logo logo


Economic aspects of information protection under present large-scale cyber-attacks conditions

НазваEconomic aspects of information protection under present large-scale cyber-attacks conditions
Назва англійськоюEconomic aspects of information protection under present large-scale cyber-attacks conditions
АвториRuslana Prus, Svitlana Yatsyuk, Ludmila Hlynchuk, Vadim Mulyar
ПринадлежністьLesya Ukrainka Volyn National University, Lutsk, Ukraine
Бібліографічний описEconomic aspects of information protection under present large-scale cyber-attacks conditions / Ruslana Prus, Svitlana Yatsyuk, Ludmila Hlynchuk, Vadim Mulyar // Scientific Journal of TNTU. — Tern.: TNTU, 2022. — Vol 106. — No 2. — P. 63–74.
Bibliographic description:Prus R., Yatsyuk S., Hlynchuk L., Mulyar V. (2022) Economic aspects of information protection under present large-scale cyber-attacks conditions. Scientific Journal of TNTU (Tern.), vol 106, no 2, pp. 63–74.
УДК

1:316.4

Ключові слова

attack, security, cyber attack, information, electronic information, malicious software.

The main attacks that have caused irreparable damage to enterprises and organizations around the world in recent years and radically changed the attitude to cyber-attacks and the fight against them are analyzed; systematized scientific and technical prerequisites for the security of information technology; substantiated the tasks facing the developers of modern information systems; the consequences of attacks on information are investigated and the main factors influencing financial losses due to security breaches are identified.

ISSN:2522-4433
Перелік літератури
  1. Information technology. Security techniques. Information security management systems – Requirements: ISO/IEC 27001:2017.
  2. Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
  3. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.com.ua/downloads/1.1-003-99.pdf.
  4. Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
  5. FBI/IC3: 2016 Internet Crime Report.
  6. Ponemon Institute, 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
  7. Ponemon Institute, 2018 Cost of Data Breach Study: Impact of Business Continuity Management – Research Report, 2018.
  8. Ponemon Institute, Cost of a Data Breach Report 2019 – Research Report, 2019.
  9. Ponemon Institute, Key findings from the 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
  10. Domarev V. V. Bezopasnost ynformatsyonnыkh tekhnolohyi. Systemnыi pokhod. K.: TYD DS, 2004. Р. 655.
  11. Zubok M. I. Osnovy bezpeky komertsiinoi diialnosti pidpryiemstv ta bankiv. K.: KNTEU, 2005. Р. 135.
  12. Kopytin Yu. V. Model strakhuvannia ryzykiv informatsiinoi bezpeky. “Tsyfrovi tekhnolohii|. 2010. No. 8. P. 99.
  13. Levchenko Ye. H., Prus R. B., Rabchun D. I. Pokaznyky bahatostupinchastykh system zakhystu informatsii. Visnyk Inzhenernoi akademii Ukrainy. 2009. No. 1. P. 128–133.
  14. Odarchenko R/ S., Lukin S. Yu. Ekonomichna efektyvnist vprovadzhennia system zakhystu stilnykovykh merezh 4G. “Systemy obrobky informatsii”. 2012. Vypusk 4 (102). Tom 2. P. 52.
References:
  1. Information technology. Security techniques. Information security management systems – Requirements: ISO/IEC 27001:2017.
  2. Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
  3. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.com.ua/downloads/1.1-003-99.pdf.
  4. Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
  5. FBI/IC3: 2016 Internet Crime Report.
  6. Ponemon Institute, 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
  7. Ponemon Institute, 2018 Cost of Data Breach Study: Impact of Business Continuity Management – Research Report, 2018.
  8. Ponemon Institute, Cost of a Data Breach Report 2019 – Research Report, 2019.
  9. Ponemon Institute, Key findings from the 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
  10. Domarev V. V. Bezopasnost ynformatsyonnыkh tekhnolohyi. Systemnыi pokhod. K.: TYD DS, 2004. Р. 655.
  11. Zubok M. I. Osnovy bezpeky komertsiinoi diialnosti pidpryiemstv ta bankiv. K.: KNTEU, 2005. Р. 135.
  12. Kopytin Yu. V. Model strakhuvannia ryzykiv informatsiinoi bezpeky. “Tsyfrovi tekhnolohii|. 2010. No. 8. P. 99.
  13. Levchenko Ye. H., Prus R. B., Rabchun D. I. Pokaznyky bahatostupinchastykh system zakhystu informatsii. Visnyk Inzhenernoi akademii Ukrainy. 2009. No. 1. P. 128–133.
  14. Odarchenko R/ S., Lukin S. Yu. Ekonomichna efektyvnist vprovadzhennia system zakhystu stilnykovykh merezh 4G. “Systemy obrobky informatsii”. 2012. Vypusk 4 (102). Tom 2. P. 52.
Завантажити

Всі права захищено © 2019. Тернопільський національний технічний університет імені Івана Пулюя.