ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK

The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development...

Full description

Bibliographic Details
Main Authors: Oleksiy Y. Cherednychenko, Vitaliy V. Fesokha, Yurii O. Protsiuk, Tetyana V. Bondarenko
Format: Article
Language:English
Published: National Defence University of Ukraine named after Ivan Cherniakhovsky 2018-08-01
Series:Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
Subjects:
Online Access:http://sit.nuou.org.ua/article/view/157590
id doaj-f8b0091093a245768fe2097e3f530dea
record_format Article
spelling doaj-f8b0091093a245768fe2097e3f530dea2020-11-25T01:18:43ZengNational Defence University of Ukraine named after Ivan CherniakhovskySučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni 2311-72492410-73362018-08-0102(32)1316157590ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORKOleksiy Y. Cherednychenko0Vitaliy V. Fesokha1Yurii O. Protsiuk2Tetyana V. Bondarenko3Military Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutThe rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development of a new threat - cybernetic interventions, which are understood as actions in cyberspace directed against the information and telecommunications network with the aim of influencing it by disrupting its functioning, gaining control over the network, copy, delete, damage, insert or destroy data, create conditions for changing user behavior. In Ukraine, from 2014 to 2017, a number of cybernetic interventions were carried out, which were widely publicized both in the country and in the world. In the context of the globalization of information processes and their integration into various spheres of public life, the leadership of the leading states of the world pays special attention to the creation and improvement of effective systems for protecting critical infrastructure against external and internal cyber threats. Therefore, it will be expedient to analyze the widespread cybernetic interventions that have been carried out on the territory of Ukraine and to consider existing methods and methods of preventing cybernetic interventions, as well as to offer a method and scheme for protection from cybernetic interventions.http://sit.nuou.org.ua/article/view/157590cybernetic interventionscyberattackfirewallips/idscybersecuritycyberdefense
collection DOAJ
language English
format Article
sources DOAJ
author Oleksiy Y. Cherednychenko
Vitaliy V. Fesokha
Yurii O. Protsiuk
Tetyana V. Bondarenko
spellingShingle Oleksiy Y. Cherednychenko
Vitaliy V. Fesokha
Yurii O. Protsiuk
Tetyana V. Bondarenko
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
cybernetic interventions
cyberattack
firewall
ips/ids
cybersecurity
cyberdefense
author_facet Oleksiy Y. Cherednychenko
Vitaliy V. Fesokha
Yurii O. Protsiuk
Tetyana V. Bondarenko
author_sort Oleksiy Y. Cherednychenko
title ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
title_short ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
title_full ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
title_fullStr ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
title_full_unstemmed ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
title_sort analysis of existing approaches to counter the most common cybernetic interventions in information and telecommunications network
publisher National Defence University of Ukraine named after Ivan Cherniakhovsky
series Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
issn 2311-7249
2410-7336
publishDate 2018-08-01
description The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development of a new threat - cybernetic interventions, which are understood as actions in cyberspace directed against the information and telecommunications network with the aim of influencing it by disrupting its functioning, gaining control over the network, copy, delete, damage, insert or destroy data, create conditions for changing user behavior. In Ukraine, from 2014 to 2017, a number of cybernetic interventions were carried out, which were widely publicized both in the country and in the world. In the context of the globalization of information processes and their integration into various spheres of public life, the leadership of the leading states of the world pays special attention to the creation and improvement of effective systems for protecting critical infrastructure against external and internal cyber threats. Therefore, it will be expedient to analyze the widespread cybernetic interventions that have been carried out on the territory of Ukraine and to consider existing methods and methods of preventing cybernetic interventions, as well as to offer a method and scheme for protection from cybernetic interventions.
topic cybernetic interventions
cyberattack
firewall
ips/ids
cybersecurity
cyberdefense
url http://sit.nuou.org.ua/article/view/157590
work_keys_str_mv AT oleksiyycherednychenko analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork
AT vitaliyvfesokha analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork
AT yuriioprotsiuk analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork
AT tetyanavbondarenko analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork
_version_ 1725140856122376192