Network security systems

Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins,...

Full description

Saved in:
Bibliographic Details
Main Authors: M. A. Ganzhur, A. I. Bryukhovetsky
Format: Article
Language:Russian
Published: Dagestan State Technical University 2022-11-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1122
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850024330648354816
author M. A. Ganzhur
A. I. Bryukhovetsky
author_facet M. A. Ganzhur
A. I. Bryukhovetsky
author_sort M. A. Ganzhur
collection DOAJ
description Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.
format Article
id doaj-art-349b997f509b460bbfd405fc78d7de75
institution DOAJ
issn 2073-6185
2542-095X
language Russian
publishDate 2022-11-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-349b997f509b460bbfd405fc78d7de752025-08-20T03:01:07ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2022-11-01493616710.21822/2073-6185-2022-49-3-61-67718Network security systemsM. A. Ganzhur0A. I. Bryukhovetsky1Don State Technical UniversityDon State Technical UniversityObjective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.https://vestnik.dgtu.ru/jour/article/view/1122network securityinformation securityattacksriskssecurity threatsviruses
spellingShingle M. A. Ganzhur
A. I. Bryukhovetsky
Network security systems
Вестник Дагестанского государственного технического университета: Технические науки
network security
information security
attacks
risks
security threats
viruses
title Network security systems
title_full Network security systems
title_fullStr Network security systems
title_full_unstemmed Network security systems
title_short Network security systems
title_sort network security systems
topic network security
information security
attacks
risks
security threats
viruses
url https://vestnik.dgtu.ru/jour/article/view/1122
work_keys_str_mv AT maganzhur networksecuritysystems
AT aibryukhovetsky networksecuritysystems