3 results
Search Results
Now showing 1 - 3 of 3
Item Open Access VULNERABILITIES IN CI-PLATFORMS THAT CAN BE EXPLOITED FOR CRYPTOCURRENCY MINING AND POSSIBLE SOLUTIONS TO THIS PROBLEM(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Sokitbayev M. ; Suyerbassov T. ; Baimolda A.Abstract. The topic of how vulnerabilities on Cl-platforms that are subject to cryptocurrency mining is relevant. One solution is that the github has manually set the commit confirmation so that the cryptominer cannot automate mining.Item Open Access COMPARATIVE ANALYSIS OF CLASSICAL MESSAGE FLOW AND INTEGRATION OF QUANTUM TECHNOLOGIES INTO MESSAGE TRANSMISSION USING QISKIT LIBRARY(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Mukhamed Y. ; Demeuov D.Abstract. The issue of secure connectivity is becoming increasingly common these days. Practically all encryption methods can be hacked, prompting the development of a data transport that is impenetrable. This scientific paper discussed the way of classic transmission of information and integration of quantum technologies into this network in order to increase the safety of the channel. This paper includes information about work done on research, such as learning principles of quantum cryptography technologies, basic logical gates and key terms such as superposition, entanglement and teleportation. Qubits are formed and exchanged between 2 parts of the Local Area Network (LAN) using Qiskit library. 2 protocols of data transmission: classic and quantum have been analyzed and compared.Item Open Access MITM. WHAT IS IT, HOW TO PROTECT YOURSELF AND IMPLEMENTATION FOR INSTRUCTIONAL USE(СДУ хабаршысы - 2021, 2021) Abdinurova N. ; Akmyrza D. ; Mirash A.Abstract. This is an attack in which a cybercriminal intercepts data while it is being transmitted. Man-in-the-Middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on communications between two targets. This article discusses how people can protect themselves, what they need to know, and how an attacker performs a MITM attack using the open-source tools bettercap and net-creds in kali Linux. Buttercup is a network attack and monitoring program that can perform ARP spoofing and sniffing. Netcreds is a sniffing tool available by cloning on Github. This article attempts to implement this attack for instructional use.