The influence of different forms of cyber threats on the stability of information systems: analysis and protection strategies
Abstract
This work is dedicated to the further investigation of cybersecurity issues in the context of the ongoing development of the current information industry. Starting with an overview of various forms of cyber threats, the article examines the analysis of their impact on the privacy, integrity and availability of information. The critical dependence of modern society on information technology makes the topic of protection against cyber threats extremely relevant. This work offers an in-depth analysis of the growth in the number and complexity of cyber threats, which requires constant improvement and updating of protection strategies against them. An important stage of coverage of the topic is the analysis of the impact of various forms of cyber threats on information systems. The main types of phishing and social engineering are considered, as well as the consequences of exposure to viruses, Trojans and other malicious programs. A detailed review of these aspects allows us to highlight the key issues and dangers that arise in the context of cyber threats. Also, the article contains materials devoted to various protection strategies. It examines effective strategies for protecting information systems, including identifying vulnerabilities, using multi-factor authentication, and measures to ensure resilience. The general conclusions of this work summarize the need for constant updating and adaptation of protection strategies in relation to the growing complexity of cyber threats in the world of rapid technological development. In general, this work is another step in understanding the essence of the challenges associated with the issue of ensuring cyber security in the modern information society.
Downloads
References
Jon Erickson (2010). "Hacking: The Art of Exploitation" https://www.oreilly.com/library/view/hacking-the-art/9781593271442/pr01.xhtml
Edward Amoroso. (2010). "Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare" ISBN-13: 978-1-4822-3923-2
P.W. Singer та Allan Friedman (2014). "Cybersecurity and Cyberwar: What Everyone Needs to Know" https://www.amazon.com/Cybersecurity-Cyberwar-Everyone-Needs-Know%C2%AE/dp/0199918112
International Journal of Computer Science and Information Technologies “Cybersecurity: A Journal of Technology, Society and Policy”. https://portal.issn.org/resource/issn/0975-9646