Introduction to capabilities, configuration and using of cybersecurity technologies for information network protection

Keywords: Open Systems interconnection Model, firewall, Check Point, stand, Open Server, antivirus, attack, malware

Abstract

Cybersecurity is a key part of Ukraine's critical infrastructure. This has become especially relevant now during the impact of Russian aggression. All companies can be affected by cyberattacks. The cost of data leakage for large organizations can reach hundreds of millions of dollars. It is necessary to understand that ordinary people work in companies, social engineering remains the most common type of attack. The Internet and computers play an extremely important role not only when these people work, but also in everyday life, when communicating by mail, in chats or interacting with the banking system, etc. We live in a world where security threats are everywhere. Therefore, the purpose of this work is the need to familiarize yourself with modern technologies that allow you to consider all the possibilities of protection against cyberthreats. Comprehensive protection in the Internet, for example, is provided by software and hardware products of the Check Point company, which provide a powerful basis for practicing the protection of a computer network from unwanted or malicious protection, for which there is a possibility of deploying their experimental stands. The result of this article is recommendations for deploying Check Point stands for Windows users, which is a relevant task for cybersecurity administrators. The article also provides an overview of the basic architecture of Check Point, which consists of a security server, a firewall, and a management application, which is used to configure fundamental security policies with rules that govern traffic between the corresponding objects. The security server and the firewall have properties (characteristics) whose work can be described by the model of open systems interaction, so the article considers the layers that make up this model, as well as the built-in properties of these objects themselves, such as, for example, antivirus, anti-phishing, anti-bot, and others. This article may be useful for students and philosophy students studying in the specialty of cybersecurity.

Downloads

Download data is not yet available.

Author Biographies

Olha Melkozerova, V. N. Karasin Kharkiv National University, Svobody Sq 4, 61022, Kharkiv, Ukraine

PhD, Associate Professor of Cybersecurity of information systems, networks and technologies Department

Ievgenia Kolovanova, V. N. Karasin Kharkiv National University, Svobody Sq 4, 61022, Kharkiv, Ukraine

PhD, Associate Professor of Cybersecurity of information systems, networks and technologies Department

Serhii Malakhov, V. N. Karasin Kharkiv National University, Svobody Sq 4, 61022, Kharkiv, Ukraine

PhD, Associate Professor of Cybersecurity of information systems, networks and technologies Department

References

/

References

Published
2024-11-25
How to Cite
Melkozerova, O., Kolovanova, I., & Malakhov, S. (2024). Introduction to capabilities, configuration and using of cybersecurity technologies for information network protection. Bulletin of V.N. Karazin Kharkiv National University, Series «Mathematical Modeling. Information Technology. Automated Control Systems», 63, 51-59. https://doi.org/10.26565/2304-6201-2024-63-05
Section
Статті