Welcome to Journal of Computer Networks

Journal of Computer Networks is a peer-reviewed, open access journal that provides rapid publication of articles in all areas of computer networks. The goal of this journal is to provide a platform for scientists and academicians all over the world to promote, share, and discuss various new issues and developments in different areas of computer networks.

ISSN (Print): 2372-4749

ISSN (Online): 2372-4757

Editor-in-Chief: Sergii Kavun, Naima kaabouch

Website: http://www.sciepub.com/journal/JCN

   

Article

Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes

1IT-Security Academic Department, National Aviation University, Kyiv, Ukraine


Journal of Computer Networks. 2014, 2(2), 18-22
doi: 10.12691/jcn-2-2-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Oleksiy Gavrylenko, Sergiy Gnatyuk, Dmytro Matviiv. Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes. Journal of Computer Networks. 2014; 2(2):18-22. doi: 10.12691/jcn-2-2-3.

Correspondence to: Sergiy  Gnatyuk, IT-Security Academic Department, National Aviation University, Kyiv, Ukraine. Email: s.gnatyuk@nau.edu.ua

Abstract

The authors of the article proposed the definition of selection criteria of technical products protection of information from unauthorized access in automated systems of different classes based on the analysis and synthesis of classifications, characteristics and requirements to the known products for the purpose of forming the appropriate method of choice product protection.

Keywords

References

[1]  Decree of President of Ukraine, Position number 17 is about a technical information security in Ukraine, List of tools of the general setting, which are selected for providing of technical information security, necessity of guard of which by the legislation of Ukraine, 27 Sep 1999.
 
[2]  Law of Ukraine, About information security in informatively telecommunication systems, 5 Jul 1994. [Online] Available: http://zakon4.rada.gov.ua/laws/show/80/94-вр.
 
[3]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-004-99. Criteria of estimation of protection of information are in the computer systems from an unauthorized access, 28 Apr 1999.
 
[4]  I.Z. Duchyak, Creation of classifiers, 2010. [Online] Available: http://pidruchniki.ws/1633082637655/logika/stvorennya_klasifikatoriv.
 
[5]  L.I. Abrosymov, A.Y. Koablev, Methods and security information tools, [E-book] Available: http://www.melnikoff.com/yuriy/ posobie.htm.
 
Show More References
[6]  Order number 472 of the Administration of Government service of special communication and information security of Ukraine, ND TIS 1.5-002-2012. Classifier of tools of technical security information, 29 Aug 2012.
 
[7]  I.I. Simora, O.V. Gavrylenko, Classifier of tools of information security in informatively telecommunication systems, The 3rd international Scientific Conference ITSEC, National aviation university, 145.
 
[8]  GOST P ISO/MEC 12182-2002, Classification of programmatic tools, 01 Dec 2002.
 
[9]  ISO/IEC 15408-1:2009, Information technology -- Security techniques, Evaluation criteria for IT security -- Part 1: Introduction and general model.
 
[10]  Position number 1299 about a technical information security in Ukraine, ND TIS 3.7-001-99. The methodical pointing is in relation to creating of requirement specification on creation of the system of information security of automated system, 27 Sep 1999.
 
[11]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-005-99. Classification of AS and standard functional types of protected of the processed information is from an unauthorized access, 28 Apr 1999.
 
[12]  Order number 93 of the Administration of Government service of special communication and information security of Ukraine, Position about state examination in the sphere of technical information security, 16 May 2007.
 
[13]  State standard of Ukraine, DSTU 3974-200. The system of development and imputing of products is on a production: Rule implementation of experimental and designer work, 01 Jun 2000.
 
[14]  List of facilities of TIS, which have an expert conclusion about accordance with the requirements of technical information security, [Online] Available: http://dstszi.kmu.gov.ua/dstszi/ control/uk/publish/. /.[Accessed May. 2, 2014].
 
[15]  Order number 200 of State standard of Ukraine, DSTU 3396.2-97. information security. Technical information security. Terms and determinations.11 Apr 1997.
 
[16]  Order number 60 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 3.6-001-2000. Technical information security. Computers systems. An order of creation, introduction, accompaniment and modernization of facilities of technical information security, is from an unauthorized access, 20 Dec 2000.
 
[17]  Order of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.7-009-09. Guidelines for the evaluation of functional services security tools protecting information in computer systems from unauthorized access.
 
[18]  Tax Code of Ukraine number № 2755-VI., 02 Dec 2010. [Online]. Available: http://zakon4.rada.gov.ua/laws/show/2755-17/. [Accessed May. 2, 2014].
 
[19]  State standard of Ukraine, DSTU 3396.0-96 Information Security. Technical protection of information. The main provisions, 01 Jan 1997.
 
[20]  Information security tool, [Online] Available: http://avtoprom. kiev.ua/avtoprom/ua/content/.
 
Show Less References

Article

Information Security of Kazakh Airlines

1Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty

2Vice-rector KazNTU named after K.I. Satpaeva, Kazakhstan,Almaty

3Master 1st year degree the Type the (protection and information security), KazNTU named after K.I. Satpaeva

4Master 2st year degree the Type the (protection and information security), KazNTU named after K.I. Satpaeva


Journal of Computer Networks. 2014, 2(2), 23-25
doi: 10.12691/jcn-2-2-4
Copyright © 2014 Science and Education Publishing

Cite this paper:
Zhangisina G., Mukanov K., Kuldeev E., Usen A., Pavlikov R.. Information Security of Kazakh Airlines. Journal of Computer Networks. 2014; 2(2):23-25. doi: 10.12691/jcn-2-2-4.

Correspondence to: Zhangisina  G., Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty. Email: gul_zhd@mail.ru

Abstract

In this paper the problems in aviation and Information security of Kazakh airlines are considered. The problems of security in aviation and the principles of safe upper systems for civil aviation enterprises.

Keywords

References

[1]  Zhangisina G.D. The cost-effectiveness of information security system. International Conference. Bulgaria 2011.
 
[2]  Zhangisina G.D. Information security system. International Conference. Czech Republic, 2011.
 
[3]  Zhangisina G.D., Usen A. Tursynova M., D. Akhmetov problem of information security. Search, 2013. № 2 (1).
 
[4]  Zhangisina G.D., Rysty OM Pavlikov R., Usen, A., D. Akhmetov, Berkimbaeva A. On the methods and means of protection against leakage of information through technical channels. Search, 2013. № 1 (1).
 
[5]  Zhangisina G.D., Shayhanova AK Rystaev O., D. Akhmetov, Tursynova M. Ombaev NO The problem of data security in organizations and enterprises. Search, 2013. № 2 (1).
 
Show More References
[6]  PB Horev Methods and tools for information security in computer systems. Moscow: Academy, 2005.
 
Show Less References

Article

Wireless Network Controlled Robot using a Website, Android Application or Simple hand Gestures

1Department of Electrical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat-Dumas Road, Surat- 395007, India

2Department of Electronics & Communication Engineering, Sardar Vallabhbhai National Institute of Technology, Surat-Dumas Road, Surat- 395007, India

3Department of Mathematics, National Institute of Technology, Silchar - 788 010, District - Cachar (Assam), India

4L. 1627 Awadh Puri Colony Beniganj, Phase – III, Opposite – Industrial Training Institute (I.T.I.), Faizabad - 224 001 (Uttar Pradesh), India

5Applied Mathematics and Humanities Department, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas Road, Surat – 395 007 (Gujarat), India


Journal of Computer Networks. 2015, 3(1), 1-5
doi: 10.12691/jcn-3-1-1
Copyright © 2015 Science and Education Publishing

Cite this paper:
Adarsh Modh, Mosam Dabhi, Lakshmi Narayan Mishra, Vishnu Narayan Mishra. Wireless Network Controlled Robot using a Website, Android Application or Simple hand Gestures. Journal of Computer Networks. 2015; 3(1):1-5. doi: 10.12691/jcn-3-1-1.

Correspondence to: Adarsh  Modh, Department of Electrical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat-Dumas Road, Surat- 395007, India. Email: adarsh.modh@gmail.com

Abstract

This paper presents a robot which is controlled over a wireless network by using a laptop’s web browser and accessing a webpage. The live video feed of the IP-camera (installed on the robot) can be viewed on this website. Thus with such minimal requirements, the robot can be controlled irrespective of the position of the user. Another method to control this robot is by using an android application in which the mobile format of the above website will be viewed and there will be virtual buttons created in the app so as to control the movements. This robot can also be controlled by analysing hand gestures by using an accelerometer.

Keywords

References

[1]  Nader Bargshady, Nayef A. Alsindi, Kaveh Pahlavan, Yunxing Ye, Ferit Ozan Akgul, “Bounds on Performance of Hybrid Wi-Fi-UWB Cooperative RF Localization for Robotic Applications”.
 
[2]  Wenbin Wei, Yaodong Pan, Katsuhisa Furuta, “Internet-based Tele-control System for Wheeled Mobile Robot”, Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005
 
[3]  R. Want, A. Hopper, V. Falco and J. Gibbons, “The Active Badge location system”. ACM Transactions on Information Systems, 10, 91-102, January 1992.
 
[4]  M. Ocaña, L. M. Bergasa, M. A. Sotelo R. Flores, “Indoor Robot Navigation using a POMDP based on Wi-Fi and Ultrasound observations”
 
[5]  Hou-Tsan Lee, Wei-Chuan Lin, Ching-Hsiang Huang, Yu-Jhih Huang, “Wireless Indoor Surveillance Robot”, SICE Annual Conference 2011 September 13-18, 2011, Waseda University, Tokyo, Japan.
 
Show More References
[6]  Wang Shaokun , Xiao Xiao , Zhao Hongwei, “The Wireless Remote Control Car System Based On ARM9”, 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control.
 
[7]  Guoliang Zhong, Yukinori Kobayashi, Yohei Hoshino, Takanori Emaru, “Intuitive Teleoperation of NonHolonomic Mobile Robot with a manipulator based on virtual reality and Wi-Fi”.
 
[8]  I. Cox, “Blanche-an experiment in guidance and navigation of an autonomous robot vehicle”. IEEE Transactions on Robotics and Automation, 7(2): 193-204, 1991.
 
[9]  P. Bahl, and V. N. Padmanabhan, “RADAR: A, In-building RF-based User Location and Tracking System”. Proceedings of the IEEE Infocom 2000, vol.2, pp. 775-784, Tel Aviv, Israel, March 2000.
 
[10]  M. Ocaña, L.M. Bergasa, M.A. Sotelo, “Robust Navigation Indoor Using Wi-Fi Localization”, Proceedings of the 10th IEEE International Conference on Methods and Models in Automation and Robotics, pp. 851-856, Miedzyzdroje, Poland, 30 August-2 September 2004.
 
[11]  T. Fitzpatrick, Live remote control of a robot via the Internet, IEEE Robotics & Automation Magazine, Volume 6, Issue 3, 1999, pp. 7-8
 
[12]  http://arduino.cc/en/Tutorial/HomePage
 
[13]  Massimo Banzi – “Getting Started with Arduino”
 
[14]  http://docs.spark.io/start/
 
[15]  https://github.com/spark/core/
 
Show Less References