ministry of Defense and the Armed Forces of Ukraine. In these conditions, to solve the tasks of preventing unwanted interventions, disruption of the stable functioning of the information and communication environment at control points, counterweights in obtaining confidential information, data theft, and other minimally necessary components of the cyber protection infrastructure are deployed. The main components of the relevant technological infrastructure of cyber protection are the security information event management system (SIEM), the threat information exchange platform (Malware Information Sharing Platform & Threat Sharing, MISP), the centralized management system of inter-network screens and the system for detecting and countering cyber threats. including computer viruses on end equipment. Therefore, solving the tasks of ensuring cyber protection in the course of deployment and operation of electronic communication networks and communication services at the control points of various branches of management turns out to be quite a serious and urgent task.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.