Khrustalev E.Yu.Central Economics and Mathematics Institute of Russian Academy of Sciences (CEMI RAS), Moscow, Russian Federation stalev777@yandex.ru ORCID id: not available
Kostyurin G.A.Russian Presidential Academy of National Economy and Public Administration (RANEPA), Moscow, Russian Federation g.kostyurin@yandex.ru ORCID id: not available
Subject The article focuses on issues of the exposure of IT infrastructure to cyber attacks as the global community sees an increasing number of cybercrimes. Objectives The study analyzes and systematized major cyber attacks, which have taken place recently, chronologically. We classify cybercrimes and their consequences, define new recommendations for preventing cybercrimes and improving the cybersecurity level during the global digitization. Methods Research is based on methods of a systems analysis, comparative, structural and logic analysis, econometric analysis, content-analysis, mass media, economic-statistical methods and modeling. Results We arranged major cybersecurity attacks chronologically, classified cybercrimes and their consequences. The article provides the main recommendations for improving the cybersecurity level during the global digitization. Conclusions and Relevance We reviewed key concepts, described forms and types of cyber attacks and focus on global ones. The article also analyzes key triggers of cybercrimes and gives specific recommendations for preventing them.
Keywords: cybersecurity, information security, cyber threat, cyber attack, cybercrime
References:
Bobylev A.E., Trofimova A.V. [Data protection problem on the Internet of Things]. Nauka-Rastudent.ru, 2016, no. 3, p. 25. (In Russ.) URL: Link
Gol'chevskii Yu.V., Filimonova N.A. [An approach to detecting malicious activity on the Internet of Things]. Informatsiya i bezopasnost' = Information and Security, 2017, vol. 20, no. 3, pp. 464–467. (In Russ.)
Vyatkin A.A. [Economic security of electronic payment systems: Mitigation of cybersecurity risks during the time of digital transformation]. Innovatsionnoe razvitie ekonomiki = Innovative Development of Economy, 2018, no. 5, pp. 295–298. (In Russ.)
Alosaimi R., Alnuem M. Risk Management Frameworks for Cloud Computing: A Critical Review. International Journal of Computer Science & Information Technology, 2016, vol. 8, iss. 4. URL: Link
Andreev N.O. [Emergence and growth of threats in IT systems]. Prikladnaya informatika= Applied Informatics, 2006, no. 6, pp. 87–100. (In Russ.)
Turygina V.F., Ford V.F., Matvevnina A.I. [The use of machine learning in cybersecurity]. Nauchnyi al'manakh= Science Almanac, 2017, no. 6-1, pp. 405–408. (In Russ.)
Glotina I.M. [Cybercrime as a shadow business]. Vestnik Chelyabinskogo gosudarstvennogo universiteta= Bulletin of Chelyabinsk State University, 2016, no. 6, pp. 51–57. (In Russ.)
Belova I.V. [The formulation of the concept ‘information security’ in the training course of the discipline “Fundamentals of information security”]. Psikhologiya, sotsiologiya i pedagogika = Psychology, Sociology and Pedagogy, 2011, no. 3. URL: Link (In Russ.)
Kadulin V.E., Klochkova E.N. [The relation between the concepts of information security and cyber security in the contemporary legal environment]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2017, no. S2, pp. 7–10. (In Russ.)
Alpeev A.S. [Terminology of security: Cybersecurity, information security]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2014, no. 5, pp. 39–42. (In Russ.)
Gavrilova E.A. [Research methods for detecting network attacks]. Nauchnye zapiski molodykh issledovatelei = Scientific Notes of Young Scientists, 2017, no. 4, pp. 55–58. URL: Link (In Russ.)
Kuvshinov N.E., Galyautdinov A.A. [Analysis of the malware WannaCry]. Forum molodykh uchenykh = Forum of Young Scientists, 2017, no. 9, pp. 499–503. (In Russ.)
Sulavko A.E. [Technologies of protection against internal threats of information security]. Vestnik Sibirskoi gosudarstvennoi avtomobil'no-dorozhnoi akademii = The Russian Automobile and Highway Industry Journal, 2011, no. 1, pp. 45–51. URL: Link (In Russ.)
Khrustalev E.Yu., Elizarova M.I. [Conceptual foundations formation of information security system for a production enterprise]. Politematicheskii setevoi elektronnyi nauchnyi zhurnal Kubanskogo gosudarstvennogo agrarnogo universiteta, 2017, no. 6, pp. 107–127. (In Russ.) URL: Link
Ivanova E.I., Khrustalev E.Yu. [Embedding information technology into public administration and national security issues]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2008, vol. 4, iss. 2, pp. 70–78. URL: Link (In Russ.)