Software and Hardware Simulator of Company Security Audit

Authors

  • Illia Fedorov Kharkiv National University of Radio Electronics, Ukraine
  • Gennady Khalimov Kharkiv National University of Radio Electronics, Ukraine

DOI:

https://doi.org/10.30837/csitic52021232178

Keywords:

information security, incident, event, classic model, MDR model, mixed model, maturity level, security operations model, modeling of vulnerabilities, protection check

Abstract

To ensure the tasks of training professionals in the field of cybersecurity, a software and hardware complex has been created that provides training in various methods of protecting information and countering attacks. The possibilities of the complex are considered, as well as the experiments that were carried out during its development.

References

Brill, Alan, Kristina Misheva, and Metodi Hadji-Janev, eds. Toward Effective Cyber Defense in Accordance with the Rules of Law. Vol. 149. IOS Press, 2020.

Richard Stiennon. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Pub Incorporated, 2012 – 192

Downloads

Published

2021-05-30

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS