Cyberattack threat research and protection of personal information.

Keywords: cyberattack, integrity, availability, confidentiality, authentication, McCumber Cube, CIA Triad, TalkTalk Attack.


This article presents the main groups for obtaining cyber access to computer equipment. Direct, electromagnetic, audio and video interception are considered in detail. We've explored the cybersecurity cube and recent cyberattacks, as well as the security of Google's infrastructure for our personal information.


Ensuring information security of the state. Textbook / VB Dudykevych, IR Opirsky, PI Garanyuk, VS Zachepylo, AI Partyka. Lviv: Lviv Polytechnic Publishing House, 2017. 204 p.

Fundamentals of information security: textbook. pos. / Dudykevych VB, Khoroshko VO, Yaremchuk YE - Vinnytsia: VNTU, 2018. - 316 p.

Baglay RO Threats to the security of cloud technologies for banks / RO Baglay // Information processing systems. 2018. Vip. 1. pp. 127-135. - Access mode:

Information security. Textbook / Yu. Ya. Bobalo, IV Gorbaty, MD Kiselychnyk, AP Bondarev, SS Voitusik, A. Ya. Gorpenyuk, OA Nemkova, IM Zhuravel , BM Berezyuk, EI Yakovenko, VI Otenko, IY Tyshyk. Lviv: Lviv Polytechnic Publishing House, 2019. 580 p

Lisovska Yu.P. Cybersecurity: risks and measures: textbook. manual. - Kyiv: Condor Publishing House, 2019. - 272 p.

Strategic security of the system "object - information technology" - Monograph. Lviv: Lviv Polytechnic Publishing House, 2020. 260

Miskevich OI, Kokosha MS Application "System Monitor" by means of the QT library. // Scientific journal "Computer-integrated technologies: education, science, production" - Lutsk: LNTU Publishing House. - Vip. 26. - 2017. - P. 138-142.

S.V. Grynyuk, K.Ya. Bortnik, O.I. Miskevych, D.I. Palivoda An overview of tools for creating games on Android. / Computer-integrated technologies: education, science, production. No. 35, Art. 124-128, 2019.

N. A. Khrystynets, A. A. Sakhnyuk, E. A. Sviridyuk, O. I. Miskevich. Use of бem-blocks when creating a site. / Computer-integrated technologies: education, science, production. №35., Art. 206-210, 2019

Miskevich O., Bagniuk, N., Khrystynets, N., Marchevska O. Automation of detection of defective products by machine learning methods. Computer-integrated technologies: education, science, production, №39, 175-180. 2020

Abstract views: 0
PDF Downloads: 0
How to Cite
Miskevich , O. (2021). Cyberattack threat research and protection of personal information . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (45), 84-89.
Computer science and computer engineering