|
|
Economic aspects of information protection under present large-scale cyber-attacks conditions
Назва | Economic aspects of information protection under present large-scale cyber-attacks conditions |
Назва англійською | Economic aspects of information protection under present large-scale cyber-attacks conditions |
Автори | Ruslana Prus, Svitlana Yatsyuk, Ludmila Hlynchuk, Vadim Mulyar |
Принадлежність | Lesya Ukrainka Volyn National University, Lutsk, Ukraine |
Бібліографічний опис | Economic aspects of information protection under present large-scale cyber-attacks conditions / Ruslana Prus, Svitlana Yatsyuk, Ludmila Hlynchuk, Vadim Mulyar // Scientific Journal of TNTU. — Tern.: TNTU, 2022. — Vol 106. — No 2. — P. 63–74. |
Bibliographic description: | Prus R., Yatsyuk S., Hlynchuk L., Mulyar V. (2022) Economic aspects of information protection under present large-scale cyber-attacks conditions. Scientific Journal of TNTU (Tern.), vol 106, no 2, pp. 63–74. |
DOI: | https://doi.org/10.33108/visnyk_tntu2022.02.063 |
УДК |
1:316.4 |
Ключові слова |
attack, security, cyber attack, information, electronic information, malicious software. |
|
The main attacks that have caused irreparable damage to enterprises and organizations around the world in recent years and radically changed the attitude to cyber-attacks and the fight against them are analyzed; systematized scientific and technical prerequisites for the security of information technology; substantiated the tasks facing the developers of modern information systems; the consequences of attacks on information are investigated and the main factors influencing financial losses due to security breaches are identified. |
ISSN: | 2522-4433 |
Перелік літератури |
-
Information technology. Security techniques. Information security management systems – Requirements: ISO/IEC 27001:2017.
-
Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
-
Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.com.ua/downloads/1.1-003-99.pdf.
-
Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
-
FBI/IC3: 2016 Internet Crime Report.
-
Ponemon Institute, 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
-
Ponemon Institute, 2018 Cost of Data Breach Study: Impact of Business Continuity Management – Research Report, 2018.
-
Ponemon Institute, Cost of a Data Breach Report 2019 – Research Report, 2019.
-
Ponemon Institute, Key findings from the 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
-
Domarev V. V. Bezopasnost ynformatsyonnыkh tekhnolohyi. Systemnыi pokhod. K.: TYD DS, 2004. Р. 655.
-
Zubok M. I. Osnovy bezpeky komertsiinoi diialnosti pidpryiemstv ta bankiv. K.: KNTEU, 2005. Р. 135.
-
Kopytin Yu. V. Model strakhuvannia ryzykiv informatsiinoi bezpeky. “Tsyfrovi tekhnolohii|. 2010. No. 8. P. 99.
-
Levchenko Ye. H., Prus R. B., Rabchun D. I. Pokaznyky bahatostupinchastykh system zakhystu informatsii. Visnyk Inzhenernoi akademii Ukrainy. 2009. No. 1. P. 128–133.
-
Odarchenko R/ S., Lukin S. Yu. Ekonomichna efektyvnist vprovadzhennia system zakhystu stilnykovykh merezh 4G. “Systemy obrobky informatsii”. 2012. Vypusk 4 (102). Tom 2. P. 52.
|
References: |
-
Information technology. Security techniques. Information security management systems – Requirements: ISO/IEC 27001:2017.
-
Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
-
Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.com.ua/downloads/1.1-003-99.pdf.
-
Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
-
FBI/IC3: 2016 Internet Crime Report.
-
Ponemon Institute, 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
-
Ponemon Institute, 2018 Cost of Data Breach Study: Impact of Business Continuity Management – Research Report, 2018.
-
Ponemon Institute, Cost of a Data Breach Report 2019 – Research Report, 2019.
-
Ponemon Institute, Key findings from the 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
-
Domarev V. V. Bezopasnost ynformatsyonnыkh tekhnolohyi. Systemnыi pokhod. K.: TYD DS, 2004. Р. 655.
-
Zubok M. I. Osnovy bezpeky komertsiinoi diialnosti pidpryiemstv ta bankiv. K.: KNTEU, 2005. Р. 135.
-
Kopytin Yu. V. Model strakhuvannia ryzykiv informatsiinoi bezpeky. “Tsyfrovi tekhnolohii|. 2010. No. 8. P. 99.
-
Levchenko Ye. H., Prus R. B., Rabchun D. I. Pokaznyky bahatostupinchastykh system zakhystu informatsii. Visnyk Inzhenernoi akademii Ukrainy. 2009. No. 1. P. 128–133.
-
Odarchenko R/ S., Lukin S. Yu. Ekonomichna efektyvnist vprovadzhennia system zakhystu stilnykovykh merezh 4G. “Systemy obrobky informatsii”. 2012. Vypusk 4 (102). Tom 2. P. 52.
|
Завантажити | |
|