This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.
Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT
This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.
Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest
This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.
Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator
In this paper the issue of improving the quality of training for specialists in the field of information security through the use of a specialized training system in education is considered. An overview of existing analogues of such training systems is given (including online games, tests, choose-your-own-adventure style games etc.). The main aspects of the development of an automated training system are given. The requirements for a focus group for testing an automated training system are formulated.
Keywords: training system, automated training system, information security, data protection, simulator, training, development, programming