SECURITY CONSIDERATIONS FOR REMOTE ADMINISTRATION IN ELECTRONIC COMMUNICATIONS INFRASTRUCTURE

Authors

DOI:

https://doi.org/10.30888/2709-2267.2025-33-00-016

Keywords:

remote administration, information security, access control, cryptographic protocols, electronic communications

Abstract

The article addresses security aspects of remote administration in electronic communications infrastructure. Key threats (traffic interception, password attacks, protocol vulnerabilities) and protection methods such as cryptography, multi-factor authentic

Metrics

Metrics Loading ...

References

ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection — Information security management systems — Requirements. Geneva: ISO, 2022.

Лаврут О., Івко С.О., Пузиренко О.Г., Климович О.К. Застосування моделей оцінювання ризиків інформаційної безпеки в інформаційно-телекомунікаційних системах. ResearchGate. 2021. URL: https://www.researchgate.net/publication/355929195_Zastosuvanna_modelej_ ocinuvanna_rizikiv_informacijnoi_bezpeki_v_informacijno-telekomunikacijnih _sistemah

ISO/IEC 27002:2022. Information security, cybersecurity and privacy protection — Information security controls. Geneva: ISO, 2022.

Ylonen, T., & Lonvick, C. The Secure Shell (SSH) Protocol Architecture. RFC 4251. IETF, 2006. URL: https://www.rfc-editor.org/rfc/rfc4251

ISO/IEC 27033-1:2015. Network security — Part 1: Overview and concepts. Geneva: ISO, 2015.

ISO/IEC 15408-1:2009. Evaluation Criteria for Information Technology Security — Part 1: Introduction and general model (Common Criteria). Geneva: ISO, 2009.

Published

2025-09-30

How to Cite

Poliakov, O., Kuzmin, A., & Ivko, S. (2025). SECURITY CONSIDERATIONS FOR REMOTE ADMINISTRATION IN ELECTRONIC COMMUNICATIONS INFRASTRUCTURE. Sworld-Us Conference Proceedings, 1(usc33-00), 58–62. https://doi.org/10.30888/2709-2267.2025-33-00-016