ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
National Defence University of Ukraine named after Ivan Cherniakhovsky
2018-08-01
|
Series: | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
Subjects: | |
Online Access: | http://sit.nuou.org.ua/article/view/157590 |
Summary: | The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development of a new threat - cybernetic interventions, which are understood as actions in cyberspace directed against the information and telecommunications network with the aim of influencing it by disrupting its functioning, gaining control over the network, copy, delete, damage, insert or destroy data, create conditions for changing user behavior. In Ukraine, from 2014 to 2017, a number of cybernetic interventions were carried out, which were widely publicized both in the country and in the world.
In the context of the globalization of information processes and their integration into various spheres of public life, the leadership of the leading states of the world pays special attention to the creation and improvement of effective systems for protecting critical infrastructure against external and internal cyber threats. Therefore, it will be expedient to analyze the widespread cybernetic interventions that have been carried out on the territory of Ukraine and to consider existing methods and methods of preventing cybernetic interventions, as well as to offer a method and scheme for protection from cybernetic interventions. |
---|---|
ISSN: | 2311-7249 2410-7336 |