Abstract

Ensuring a secure information and communication network with memory requires a comprehensive approach that includes the use of modern encryption algorithms, hash functions, firewalls, VPN, and multi-factor authentication, as well as continuous monitoring and auditing of the network. Only such a comprehensive approach will allow for a high level of network security. Digitization, informatization, and globalization have provided the foundation for the formation of one of the most complex systems - cyberspace, which provides a wide range of information and communication services to the international community in various areas of life. The increasing pace of development of this system, its coverage and penetration into all spheres have led to the emergence of new forms of threats in cyberspace. The maximum damage from the realization of threats in cyberspace, which are carried out through information and technical influences, is determined by the potential harm caused to the target during its critical operational mode. Critical infrastructure has an especially high potential for harm. Its operation is usually ensured by an automated system for managing the technological process, the components of which communicate through communication networks. The issue of building a secure information and communication network in conditions of information and technical influences on communication network elements with memory has been investigated. A methodology for building a secure information and communication network in conditions of information and technical influences on communication network elements with memory has been presented. The possibility of transitioning from object protection of correspondents and communication network elements to group protection, as well as increasing the likelihood of data transmission in the event of blocking the spread of destructive influences and nodes of their sources, has been substantiated. It has been found that ensuring the stability of the information flow can be achieved, firstly, by increasing the security of correspondents and communication network elements through controlled physical placement of transmission and reception paths, as well as the use of modern means of protection, and secondly, by creating a system of continuous monitoring and auditing of the network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call