+7 925 966 4690, 9am6pm (GMT+3), Monday – Friday
ИД «Финансы и кредит»

JOURNALS

  

FOR AUTHORS

  

SUBSCRIBE

    
National Interests: Priorities and Security
 

Cybersecurity threats: Triggers and prevention recommendations

Vol. 15, Iss. 6, JUNE 2019

Received: 21 March 2019

Received in revised form: 10 April 2019

Accepted: 25 April 2019

Available online: 17 June 2019

Subject Heading: THREATS AND SECURITY

JEL Classification: F52, H56, J28, M15, N10

Pages: 1185–1194

https://doi.org/10.24891/ni.15.6.1185

Khrustalev E.Yu. Central Economics and Mathematics Institute of Russian Academy of Sciences (CEMI RAS), Moscow, Russian Federation
stalev777@yandex.ru

ORCID id: not available

Kostyurin G.A. Russian Presidential Academy of National Economy and Public Administration (RANEPA), Moscow, Russian Federation
g.kostyurin@yandex.ru

ORCID id: not available

Subject The article focuses on issues of the exposure of IT infrastructure to cyber attacks as the global community sees an increasing number of cybercrimes.
Objectives The study analyzes and systematized major cyber attacks, which have taken place recently, chronologically. We classify cybercrimes and their consequences, define new recommendations for preventing cybercrimes and improving the cybersecurity level during the global digitization.
Methods Research is based on methods of a systems analysis, comparative, structural and logic analysis, econometric analysis, content-analysis, mass media, economic-statistical methods and modeling.
Results We arranged major cybersecurity attacks chronologically, classified cybercrimes and their consequences. The article provides the main recommendations for improving the cybersecurity level during the global digitization.
Conclusions and Relevance We reviewed key concepts, described forms and types of cyber attacks and focus on global ones. The article also analyzes key triggers of cybercrimes and gives specific recommendations for preventing them.

Keywords: cybersecurity, information security, cyber threat, cyber attack, cybercrime

References:

  1. Bobylev A.E., Trofimova A.V. [Data protection problem on the Internet of Things]. Nauka-Rastudent.ru, 2016, no. 3, p. 25. (In Russ.) URL: Link
  2. Gol'chevskii Yu.V., Filimonova N.A. [An approach to detecting malicious activity on the Internet of Things]. Informatsiya i bezopasnost' = Information and Security, 2017, vol. 20, no. 3, pp. 464–467. (In Russ.)
  3. Vyatkin A.A. [Economic security of electronic payment systems: Mitigation of cybersecurity risks during the time of digital transformation]. Innovatsionnoe razvitie ekonomiki = Innovative Development of Economy, 2018, no. 5, pp. 295–298. (In Russ.)
  4. Alosaimi R., Alnuem M. Risk Management Frameworks for Cloud Computing: A Critical Review. International Journal of Computer Science & Information Technology, 2016, vol. 8, iss. 4. URL: Link
  5. Andreev N.O. [Emergence and growth of threats in IT systems]. Prikladnaya informatika = Applied Informatics, 2006, no. 6, pp. 87–100. (In Russ.)
  6. Turygina V.F., Ford V.F., Matvevnina A.I. [The use of machine learning in cybersecurity]. Nauchnyi al'manakh = Science Almanac, 2017, no. 6-1, pp. 405–408. (In Russ.)
  7. Glotina I.M. [Cybercrime as a shadow business]. Vestnik Chelyabinskogo gosudarstvennogo universiteta = Bulletin of Chelyabinsk State University, 2016, no. 6, pp. 51–57. (In Russ.)
  8. Belova I.V. [The formulation of the concept ‘information security’ in the training course of the discipline “Fundamentals of information security”]. Psikhologiya, sotsiologiya i pedagogika = Psychology, Sociology and Pedagogy, 2011, no. 3. URL: Link (In Russ.)
  9. Kadulin V.E., Klochkova E.N. [The relation between the concepts of information security and cyber security in the contemporary legal environment]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2017, no. S2, pp. 7–10. (In Russ.)
  10. Alpeev A.S. [Terminology of security: Cybersecurity, information security]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2014, no. 5, pp. 39–42. (In Russ.)
  11. Gavrilova E.A. [Research methods for detecting network attacks]. Nauchnye zapiski molodykh issledovatelei = Scientific Notes of Young Scientists, 2017, no. 4, pp. 55–58. URL: Link (In Russ.)
  12. Kuvshinov N.E., Galyautdinov A.A. [Analysis of the malware WannaCry]. Forum molodykh uchenykh = Forum of Young Scientists, 2017, no. 9, pp. 499–503. (In Russ.)
  13. Sulavko A.E. [Technologies of protection against internal threats of information security]. Vestnik Sibirskoi gosudarstvennoi avtomobil'no-dorozhnoi akademii = The Russian Automobile and Highway Industry Journal, 2011, no. 1, pp. 45–51. URL: Link (In Russ.)
  14. Khrustalev E.Yu., Elizarova M.I. [Conceptual foundations formation of information security system for a production enterprise]. Politematicheskii setevoi elektronnyi nauchnyi zhurnal Kubanskogo gosudarstvennogo agrarnogo universiteta, 2017, no. 6, pp. 107–127. (In Russ.) URL: Link
  15. Ivanova E.I., Khrustalev E.Yu. [Embedding information technology into public administration and national security issues]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2008, vol. 4, iss. 2, pp. 70–78. URL: Link (In Russ.)

View all articles of issue

 

ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 20, Iss. 4
April 2024

Archive