The article considers mathematical models for the collection and processing of voice content, on the basis of which a fundamentally logical scheme for predicting synthetic voice deepfakes has been developed. Experiments have been conducted on selected mathematical formulas and sets of python programming language libraries that allow real-time analysis of audio content in an organization. The software capabilities of neural networks for detecting voice fakes and generated synthetic (artificial) speech are considered and the main criteria for the study of voice messages are determined. Based on the results of the experiments, a mathematical apparatus has been formed that is necessary for positive solutions to problems of detecting voice deepfakes. A list of technical standards recommended for collecting voice information and improving the quality of information security in the organization has been formed.
Keywords: neural networks, detection of voice defects, information security, synthetic voice speech, voice deepfakes, technical standards for collecting voice information, algorithms for detecting audio deepfakes, voice cloning
This article presents an overview of the tools for solving the problem of monitoring the network infrastructure. Foreign solutions are considered, their characteristics are presented, key features are described, as well as their shortcomings. The problem of import substitution in the Russian Federation is emphasized. The results were summed up, and the relevance of developing a domestic IT infrastructure monitoring system with additional functionality was developed.
Keywords: monitoring, IT infrastructure, network infrastructure, negios, zabbix, cacti, import substitution, information security, Linux, Windows
This article describes the process of inventorying equipment in a typical IT department. A new approach to inventory is proposed, which will eliminate the "double work" and solve a number of typical problems. The relationship with an already developed product for monitoring network infrastructure is described.
Keywords: monitoring, network infrastructure, inventory, QR code, Telegram, information technology, information technology department
The article examines the concept and scope of edutainment technology. A variant of the application of this technology in teaching students information security issues is proposed. Examples of the implementation of edutainment technology in a number of games covering cybercrime and information security are given.
Keywords: edutainment-technology, edutainment, information security, teaching, data protection, game
This article describes the experience of implementing a system for monitoring the stability of a network infrastructure using the Telegram messenger in a government institution. The functionality of the system and further plans for its development are presented. The tendency towards the spread of the Telegram messenger in the society is described.
Keywords: Telegram, ping, monitoring, inventory, infrastructure, network
This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.
Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT
This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.
Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest
The article analyzes network traffic in WINDOWS operating systems, as well as a description of its tools to identify a certain redundancy of network activity. The authors also conduct a comparative analysis of the most common software products that perform the functions of monitoring network traffic.
Keywords: operating system, detection systems, network protocol, network traffic analysis, networks, sniffer, traffic, network activity
This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.
Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator
This article describes an existing university database of automobile passes in Microsoft Excel. The university has two databases: permanent and temporary car passes. The negative sides of databases in Microsoft Excel are described in this article. Also, the authors analyzed the possibility of using 1C company software to account for car passes. A new database is described in the Microsoft SQL Server database management system. This article defines methods for unification an outdated database for later migration to Microsoft SQL Server. The main components of the future application software for working with the new database have been designed. By creating additional software, the likelihood of errors in the databases is minimized.
Keywords: database, Microsoft SQL Server, Microsoft Excel, university, car pass, registry, unification, migration, C#, software