SECURITY CONSIDERATIONS FOR REMOTE ADMINISTRATION IN ELECTRONIC COMMUNICATIONS INFRASTRUCTURE
DOI:
https://doi.org/10.30888/2709-2267.2025-33-00-016Keywords:
remote administration, information security, access control, cryptographic protocols, electronic communicationsAbstract
The article addresses security aspects of remote administration in electronic communications infrastructure. Key threats (traffic interception, password attacks, protocol vulnerabilities) and protection methods such as cryptography, multi-factor authenticMetrics
References
ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection — Information security management systems — Requirements. Geneva: ISO, 2022.
Лаврут О., Івко С.О., Пузиренко О.Г., Климович О.К. Застосування моделей оцінювання ризиків інформаційної безпеки в інформаційно-телекомунікаційних системах. ResearchGate. 2021. URL: https://www.researchgate.net/publication/355929195_Zastosuvanna_modelej_ ocinuvanna_rizikiv_informacijnoi_bezpeki_v_informacijno-telekomunikacijnih _sistemah
ISO/IEC 27002:2022. Information security, cybersecurity and privacy protection — Information security controls. Geneva: ISO, 2022.
Ylonen, T., & Lonvick, C. The Secure Shell (SSH) Protocol Architecture. RFC 4251. IETF, 2006. URL: https://www.rfc-editor.org/rfc/rfc4251
ISO/IEC 27033-1:2015. Network security — Part 1: Overview and concepts. Geneva: ISO, 2015.
ISO/IEC 15408-1:2009. Evaluation Criteria for Information Technology Security — Part 1: Introduction and general model (Common Criteria). Geneva: ISO, 2009.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.