Distributed system of collecting, processing and analysis of security information events of the enterprise network infrastructure

The majority of the network infrastructures of government agencies and private enterprises operate on the basis of a TCP/IP protocol stack, which has significant vulnerabilities. For illustrative purposes, it is worth mentioning the lack of verification of the interaction subject authenticity in the...

Full description

Bibliographic Details
Main Author: Evgeny A. Basinya
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2018-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/1160