Using new technologies to organize a secure flow of information

Authors

  • Сопубеков Н. А., Самусев И. А.

Keywords:

information, information security, technology, protocol, cryptography, network, node, process

Abstract

The main purpose of this study is to examine the capabilities of key technologies to provide security in modern open networks. The subject of the study is the VPN and SSL/TLS protocols, the use of these technologies in the field of communications, their main features, differences and advantages, their location at the network level and their place in information security. By comparing the capabilities of these technologies, it was analyzed that although these technologies are competing technologies, they complement each other and extend existing functionality. As a result, despite the fact that the protocols have different properties, the possibility of solving various problems and processes based on their joint use was determined.

References

Баранова, Е.К. Информационная безопасность и защита информации: Учебное пособие / Е.К. Баранова, А.В. Бабаш. - М.: Риор, 2018. - 400 c.

Бирюков, А.А. Информационная безопасность: защита и нападение / А.А. Бирюков. - М.: ДМК Пресс, 2019. - 474 c.

Гафнер, В.В. Информационная безопасность: Учебное пособие / В.В. Гафнер. -Рн/Д: Феникс, 2020. - 324 c.

Нечаев Д. VPN: прошлое, настоящее, будущее. [Электронный ресурс]. Режим доступа: https://habrahabr.ru/company/celecom/blog/221675/5. https://kyrgyzstanvpn.com/ru/

Published

2024-06-10