REQUIREMENTS FOR MODERN PROCESSORS FOR SECURE OPERATION OF INFORMATION SYSTEMS AND NETWORKS
DOI:
https://doi.org/10.26906/SUNZ.2025.3.101Keywords:
computer architecture, processor, information security, information systems, networksAbstract
The article considers the main requirements for the technical support of computer architecture for the security of information systems and networks. It is proved that the problem of information protection requires the organization of a whole complex of special protection measures to prevent the loss of information contained in its transmission channels. The possibilities and consequences of abuse of information transmitted through telecommunications channels, which are developing and improving intensively, have been identified, and means of their prevention have been investigated. Thus, today there is a modern technology for protecting information transmitted via telecommunications channels, the sphere of influence of which includes not only communication channels, but also switching centers, peripheral devices, terminals, communication administrators, local computer networks, etc. It is justified that the analysis of requirements for modern technical and software components, among which the leading place should be given to the processor, is in the focus of our research. The consequences of non-compliance with the proposed requirements for the technical support of the computer architecture, which is a potential threat and a possible catalyst for the danger of information systems and networks, are investigated. The feasibility of implementing special tools, methods, and measures to prevent information loss has been established. It was determined that a thorough analysis requires studying the components of the set of recommendations for optimizing processor selection, based on the components and requirements for the security of information systems and networks, which are not sufficiently considered in the publications of domestic and foreign scientists. An analysis of processors included in the rating of the best models in recent years according to various criteria was performed, and the problem of choosing the optimal processor to meet the need for ensuring information security in the network was studied. Advice and recommendations on their selection for the security of information systems and networks are presented in numerous studies. Ways of improving the system are proposed, which are important to consider when modernizing the existing system in order to enable further updating of its components.Downloads
References
1. Fahmi M., Muda I., Kesuma S. A. Digitization Technologies and Contributions to Companies towards Accounting and Auditing Practices. International Journal of Social Service and Research, 2023. Vol. 3, no. 3. URL: https://doi.org/10.46799/ijssr.v3i3.298 DOI: https://doi.org/10.46799/ijssr.v3i3.298
2. Al Ghatrifi M. O. M., Al Amairi J. S. S., Thottoli M. M. Surfing the technology wave. Computers and Education: Artificial Intelligence. 2023. no. 4. URL: https://doi.org/10.1016/j.caeai.2023 DOI: https://doi.org/10.1016/j.caeai.2023.100144
3. Tyshchenko D., Franchuk T., Stepashkina K., Karpunin, I. Проектування та розробка системи корпоративного електронного документообігу. Європейський науковий журнал Економічних та Фінансових інновацій. 2024. № 1(13). С. 200-207. DOI: https://doi.org/10.32750/2024-0119
4. Franchuk T., Tyshchenko D., Desiatko A., Karpunin I. Features of accounting digitalization processes. Galician economic journal, 2025, vol. 95, no 1, pp. 61-66. DOI: https://doi.org/10.33108/galicianvisnyk_tntu2025.01.061
5. Belfo F., Trigo A. Accounting Information Systems: Traditions and Future Directions. Accounting Information Systems – Traditionand Future Directions. 2013. С. 536–546. DOI: https://doi.org/10.1016/j.protcy.2013.12.060
6. Tyshсhenko D., Franchuk Т., Zakharov R., Moskalenko V. Підтримка динамічних потреб безпеки засобами VPN Системи управління, навігації та зв’язку. Полтава: ПНТУ, 2024. Т. 3 (77). 149-152. DOI: https://doi.org/10.26906/SUNZ.2024.3.149
7. Yang J., Song X., Xiong Y., Meng Y. An Open Source Software Defect Detection Technique Based on Homology Detection and Pre-identification Vulnerabilitys, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. 2018. URL: https://link.springer.com/chapter/10.1007/978-3-319-93554-6_94 DOI: https://doi.org/10.1007/978-3-319-93554-6_94
8. Капітон А., Сухоребрий О., Ненич Д. Використання мультимодального штучного інтелекту в економіці, освіті, науці та транспорті. Інформаційні технології та цифрова економікa. Київ, 2024. 83-85.
9. TOP 15 processors – Ranking of the best models of 2024. URL: https://brain.com.ua/ukr/brain_guide/TOP-15-procesoriv-- Reyting-naykraschih-modeley-2024-roku/?srsltid=AfmBOoqtP_wuuuSw23tX1wzcX-E96A78z78k6iBvEii8KWGqd2dc1R-W
10. Top 10 popular processors URL: https://mezha.media/articles/top-10-populiarnykh-protsesoriv/
11. How to choose the optimal processor for your computer - tips and recommendations URL: https://mediacom.com.ua/yakvibrati-optimalnij-protsesor-dlya-vashogo-kompyutera-poradi-ta-rekomendatsii
12. How to choose a processor for your PC in 2025 URL: https://superkomp.com.ua/yak-vibrati-procesor
13. Security of information systems and networks URL: https://klaster.ua/ua/stati-i-obzory/informacionnaja-bezopasnostseti/?srsltid=AfmBOor7KleY9vHOMg669VfiGgfDekagkJeAwODzZPwO3O_7jh8og_EN
14. Computer network security URL: https://a-si.com.ua/kompleksni-systemy-bezpeky/bezpeky-kompyuternyh-merezh/
15. What is cybersecurity? URL https://nordvpn.com/uk/cybersecurity/what-is-cybersecurity/
16. Information security services URL https://hackyourmom.com/pryvatnist/merezheva-bezpeka-poslugy-informaczijnoyibezpeky-ta-pravovi-aspekty-zahystu-merezhi/
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Alla Kapiton , Tamara Franchuk , Dmytro Tyshсhenko , Alona Desiatko , Rostyslav Zakharov

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.