This article describes the process of inventorying equipment in a typical IT department. A new approach to inventory is proposed, which will eliminate the "double work" and solve a number of typical problems. The relationship with an already developed product for monitoring network infrastructure is described.
Keywords: monitoring, network infrastructure, inventory, QR code, Telegram, information technology, information technology department
The article examines the concept and scope of edutainment technology. A variant of the application of this technology in teaching students information security issues is proposed. Examples of the implementation of edutainment technology in a number of games covering cybercrime and information security are given.
Keywords: edutainment-technology, edutainment, information security, teaching, data protection, game
This article describes the experience of implementing a system for monitoring the stability of a network infrastructure using the Telegram messenger in a government institution. The functionality of the system and further plans for its development are presented. The tendency towards the spread of the Telegram messenger in the society is described.
Keywords: Telegram, ping, monitoring, inventory, infrastructure, network
This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.
Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT
This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.
Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest
This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.
Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator
In this paper the issue of improving the quality of training for specialists in the field of information security through the use of a specialized training system in education is considered. An overview of existing analogues of such training systems is given (including online games, tests, choose-your-own-adventure style games etc.). The main aspects of the development of an automated training system are given. The requirements for a focus group for testing an automated training system are formulated.
Keywords: training system, automated training system, information security, data protection, simulator, training, development, programming