The influence of different forms of cyber threats on the stability of information systems: analysis and protection strategies

  • Yevhenii Osadchyi V. N. Karazin Kharkiv National University
  • Maryna Yesina V. N. Karazin Kharkiv National University https://orcid.org/0000-0002-1252-7606
  • Victor Onoprienko JSC "IIT", Kharkiv
Keywords: resilience of information systems, protection strategies, cyber threat

Abstract

This work is dedicated to the further investigation of cybersecurity issues in the context of the ongoing development of the current information industry. Starting with an overview of various forms of cyber threats, the article examines the analysis of their impact on the privacy, integrity and availability of information. The critical dependence of modern society on information technology makes the topic of protection against cyber threats extremely relevant. This work offers an in-depth analysis of the growth in the number and complexity of cyber threats, which requires constant improvement and updating of protection strategies against them. An important stage of coverage of the topic is the analysis of the impact of various forms of cyber threats on information systems. The main types of phishing and social engineering are considered, as well as the consequences of exposure to viruses, Trojans and other malicious programs. A detailed review of these aspects allows us to highlight the key issues and dangers that arise in the context of cyber threats. Also, the article contains materials devoted to various protection strategies. It examines effective strategies for protecting information systems, including identifying vulnerabilities, using multi-factor authentication, and measures to ensure resilience. The general conclusions of this work summarize the need for constant updating and adaptation of protection strategies in relation to the growing complexity of cyber threats in the world of rapid technological development. In general, this work is another step in understanding the essence of the challenges associated with the issue of ensuring cyber security in the modern information society.

 

Downloads

Download data is not yet available.

Author Biographies

Yevhenii Osadchyi , V. N. Karazin Kharkiv National University

Computer science student (Bachelor's Degree)

Maryna Yesina , V. N. Karazin Kharkiv National University

Associate Professor, department of security of information systems and technologies

Victor Onoprienko, JSC "IIT", Kharkiv

Ph.D.,  JSC "IIT", Kharkiv

References

Jon Erickson (2010). "Hacking: The Art of Exploitation"

Edward Amoroso. (2010). "Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare"

P. W. Singer & Allan Friedman (2014). "Cybersecurity and Cyberwar: What Everyone Needs to Know"

International Journal of Computer Science and Information Technologies “Cybersecurity: A Journal of Technology, Society and Policy”.

Published
2024-01-07
Cited
How to Cite
Osadchyi , Y., Yesina , M., & Onoprienko, V. (2024). The influence of different forms of cyber threats on the stability of information systems: analysis and protection strategies. Computer Science and Cybersecurity, (2), 71-79. Retrieved from https://periodicals.karazin.ua/cscs/article/view/23123
Section
Статті