Introduction to capabilities, configuration and using of cybersecurity technologies for information network protection
Abstract
Cybersecurity is a key part of Ukraine's critical infrastructure. This has become especially relevant now during the impact of Russian aggression. All companies can be affected by cyberattacks. The cost of data leakage for large organizations can reach hundreds of millions of dollars. It is necessary to understand that ordinary people work in companies, social engineering remains the most common type of attack. The Internet and computers play an extremely important role not only when these people work, but also in everyday life, when communicating by mail, in chats or interacting with the banking system, etc. We live in a world where security threats are everywhere. Therefore, the purpose of this work is the need to familiarize yourself with modern technologies that allow you to consider all the possibilities of protection against cyberthreats. Comprehensive protection in the Internet, for example, is provided by software and hardware products of the Check Point company, which provide a powerful basis for practicing the protection of a computer network from unwanted or malicious protection, for which there is a possibility of deploying their experimental stands. The result of this article is recommendations for deploying Check Point stands for Windows users, which is a relevant task for cybersecurity administrators. The article also provides an overview of the basic architecture of Check Point, which consists of a security server, a firewall, and a management application, which is used to configure fundamental security policies with rules that govern traffic between the corresponding objects. The security server and the firewall have properties (characteristics) whose work can be described by the model of open systems interaction, so the article considers the layers that make up this model, as well as the built-in properties of these objects themselves, such as, for example, antivirus, anti-phishing, anti-bot, and others. This article may be useful for students and philosophy students studying in the specialty of cybersecurity.
Downloads
References
/References
Range Force. [Online]. Available: https://www.rangeforce.com/. Accessed on: October 27, 2024.
О. М. Мелкозьорова, С. В. Малахов, О. П. Нарєжній, Є. П. Колованова та І. М. Гальцева, Вступ до кібербезпеки : методичні вказівки щодо виконання практичних робіт. Харків, Україна: ХНУ імені В. Н. Каразіна, 2024. [in Ukrainian]
Wmvare. [Online]. Available: https://www.vmware.com/. Accessed on: November 25, 2024.
VirtualBox. [Online]. Available: https://www.vmware.com/. Accessed on: November 25, 2024.
Introduction to hyper-v on Windows. [Online]. https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/. Accessed on: November 25, 2024.
P. Dreyer, M. Frey M. ta M. Joaquim, Check point certified security administrator : Student and lab manual. Tel Aviv, Israel, 2023. 906 p. [in English]
Microsoft evaluation center. [Online]. https://www.microsoft.com/en-us/evalcenter/download-windows-server-2019/. Accessed on: November 29, 2024.
Partner home Check Point. [Online]. https://sc1.checkpoint.com/uc/htmls/PartnerHome.html. Accessed on: November 29, 2024.
Range Force: веб-сайт. URL: https://www.rangeforce.com/ (дата звернення: 27.10.2024).
Вступ до кібербезпеки : методичні вказівки щодо виконання практичних робіт. / О. М. Мелкозьорова та ін. Харків : ХНУ імені В. Н. Каразіна, 2024. 36 с.
Wmvare: веб-сайт. URL: https://www.vmware.com/ (дата звернення: 25.11.2024).
VirtualBox: веб-сайт. URL: https://www.virtualbox.org/ (дата звернення: 25.11.2024).
Introduction to hyper-v on Windows: веб-сайт. URL: https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/ (дата звернення: 25.11.2024).
Dreyer P, Frey M., Joaquim M. Check point certified security administrator : Student and lab manual. Tel Aviv Israel, 2023. 906 p. URL: https://read.kortext.com/reader/pdf/2342938/2
Microsoft evaluation center: веб-сайт. URL: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2019/ (дата звернення: 29.11.2024).
Partner map Check Point: веб-сайт. URL: https://sc1.checkpoint.com/uc/htmls/PartnerHome.html (дата звернення: 29.11.2024).