Volume 15 Number 3 September 2024


Effectiveness of Application Software in the Simulation Boundary for Critical Data Protection

Liliia P. Galata, Bogdan Y. Korniyenko, Alexander K. Yudin

https://doi.org/10.6025/jisr/2024/15/3/89-102

Abstract This work develops and implements a simulation boundary designed to safeguard essential data assets using the application software GNS3. At the core of computer network security lies the Cisco ASA 5520 firewall, which segments the organization’s network into a demilitarized zone, encompassing an internal and external network. Within this demilitarized zone, web and FTP servers are set up. A network... Read More


Study of Cyborg Hawk Linux tools in forensics domain

Nataliia P. Tmienova, Oleg E. Ilarionov, Nina M. Ilarionova

https://doi.org/10.6025/jisr/2024/15/3/103-111

Abstract Computer forensics, which involves both software and technical skills, falls under the umbrella of engineering and technical expertise. It plays a crucial role in various computer-related fields, enabling the creation of a comprehensive evidence system. The significance of computer forensics is highlighted by the growing role of computers in today’s society. A significant portion of crimes and offences are carried... Read More


Modelling-based Methods for Information and Computer Systems

Yurii I. Khlaponin, Volodimir O. Khoroshko, Yuliia E. Khokhlacheva, Evgen V. Gavrilko

https://doi.org/10.6025/jisr/2024/15/3/112-120

Abstract Recent years have seen a significant increase in the application of modeling-based methods and experimental techniques in the analysis of ICS systems. However, a common limitation of these approaches is the systematic examination of certain processes and events within the system at different stages of operation, using a logical framework. This often leads to various assumptions that are not necessarily... Read More