Abstract and keywords
Abstract (English):
The following are considered:  principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission;  principles and measures to ensure the security of the corporate network, as well as the types of information protection provided by these security measures;  virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer;  systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools;  Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection. The Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.

Keywords:
malware, information protection, virtual private network, Kali Linux software package, Windows network monitoring tools, proxy-servers, firewalls
Text
Text (PDF): Read Download
References

1. Zajcev O.V. Metodiki obnaruzheniya vredonosnogo PO // Komp'yuterPress. 2005. № 6.

2. Zajcev O.V. Shpionskie programmy kak ugroza bezopasnosti PK // Komp'yuterPress. 2008. № 7.

3. Labinskij A.Yu., Il'in A.V. Fraktaly i zashchita informacii // Prirodnye i tekhnogennye riski (fiziko-matematicheskie i prikladnye aspekty). 2016. № 1. S. 82–86.

4. Labinskij A.Yu. Nejronnye seti i zashchita informacii // Problemy upravleniya riskami v tekhnosfere. 2019. № 1. S. 68–73.

5. Joseph Migga Kizza. Computer Network Security. Springer Science & Business Media, 2005. 535 p.

6. J. Michael Stewart. Network Security, Firewalls and VPNs. Jones & Bartlett Publishers, 2013. 490 p.

7. Sean Convery. Network Security Architectures. Cisco Press, 2004. 739 p.

8. Jie Wang, Zachary A. Kissel. Introduction to Network Security: Theory and Practice. 2015. 440 p.

9. Owen Poole. Network Security. 2007. 224 p.

10. Rafael' Hercog, Dzhim O`Gorman, Mati Aharoni. Kali Linux ot razrabotchikov. 2018. 320 s.

11. Shiva Parasram, Tedi Heriyanto, Aleks Zamm. Kali Linux. Testirovanie na proniknovenie i bezopasnost'. 2019. 448 s.

Login or Create
* Forgot password?