×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Analysis of characteristics and functionality of IoT devices

    The concept of the Internet of Things (IoT) allows devices to communicate with each other and share resources using the Internet as a wireless medium. In smart homes, IoT allows the owner, who is far from home, to control it via the Internet. The ease of use and rich features of home automation systems have made them popular. Some people need home automation systems to make their home appliances easier and more convenient to operate, and they are also very useful for people with disabilities and the elderly. However, the useful features and functionality of IoT devices do not stop there. Scientific directions are being formed to analyze the efficiency of energy consumption and methods for preventing various disasters, where the main role is played by the technologies of the Internet of things. This article analyzes the standard models of smart home automation devices. The paper discusses the functionality of IoT devices through a virtual environment for building network models Cisco Packet Tracer.

    Keywords: internet of things, IoT, automation, data analysis, data collection, cyber security

  • Narrowband Internet of Things security threats and countermeasures

    IoT technologies have become an integral part of business and social life. This technology can be seen in almost every major city in Russia. Many leading countries are at relatively high levels of mass adoption of IoT technology. Many areas of the country's activities directly depend on the Internet of Things: “smart home”, “smart city”, digital agriculture, industrial automation, etc. It should be borne in mind that the diversified use of technologies entails a special interest of attackers and an increase in security threats. In this regard, specialists have a question of ensuring security. This article discusses the characteristics of IoT devices, the main security threats to narrowband IoT, and recommendations for countermeasures.

    Keywords: IoT, NB-IoT, security, security threats, Cybercrime, Computer security

  • Modern Internet security threats and countermeasures (review)

    Over the past decades, the Internet has changed our lives and ways of doing our daily activities. The Internet has changed the methods of communication, and for many enterprises and organizations the technology has changed. In today's business environment, if an organization does not have any presence on the Internet, it risks remaining behind its competitors, as the Internet and technology continues to develop and develop us. This paper provides a small review of the literature on Internet security threats. Typical threats are classified and their effects are shown. Methodical recommendations for their minimization are given.

    Keywords: computer security, security threats, spoofing, denial of service, DoS, DDoS, cyber security

  • Mobile forensic tools and techniques: Android data security

    Undoubtedly, today mobile phones have become an integral part of people's lives. Having set up access rights to our phone, we are sure about the safety of data, but also we need to know that data from smartphones can be obtained in full by digital forensic investigators. Even deleted data can be restored by the tools of these specialists. Digital forensic experts and investigators have a wide range of multifunctional and narrow-profile tools that allow you to "extract" digital data from almost any device. This article analyzes various types of mobile device memory on the Android platform, from which experts get data, tools and methods for obtaining information from mobile phones.

    Keywords: android, digital forensics, database, computer security, Cellebrite, Oxygen

  • VoIP techniques

    As with any other technological advancement in use in today’s age, security threats are proving to be the major challenges and risks. Knowledge about these security vulnerabilities presents an avenue of protecting organizational assets against virtual attacks. VoIP phone systems are becoming increasingly popular in today’s society for business and personal purposes. VoIP services are increasingly productive and cheap, thereby, providing adopters a competitive edge. The paper explores a brief overview of VoIP techniques including network components, structure, standards and protocols, data processing techniques and quality of service.

    Keywords: VoIP, VoIP components, VoIP structure, Cybercrime, Computer security

  • VoIP security threats

    Voice over Internet Protocol (VoIP) is a widely deployed service since the commencement of voice and data integration. This was done in a bid to reduce cost and management concerns. VoIP uses the same infrastructure as traditional data networks and thus, inherits all the security challenges of a data network. In addition, VoIP exhibit self-inflected problems resulting from network components and the protocol adopted. This paper present the security threats witnessed in VoIP telecommunication. The paper discusses the security threats in tandem with confidentiality, integrity and availability principle. Examples of security issues under consideration include; spamming, identity spoofing, call tempering, DoS, and Man-in-the-middle attacks among others. Finally, the paper will outline the common countermeasures adopted to mitigate the threats.

    Keywords: VoIP, VoIP security, voice over IP security, DoS, spamming, identity spoofing, call tempering, Cybercrime, Computer security