Кафедра "Кібербезпека"

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/63626

Офіційний сайт кафедри https://cybersecurity.kpi.kharkov.ua

Кафедра "Кібербезпека" створена 11 січня 2022 року.

Кафедра активно співпрацює у галузі освіти та наукових досліджень із провідними ІТ-компаніями (Distributed Lab, Сайфер, Microcrypt Technologies). Викладачі кафедри та студенти, що навчаються за напрямом кафедри, активно використовують ресурси хмарних обчислень та застосовують технології сучасних мереж і засоби кібербезпеки разом із провідними фахівцями.

Кафедра проводить міжнародну науково-практичну конференцію “Інформаційна безпека та інформаційні технології” в рамках міжнародного науково-практичний форуму "Цифрова реальність", є співорганізатором міжнародного конгресу ”Human-Computer Interaction, Optimization and Robotic Applications” (IEEE, Анкара, Турція).

Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут".

На кафедрі "Кібербезпека" працюють 11 викладачів, з них 3 мають науковий ступінь доктора технічних наук, 5 – науковий ступінь кандидата технічних наук; 3 – звання професора, 8 – звання доцента.

Переглянути

Результати пошуку

Зараз показуємо 1 - 2 з 2
  • Ескіз
    Документ
    Cybersecurity challenges and solutions for critical infrastructure protection
    (Національний авіаційний університет, 2024) Tkachov, Andrii; Korolov, Roman; Rahimova, Irada; Aksonova, Iryna; Sevriukova, Yelyzaveta
    Critical infrastructure can be vulnerable to attack from natural disasters or malicious actors such as hackers or terrorists. If these threats are not addressed quickly, they can lead to significant disruption in service delivery or even complete shutdowns which could have devastating consequences for those relying on them for their day-to-day activities. Therefore, it is important that governments take steps towards protecting critical infrastructure from potential threats by implementing comprehensive security measures both online and offline. Based on a comprehensive analysis of current issues, a decision has been made to ensure the cyber protection of critical infrastructure objects infrastructure. An analysis of cyber threats was carried out in relation to the dynamics of historical retrospective in sectors of critical infrastructure objects. As more and more systems become connected to the internet and vulnerable to cyber-attacks, it is important for organizations to invest in robust cybersecurity defenses to protect their systems from malicious actors. By taking these measures, organizations can help protect their systems from cyber-attacks and ensure the safety of the public. Formulates a model of threats from spills of critical infrastructure objects to cyber-attacks with a breakdown of threats by type. A triad of main actions and approaches for protecting critical infrastructure has been seen. Existing problems in implementing countermeasures and major threats posed to cyberspace actors have been identified. Key factors have been identified to break the cycle of cyber-attacks on critical infrastructure. Based on a comprehensive analysis and formulated concepts, a comprehensive approach to the protection of critical infrastructure objects is proposed in accordance with the management of global trends in the development of threats, threat models, and vulnerabilities of the protection system, a triad of actions and approaches to breaking cycles of cyber-attacks on critical infrastructure.
  • Ескіз
    Документ
    Justification of directions for improving authentication protocols in information and communication systems
    (Національний авіаційний університет, 2023) Havrylova, Alla; Khokhlachova, Yuliia; Tkachov, Andrii; Voropay, Natalya; Khvostenko, Vladyslav
    The analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification ofthe authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.