<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-1-0-4</article-id><article-id pub-id-type="publisher-id">3404</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;PHENOMENOLOGICAL ANALYSIS&amp;nbsp;OF EXISTING AUTHENTICATION METHODS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;PHENOMENOLOGICAL ANALYSIS&amp;nbsp;OF EXISTING AUTHENTICATION METHODS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Khramov</surname><given-names>Maxim Andreevich</given-names></name><name xml:lang="en"><surname>Khramov</surname><given-names>Maxim Andreevich</given-names></name></name-alternatives><email>khramov.m.a@yandex.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kornev</surname><given-names>Lev Viktorovich</given-names></name><name xml:lang="en"><surname>Kornev</surname><given-names>Lev Viktorovich</given-names></name></name-alternatives></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Shablya</surname><given-names>Vladimir Olegovich</given-names></name><name xml:lang="en"><surname>Shablya</surname><given-names>Vladimir Olegovich</given-names></name></name-alternatives></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/1/ИТ_НР_9.1_4.pdf" /><abstract xml:lang="ru"><p>The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other users&amp;#39; credentials to log in. The threat to information security is determined, implemented by an internal information security violator in various ways, for subsequent use of the obtained access to the accounts of other users as a springboard for the implementation of computer attacks. A comparative analysis of authentication methods for users of local area networks and automated workplaces was carried out by the method of expert assessment. The comparative analysis carried out in the work suggests that countering the above-mentioned threat to information security is possible by introducing functional elements responsible for performing the authentication procedure into the operating system&amp;#39;s access control and management system using biometric authentication methods based on the dynamics of the user&amp;#39;s work.</p></abstract><trans-abstract xml:lang="en"><p>The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other users&amp;#39; credentials to log in. The threat to information security is determined, implemented by an internal information security violator in various ways, for subsequent use of the obtained access to the accounts of other users as a springboard for the implementation of computer attacks. A comparative analysis of authentication methods for users of local area networks and automated workplaces was carried out by the method of expert assessment. The comparative analysis carried out in the work suggests that countering the above-mentioned threat to information security is possible by introducing functional elements responsible for performing the authentication procedure into the operating system&amp;#39;s access control and management system using biometric authentication methods based on the dynamics of the user&amp;#39;s work.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security problems</kwd><kwd>analysis of information security tools</kwd><kwd>biometric authentication</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security problems</kwd><kwd>analysis of information security tools</kwd><kwd>biometric authentication</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1.&amp;nbsp;Methodological document. Methodology for assessing information security threats [Electronic resource]: approved by FSTEC of Russia 05.02.2021 // URL: https://fstec.ru/dokumenty/vse-dokumenty/spetsialnye-normativnye-dokumenty/metodicheskij-dokument-ot-5-fevralya-2021-g // (accessed: 03/03/2024).</mixed-citation></ref><ref id="B2"><mixed-citation>2.&amp;nbsp;Komekov E.A. Authentication systems // Bulletin of Science and Education. 2022. No. 1. pp. 1-4.</mixed-citation></ref><ref id="B3"><mixed-citation>3.&amp;nbsp;Sidorkina I.G. Classification of human authentication methods // Bulletin of the V.N. Tatishchev Volga State University. 2009. No. 1. pp. 1-6.</mixed-citation></ref><ref id="B4"><mixed-citation>4.&amp;nbsp;Koryakova V.A. Smartphone user authentication based on data obtained from the accelerometer // Caspian Journal: Management and high technologies. 2023. No. 61(1). pp. 59-72.</mixed-citation></ref><ref id="B5"><mixed-citation>5.&amp;nbsp;Kurakov V.I. Vulnerability analysis of biometric authentication methods // The international scientific journal &amp;quot;Bulletin of Science&amp;quot;. 2022. No. 5(50). pp. 87-98.</mixed-citation></ref><ref id="B6"><mixed-citation>6.&amp;nbsp;Vishnyakov V.A. Models and means of user authentication in corporate management systems and cloud computing // Reports of the Belarusian State University of Informatics and Radioelectronics. 2016. No. 3(97).</mixed-citation></ref><ref id="B7"><mixed-citation>pp. 111-114.</mixed-citation></ref><ref id="B8"><mixed-citation>7.&amp;nbsp;Posmetukhova K.N. Review and brief analysis of modern authentication methods // Science and reality. 2023. No. 2(14). pp. 58-62.</mixed-citation></ref><ref id="B9"><mixed-citation>8.&amp;nbsp;Osin A.V. Review of user identification methods based on digital fingerprints // Proceedings of educational institutions of communications. 2023. No. 5. pp. 91-111.</mixed-citation></ref><ref id="B10"><mixed-citation>9.&amp;nbsp;GOST R 58833-2020 Information protection. Identification and authentication. General provisions.</mixed-citation></ref></ref-list></back></article>