It is established that the efficiency and reliability of information and telecommunication systems, in particular the networks that are part of them, significantly depends on the high level of protection of critical components. However, the constant improvement of the technical equipment of these systems requires the creation of new and improvement of existing methodological support for cyber security. One of the promising approaches is the development of a universal method of cybersecurity in the context of cyberattacks (influences, threats, etc.) and unauthorized access by unauthorized users to critical nodes (components) of information and telecommunications systems. Timely detection, prompt counteraction to cyber threats and unauthorized access to critical network components is a necessary component of ensuring a high level of cybersecurity of the information and telecommunications system as a whole, especially in the context of hybrid warfare and armed aggression by the Russian Federation. To this end, the article proposes a method of cybersecurity of critical components of information and telecommunications systems, which is based on the integrated application of monitoring the state of network nodes and user access to them, recording the facts of cyberattacks based on analysis of incoming (outgoing) traffic, timely detection of unauthorized access to and commission of cyber threats, as well as operational response to these attempts. The paper presents the results of verification of the proposed methods. To this end, the article proposes a method of cybersecurity of critical components of information and telecommunications systems, which is based on the integrated application of monitoring the state of network nodes and user access to them, recording the facts of cyberattacks based on analysis of incoming (outgoing) traffic, timely detection of unauthorized access to and commission of cyber threats, as well as operational response to these attempts. The paper presents the results of verification of the proposed method. It is shown that its application allows to quickly detect the facts of cyber threats and unauthorized access to critical components of information and telecommunication systems networks and effectively counteract these attempts.
Read full abstract