Category: Brief papers


Vodyasov A.E. , Kiryukhin D.M. , Sidorenko V. G.

In the context of the pandemic, the role of computer security specialists in solving the problems of uninterrupted operation of transport enterprises has increased many times. The article is devoted to summing up and analyzing the experience accumulated in the RUT (MIIT) for 20 years of training specialists in the specialty “Computer Security”, determining the prospects for the development of the educational program. The article presents a methodology for using freely distributed software created by the authors of the article in the learning process in cases where it is impossible or unsafe on real objects. The main advantage of this technique is that it takes into account the experience gained by specialists in solving real cases, allows you to reproduce real system vulnerabilities without harming real systems for training purposes, makes it possible to diagnose these vulnerabilities, exploit them, choose and compare diff erent ways to remove them from the system. The article contains an analysis of publications devoted to the experience of training personnel in the specialty “Computer Security” in diff erent countries using various tools. The article provides an overview of the educational program and formulates the principles that form the basis of training at our university, demonstrates examples of the use of digital doubles in the learning process, focuses on the formation of interdisciplinary connections, skills of applying theoretical knowledge to solve practical problems and analyze the results obtained. The review of the subjects of the discipline “Methods of risk management analysis”, statistical analysis of the results of the implementation of the methodology developed by the authors in practice, and their graphical interpretation is carried out. Examples of the application of risk theory to solving computer security problems are given. The article contains examples of students ‘ participation in research activities, the creation of methodological support for the relevant educational program, and various events outside the university.

Key words:
Computer security, training, digital double, vulnerability, risk

Download article