Development of a cyber-secure information and technical system of a higher educational institution

From the author

This article discusses the design, testing, development and implementation of a cyber-secure information and technical system of a higher educational institution on the example of my own, as a result of the successful experience of introducing customs and finance at the University in 2019. The results can be applied at any stage of creating cyber-secure information technology systems, including higher education institutions, corporate / home networks, etc.





I will answer all your questions in the comments, or private messages. I am open to additions, optimization, and criticism from professionals. Happy acquaintance!





Introduction

The development of new types of communication, the rapid improvement of information and telecommunication technologies and data processing methods are radically changing the face of modern education. All over the world, these trends are most clearly traced in the example of distance learning ( DL ) during the quarantine period associated with the Coronavirus.





Not so long ago, when organizing DL and sharing the necessary remote communication, higher educational institutions of countries were deprived of the possibility of using traditional technologies and networks of radio relay lines with repeaters (the only reliable method of transmitting information at that time) located outside settlements due to the obvious complexity of the technical and economic nature. In short, due to the high cost of the technical implementation of DOs .





, , , . , , , , , Zoom , Skype, Discord , ODP (Open Distributed Processing, ITU - T Rec. X.901 / ISO / IEC 10746 - 1, ITU - T Rec. X. 902 / ISO / IEC 10746 - 2 ITU - T Rec. X.904 / ISO 10746 - 4 ).





, (3G), 4G 5G. , 3G . UMTS (W-CDMA) CDMA-2000. , 4G . 4G 802.11, 802.16 (Wireless Man), , . , , , , , . , , , , . , , , , ( ) , ( ) , . , , . , , , , .





, , , . , ( ), , , , . , .





, ​​ - - () . , , - .





, - , .





, , « ()», . , «», .





, , , , .





, , - , , . , , , .





. , , . .





-

, , , , «» . () , . . , / (Wi-Fi), ( , 4 , RG - 45, 1.1 ) GPON.





« » / Wi-Fi . , , , - . (. 1.2 - 1.3, , Google Maps ).





, . , , , () .





Wireless Fidelity (Wi-Fi), , - .





-

, ( 1.4 ).





, Ubiquiti UniFi. . 1.5 – 1.6.





- « ». , , , . , , (. 1.7 - 1.8)





, " " " " .





- , , . Ubiquiti Uni-Fi AP ( 15 ). - , RG - 45. Ubiquiti Ubiquiti Cloud, , ( ), (Backup). , « », , «» , c .





, , « », , , , - , .





, , , . , - .





, -

« » Wi-Fi - 10 15 . , , , « » , - . « » Ubiquiti Unifi Long Range ( . « ») , « » «» , . " ". , . 1.9 LR, - AP 4 ( Paint, - :)





,   Wi-Fi ( 2,4 5), 802.11 a / b / g / n Wi-Fi. ( 6,5 450 / 2,4 6,5 300 / 5, 802.11n MSC0 - MSC23 MSC0 - MSC15).





Power over Ethernet (PoE). PoE , . () , (. 1.10).





, PoE, (power sourcing equipment) . PoE , 1.11.





-

- , , - , , , .





, . : 2,5 ( , ), - () , () () ( ).





, - , Ubiquiti CloudKey. 1.12.





. , . Secure Sockets Layer (SSL) . Transmission Control Protocol / Internet Protocol (TCP / IP).





( , , . 1.13).





Wi-Fi WPA2-PSK 10 , .





, , , , .





, , , , , , , Zoom, Skype, Discord , , . :





- - , - Google Classroom, Zoom , Skype, Google Hangouts, Prometheus, SuperMemo, Stepik, Coursera, SoloLearn, Brain Code. ( ) ;





- - , - , , . ;





- () .





Special thanks to V.O. Head of the Department of Cybersecurity of the UTDF Prokopovich-Tkachenko to Dmitry Igorevich for the opportunities provided for the creation of ITS, to Associate Professor of the Department of Cybersecurity Tarasenko Yuri Stanislavovich for help with the design and calculations, as well as to students Oleinik Alexander, Rudakov Mikhail and Lutsenko in communication!





Thanks for attention!








All Articles