Maksimova E.A., Omelchenko T.A., Umnitsyn Yu.P., Guzhakovskaya K.P. Audit of Information Security of the User’s Computer Workstation Based on System Registry Data

AUDIT OF INFORMATION SECURITY OF THE USER’S COMPUTER WORKSTATION BASED ON SYSTEM REGISTRY DATA

Elena Aleksandrovna Maksimova

Candidate of Technical Sciences, Associate Professor,

Head of Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Tatyana Aleksandrovna Omelchenko

Postgraduate Student, Researcher, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Yuriy Petrovich Umnitsyn

Associate Professor, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Kristina Petrovna Guzhakovskaya

Candidate of Physical and Mathematical Sciences, Associate Professor,

Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. Information security audit is an independent assessment of the current state of information security, determinig the level of its compliance with certain criteria, and providing results in the form of recommendations.

There are many approaches to the maintenance of the required level of security of the computer workstation, while the approaches vary in the degree of their effectiveness and value characteristics. The use of traditional active and passive means of information protection in the enterprise is not always possible due to various reasons. One way out of this situation can be a continuous audit of the information system as a whole and its individual vital nodes.

An audit is an independent examination of the individual areas of functioning of the organization. There are two types of audit: external and internal. To protect your system registry from malicious attacks, it is necessary to control the undesirable activities that occur in the registry during the installation of each new program. To do it manually is impossible since the registry contains millions of records. It is therefore necessary to analyse the current external software tool designed to audit information security of the system registry on the workstation user.

The results of the audit with the help of the developed program identified 15 changes, 2 of which were potentially dangerous for the stable operation of the workstation user.

Key words: system registry, information security audit, computer workstation, information security, external attack.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (Maksimova.pdf) Maksimova.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/495
786 DownloadsUpdate this file (Maksimova.pdf)