This article describes the experience of implementing a system for monitoring the stability of a network infrastructure using the Telegram messenger in a government institution. The functionality of the system and further plans for its development are presented. The tendency towards the spread of the Telegram messenger in the society is described.
Keywords: Telegram, ping, monitoring, inventory, infrastructure, network
This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.
Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT
This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.
Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest
This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.
Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator
In this paper the issue of improving the quality of training for specialists in the field of information security through the use of a specialized training system in education is considered. An overview of existing analogues of such training systems is given (including online games, tests, choose-your-own-adventure style games etc.). The main aspects of the development of an automated training system are given. The requirements for a focus group for testing an automated training system are formulated.
Keywords: training system, automated training system, information security, data protection, simulator, training, development, programming
This article describes an existing university database of automobile passes in Microsoft Excel. The university has two databases: permanent and temporary car passes. The negative sides of databases in Microsoft Excel are described in this article. Also, the authors analyzed the possibility of using 1C company software to account for car passes. A new database is described in the Microsoft SQL Server database management system. This article defines methods for unification an outdated database for later migration to Microsoft SQL Server. The main components of the future application software for working with the new database have been designed. By creating additional software, the likelihood of errors in the databases is minimized.
Keywords: database, Microsoft SQL Server, Microsoft Excel, university, car pass, registry, unification, migration, C#, software