SUPPORTING DYNAMIC SECURITY NEEDS WITH VPN TOOLS
DOI:
https://doi.org/10.26906/SUNZ.2024.3.149Keywords:
hybrid working environment, cyber security, digital transformation, information securityAbstract
The article examines the problems of supporting the dynamic security needs of a hybrid environment. It was determined that an important aspect of remote work is the training of employees on common cyber security threats. Threat types such as phishing attacks, social engineering, and malware are explored. The components of information technology security in a hybrid working environment are defined. The levels of protection of corporate information were studied. VPN features are analyzed. Security procedures for using VPN, which creates opportunities to reduce the risks of hacking a remote work environment, have been analyzed. Requirements to reduce the risks of unauthorized access to confidential information have been established. Disadvantages and limitations of VPN usage are explored. The criteria for reducing the connection speed due to additional cryptographic processing and the distance to the VPN server were analyzed. Methods and methods of blocking and limiting access to VPNs are considered, with the aim of reducing their effectiveness in some contexts. The features of a set of protocols that protect Internet Protocol (IP) communication by authenticating and encrypting all IP packets in the data stream are investigated. The principles of the VPN service are defined. Ways to prevent data misuse when working in a hybrid environment are proposed. Requirements for invulnerability of network traffic to attacks are defined. a set of protocols is explored, thanks to which it is possible to authenticate and check the integrity and encrypt IP packets. Analyzed protocols for secure key exchange on the Internet. The design of key information management protocols is proposed, requiring the development of the Internet Key Management Protocol. In the process of research, key management concepts were analyzed and improved using the ISAKMP specifications and the Oakley Key Determination Protocol. The criteria for the successful functioning of the ISAKMP specification, which describes the mechanisms for matching the attributes of the protocols used, have been established.Downloads
References
Striuk O. User-Designed Application Logic Verification Approach and Tools URL: https://radics.tech/user-designedapplication-logic-verification-approach-and-tools/
Arshad І. A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. IEEE Access. 2023. № 11. 88527-88548.
Pevnev V. Ensuring the Data Integrity in Infocommunication Systems International Journal of Computing. 2022. 228-233. URL: https://doi.org/10.47839/ijc.21.2.2591.
Ahola M. The role of human error in successful cyber security breaches. Usecure Blog. URL: https://blog.usecure.io/the-roleof-human-error-in-successful-cyber-security-breaches.
Rouse M. What is email phishing? Definition, examples and best practices URL: https://searchsecurity.techtarget.com/definition/phishing
VPN on mobile devices: purposes, setup, usage URL: https://training.qatestlab.com/blog/technical-articles/vpn-mobiledevice-setting/
Kapiton А., Kryvoruchko O., Tyshenko D., Franchuk T., Tsiutsiura M. Modern website creation technologies Комерціалізація інновацій в умовах Індустрії 4.0. Суми, СДУ, 2023. 145-153.
The best VPN URL: https://ua.cybernews.com/lp/best-vpn-ua/
Найкращі служби VPN в Україні URL: https://protonvpn.com/
Шифр-VPN URL: https://cіpher.cоm.uа/uk/prоducts/cіpher-vpn
Mostova А., Kapiton А., Baranova V. Digital transformation of business in Ukraine: current trends, challenges and prospects. Publishing, 2024. 70-86.
Kapiton A. Communication opportunities of digital channels. Сектор безпеки і оборони України на захисті національних інтересів: актуальні проблеми та завдання в умовах воєнного стану. Хмельницький, НАДПСУ, 2024. 953-954.
Skakalina O., Kapiton A. Design and software implementation of a knowledge exchange web service. порівняльний аналіз застосування евристичних алгоритмів для розв’язання задачі TSP. Системи управління, навігації та зв’язку, 2024. 2 (76). 144-151.
Kapiton A, Baranenko R., Sokol H., Okhrymenko M., Franchuk T. Адаптивне комбіноване кодування мережі каналів для когнітивних радіомереж з кооперативною ретрансляцією. Електронне моделювання, 2024. 1. 78-89.
Bitdefender Premium VPN URL: https://www.bitdefender.ro/solutions/vpn.html