+7 925 966 4690, 9am6pm (GMT+3), Monday – Friday
ИД «Финансы и кредит»






National Interests: Priorities and Security

Cybersecurity threats: Triggers and prevention recommendations

Vol. 15, Iss. 6, JUNE 2019

Received: 21 March 2019

Received in revised form: 10 April 2019

Accepted: 25 April 2019

Available online: 17 June 2019


JEL Classification: F52, H56, J28, M15, N10

Pages: 1185–1194


Khrustalev E.Yu. Central Economics and Mathematics Institute of Russian Academy of Sciences (CEMI RAS), Moscow, Russian Federation

ORCID id: not available

Kostyurin G.A. Russian Presidential Academy of National Economy and Public Administration (RANEPA), Moscow, Russian Federation

ORCID id: not available

Subject The article focuses on issues of the exposure of IT infrastructure to cyber attacks as the global community sees an increasing number of cybercrimes.
Objectives The study analyzes and systematized major cyber attacks, which have taken place recently, chronologically. We classify cybercrimes and their consequences, define new recommendations for preventing cybercrimes and improving the cybersecurity level during the global digitization.
Methods Research is based on methods of a systems analysis, comparative, structural and logic analysis, econometric analysis, content-analysis, mass media, economic-statistical methods and modeling.
Results We arranged major cybersecurity attacks chronologically, classified cybercrimes and their consequences. The article provides the main recommendations for improving the cybersecurity level during the global digitization.
Conclusions and Relevance We reviewed key concepts, described forms and types of cyber attacks and focus on global ones. The article also analyzes key triggers of cybercrimes and gives specific recommendations for preventing them.

Keywords: cybersecurity, information security, cyber threat, cyber attack, cybercrime


  1. Bobylev A.E., Trofimova A.V. [Data protection problem on the Internet of Things]. Nauka-Rastudent.ru, 2016, no. 3, p. 25. (In Russ.) URL: Link
  2. Gol'chevskii Yu.V., Filimonova N.A. [An approach to detecting malicious activity on the Internet of Things]. Informatsiya i bezopasnost' = Information and Security, 2017, vol. 20, no. 3, pp. 464–467. (In Russ.)
  3. Vyatkin A.A. [Economic security of electronic payment systems: Mitigation of cybersecurity risks during the time of digital transformation]. Innovatsionnoe razvitie ekonomiki = Innovative Development of Economy, 2018, no. 5, pp. 295–298. (In Russ.)
  4. Alosaimi R., Alnuem M. Risk Management Frameworks for Cloud Computing: A Critical Review. International Journal of Computer Science & Information Technology, 2016, vol. 8, iss. 4. URL: Link
  5. Andreev N.O. [Emergence and growth of threats in IT systems]. Prikladnaya informatika = Applied Informatics, 2006, no. 6, pp. 87–100. (In Russ.)
  6. Turygina V.F., Ford V.F., Matvevnina A.I. [The use of machine learning in cybersecurity]. Nauchnyi al'manakh = Science Almanac, 2017, no. 6-1, pp. 405–408. (In Russ.)
  7. Glotina I.M. [Cybercrime as a shadow business]. Vestnik Chelyabinskogo gosudarstvennogo universiteta = Bulletin of Chelyabinsk State University, 2016, no. 6, pp. 51–57. (In Russ.)
  8. Belova I.V. [The formulation of the concept ‘information security’ in the training course of the discipline “Fundamentals of information security”]. Psikhologiya, sotsiologiya i pedagogika = Psychology, Sociology and Pedagogy, 2011, no. 3. URL: Link (In Russ.)
  9. Kadulin V.E., Klochkova E.N. [The relation between the concepts of information security and cyber security in the contemporary legal environment]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2017, no. S2, pp. 7–10. (In Russ.)
  10. Alpeev A.S. [Terminology of security: Cybersecurity, information security]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2014, no. 5, pp. 39–42. (In Russ.)
  11. Gavrilova E.A. [Research methods for detecting network attacks]. Nauchnye zapiski molodykh issledovatelei = Scientific Notes of Young Scientists, 2017, no. 4, pp. 55–58. URL: Link (In Russ.)
  12. Kuvshinov N.E., Galyautdinov A.A. [Analysis of the malware WannaCry]. Forum molodykh uchenykh = Forum of Young Scientists, 2017, no. 9, pp. 499–503. (In Russ.)
  13. Sulavko A.E. [Technologies of protection against internal threats of information security]. Vestnik Sibirskoi gosudarstvennoi avtomobil'no-dorozhnoi akademii = The Russian Automobile and Highway Industry Journal, 2011, no. 1, pp. 45–51. URL: Link (In Russ.)
  14. Khrustalev E.Yu., Elizarova M.I. [Conceptual foundations formation of information security system for a production enterprise]. Politematicheskii setevoi elektronnyi nauchnyi zhurnal Kubanskogo gosudarstvennogo agrarnogo universiteta, 2017, no. 6, pp. 107–127. (In Russ.) URL: Link
  15. Ivanova E.I., Khrustalev E.Yu. [Embedding information technology into public administration and national security issues]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2008, vol. 4, iss. 2, pp. 70–78. URL: Link (In Russ.)

View all articles of issue


ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 19, Iss. 1
January 2023