Cyberattack threat research and protection of personal information.
Keywords:
cyberattack, integrity, availability, confidentiality, authentication, McCumber Cube, CIA Triad, TalkTalk Attack.
Abstract
This article presents the main groups for obtaining cyber access to computer equipment. Direct, electromagnetic, audio and video interception are considered in detail. We've explored the cybersecurity cube and recent cyberattacks, as well as the security of Google's infrastructure for our personal information.
References
Ensuring information security of the state. Textbook / VB Dudykevych, IR Opirsky, PI Garanyuk, VS Zachepylo, AI Partyka. Lviv: Lviv Polytechnic Publishing House, 2017. 204 p.
Fundamentals of information security: textbook. pos. / Dudykevych VB, Khoroshko VO, Yaremchuk YE - Vinnytsia: VNTU, 2018. - 316 p.
Baglay RO Threats to the security of cloud technologies for banks / RO Baglay // Information processing systems. 2018. Vip. 1. pp. 127-135. - Access mode: http://nbuv.gov.ua/UJRN/soi_2018_1_20
Information security. Textbook / Yu. Ya. Bobalo, IV Gorbaty, MD Kiselychnyk, AP Bondarev, SS Voitusik, A. Ya. Gorpenyuk, OA Nemkova, IM Zhuravel , BM Berezyuk, EI Yakovenko, VI Otenko, IY Tyshyk. Lviv: Lviv Polytechnic Publishing House, 2019. 580 p
Lisovska Yu.P. Cybersecurity: risks and measures: textbook. manual. - Kyiv: Condor Publishing House, 2019. - 272 p.
Strategic security of the system "object - information technology" - Monograph. Lviv: Lviv Polytechnic Publishing House, 2020. 260
Miskevich OI, Kokosha MS Application "System Monitor" by means of the QT library. // Scientific journal "Computer-integrated technologies: education, science, production" - Lutsk: LNTU Publishing House. - Vip. 26. - 2017. - P. 138-142.
S.V. Grynyuk, K.Ya. Bortnik, O.I. Miskevych, D.I. Palivoda An overview of tools for creating games on Android. / Computer-integrated technologies: education, science, production. No. 35, Art. 124-128, 2019.
N. A. Khrystynets, A. A. Sakhnyuk, E. A. Sviridyuk, O. I. Miskevich. Use of бem-blocks when creating a site. / Computer-integrated technologies: education, science, production. №35., Art. 206-210, 2019
Miskevich O., Bagniuk, N., Khrystynets, N., Marchevska O. Automation of detection of defective products by machine learning methods. Computer-integrated technologies: education, science, production, №39, 175-180. 2020
Fundamentals of information security: textbook. pos. / Dudykevych VB, Khoroshko VO, Yaremchuk YE - Vinnytsia: VNTU, 2018. - 316 p.
Baglay RO Threats to the security of cloud technologies for banks / RO Baglay // Information processing systems. 2018. Vip. 1. pp. 127-135. - Access mode: http://nbuv.gov.ua/UJRN/soi_2018_1_20
Information security. Textbook / Yu. Ya. Bobalo, IV Gorbaty, MD Kiselychnyk, AP Bondarev, SS Voitusik, A. Ya. Gorpenyuk, OA Nemkova, IM Zhuravel , BM Berezyuk, EI Yakovenko, VI Otenko, IY Tyshyk. Lviv: Lviv Polytechnic Publishing House, 2019. 580 p
Lisovska Yu.P. Cybersecurity: risks and measures: textbook. manual. - Kyiv: Condor Publishing House, 2019. - 272 p.
Strategic security of the system "object - information technology" - Monograph. Lviv: Lviv Polytechnic Publishing House, 2020. 260
Miskevich OI, Kokosha MS Application "System Monitor" by means of the QT library. // Scientific journal "Computer-integrated technologies: education, science, production" - Lutsk: LNTU Publishing House. - Vip. 26. - 2017. - P. 138-142.
S.V. Grynyuk, K.Ya. Bortnik, O.I. Miskevych, D.I. Palivoda An overview of tools for creating games on Android. / Computer-integrated technologies: education, science, production. No. 35, Art. 124-128, 2019.
N. A. Khrystynets, A. A. Sakhnyuk, E. A. Sviridyuk, O. I. Miskevich. Use of бem-blocks when creating a site. / Computer-integrated technologies: education, science, production. №35., Art. 206-210, 2019
Miskevich O., Bagniuk, N., Khrystynets, N., Marchevska O. Automation of detection of defective products by machine learning methods. Computer-integrated technologies: education, science, production, №39, 175-180. 2020
Abstract views: 0 PDF Downloads: 0
Published
2021-12-24
How to Cite
Miskevich , O. (2021). Cyberattack threat research and protection of personal information . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (45), 84-89. https://doi.org/10.36910/6775-2524-0560-2021-45-12
Section
Computer science and computer engineering