Information security: key threats and remedies.

  • I. Andrushchak LNTU
  • V. Koshelyuk LNTU
  • А. Yashchuk LNTU
  • M Poteychuk LNTU
  • V. Martsenyuk LNTU
Keywords: The article gives the justification for conducting an informational analysis of trends in the development of cyber attacks. Allocated factors that are most likely to be most affected by fluctuations in the intensity of attacks. The analysis of the factors influencing the number of cyber attacks on the information-free web-resources over the past few years has been carried out. The conclusions about the obtained results are made and the ways of increasing the reliability of the results in further research are substantiated.

Abstract

The article gives the justification for conducting an informational analysis of trends in the development of cyber attacks. Allocated factors that are most likely to be most affected by fluctuations in the intensity of attacks. The analysis of the factors influencing the number of cyber attacks on the information-free web-resources over the past few years has been carried out. The conclusions about the obtained results are made and the ways of increasing the reliability of the results in further research are substantiated.

References

Alders, R. IT Outsourcing: A Practical Guide / R. Alders; trans. with English. - M.: Alpina Business Books, 2003. - 300 p.

Agapov V., Yakovlev S., Pratusevich V. Review and assessment of the prospects for the development of the world and Russian information technology markets [Electronic resource] // URL: http://www.moex.com/n8686/?nt=106.

Buryachok, V. L. Information and cyber security: the socio-technical aspect: a textbook / [V. L. Buryachok, V. B. Tolubko, V. O. Khoroshko, S. V. Tolyuta]; Per unit edit V. B. Tolubka. - K .: DUT, 2015. - 288 p.

Brenner S. Cyber Threats: The Emerging Fault Lines of the Nation State. oxford University Press, 2009.

Janczewski L., Colarik A. Cyber Warfare and Cyber Terrorism. Hershey, N.Y.: Information Science Reference, 2008.

The Law of Ukraine "On the Basic Principles for the Cybersecurity of Ukraine" - Information from the Verkhovna Rada (VVR), 2017, No. 45, item 403.

Heywood, J. Bryan Outsourcing: In Search of Competitive Advantages / J. Bryan Heywood; trans. with English. - M.: Publishing house "Williams", 2004. - 176 p.

Tyutina M.V. Analysis and prospects for the development of the information technology market [Text] // Innovative economics: materials IV Intern. sci. Conf. (Kazan, October 2017). - Kazan: Beech, 2017. - P. 9-13.

Rid Th. Cyber War Will Not Take Place // Journal of Strategic Studies. 2011.

Owens L.L. Justice and Warfare in Cyberspace // Boston Review. A Political and Literature Forum. [Electronic resource] URL: http://bostonreview.net/us/ lisa-lucile-owens-cyber-warfare-national-security.


Abstract views: 6
PDF Downloads: 4
Published
2020-01-23
How to Cite
Andrushchak, I., Koshelyuk, V., YashchukА., Poteychuk, M., & Martsenyuk, V. (2020). Information security: key threats and remedies. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (35), 5-9. Retrieved from http://cit-journal.com.ua/index.php/cit/article/view/50