Search Results

Now showing 1 - 5 of 5
  • ItemOpen Access
    THE CONCEPT OF ANALYZING THE ARCHITECTURE OF THE SYSTEM AND MATHEMATICAL MODELS FOR ENSURING INTEGRATED SECURITY
    (2022 International Young Scholars' Conference, 2022) N. Abdinurova; Y. Mukhamedkali; O. Baimuratov
    Abstract. Since the development of the Internet, humanity has stopped using real information data that is transmitted in a classical way, that is, printed or written on paper, which has increased the number of users, which, consequently, has increased the amount of data transmitted between users. Because of this, the number of both intentional and unintentional cyber-attacks has increased dramatically. With the development of technologies, people's privacy and confidentiality are increasingly vulnerable because of these cyber attacks. The article talks about the overall level of security and tries to define the general formula for organizations with Wi-Fi routers and network printers. The security level of each component is determined through penetration testing using open-source ethical hacking tools. Define math formula need to take into consideration several factors such as vulnerability, usage frequency, etc. This paper shows some ways to penetrate the organization's network and some recommendations are also given to improve the security of the local infrastructure of organizations.
  • ItemOpen Access
    CHINA`S ECONOMIC AND SECURITY INTERESTS IN CENTRAL ASIA
    (Қазақстан ғылымының дамуы мен келешегі жастар көзімен - 2018, 2018) Akyngaziyeva A.A.
    For Central Asia, when entering the world market economy, it is especially important to study the peculiarities of the development of mighty China as a neighbor, as a partner and as a competitor. The main objective of this work is to find the interests of the PRC in the period of economic development, to explore the features of development and security with respect to political interests to the countries of Central Asia. In my work, the opportunities of China, which can become the leader of the world economy, are indicated. In a word, the role of Central Asia is defined as mutual understanding of the countries and separately with respect to China.
  • ItemOpen Access
    THE SECURITY ISSUES IN THE CENTRAL ASIA AND THE GEOSTRATEGIC ROLE OF KAZAKHSTAN IN THIS REGION
    (Қазақстан ғылымының дамуы мен келешегі жастар көзімен - 2018, 2018) Jaulbayeva N.A.
    This article discusses the internal and external security challenges in Central Asia and the geostrategic role of Kazakhstan in this region. Living in a globalized world, this region needs the integration and regionalization of the post-Soviet states, which by combining their forces will be able to hold back and hold, as well as to combat these external and internal security that our regulators face such as drug trafficking, extremism, separatism, ecological and other social challenges.
  • ItemOpen Access
    ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION
    (СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.
    Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.
  • ItemOpen Access
    COMPARATIVE ANALYSIS BETWEEN TELEGRAM AND WHATSAPP
    (SDU University, 2017) Baimuratov O. ; Ziyat B.
    Absrtact. This paper presents the results of a comparative analysis between Telegram and WhatsApp. The main attention was paid to their application, which determines their relevance to users, security, MTProto mobile protocol access, end-to-end encryption, data security and functionality. The leading social networks are usually available in multiple languages and enable users to connect with friends or people across geographical, political or economic borders. Approximately 2 billion internet users are using social networks and these figures are still expected to grow as mobile device usage and mobile social networks increasingly gain traction.