ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK
The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
National Defence University of Ukraine named after Ivan Cherniakhovsky
2018-08-01
|
Series: | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
Subjects: | |
Online Access: | http://sit.nuou.org.ua/article/view/157590 |
id |
doaj-f8b0091093a245768fe2097e3f530dea |
---|---|
record_format |
Article |
spelling |
doaj-f8b0091093a245768fe2097e3f530dea2020-11-25T01:18:43ZengNational Defence University of Ukraine named after Ivan CherniakhovskySučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni 2311-72492410-73362018-08-0102(32)1316157590ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORKOleksiy Y. Cherednychenko0Vitaliy V. Fesokha1Yurii O. Protsiuk2Tetyana V. Bondarenko3Military Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutMilitary Institute of Telecommunications and Informatization named after Heroiv KrutThe rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development of a new threat - cybernetic interventions, which are understood as actions in cyberspace directed against the information and telecommunications network with the aim of influencing it by disrupting its functioning, gaining control over the network, copy, delete, damage, insert or destroy data, create conditions for changing user behavior. In Ukraine, from 2014 to 2017, a number of cybernetic interventions were carried out, which were widely publicized both in the country and in the world. In the context of the globalization of information processes and their integration into various spheres of public life, the leadership of the leading states of the world pays special attention to the creation and improvement of effective systems for protecting critical infrastructure against external and internal cyber threats. Therefore, it will be expedient to analyze the widespread cybernetic interventions that have been carried out on the territory of Ukraine and to consider existing methods and methods of preventing cybernetic interventions, as well as to offer a method and scheme for protection from cybernetic interventions.http://sit.nuou.org.ua/article/view/157590cybernetic interventionscyberattackfirewallips/idscybersecuritycyberdefense |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Oleksiy Y. Cherednychenko Vitaliy V. Fesokha Yurii O. Protsiuk Tetyana V. Bondarenko |
spellingShingle |
Oleksiy Y. Cherednychenko Vitaliy V. Fesokha Yurii O. Protsiuk Tetyana V. Bondarenko ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni cybernetic interventions cyberattack firewall ips/ids cybersecurity cyberdefense |
author_facet |
Oleksiy Y. Cherednychenko Vitaliy V. Fesokha Yurii O. Protsiuk Tetyana V. Bondarenko |
author_sort |
Oleksiy Y. Cherednychenko |
title |
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK |
title_short |
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK |
title_full |
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK |
title_fullStr |
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK |
title_full_unstemmed |
ANALYSIS OF EXISTING APPROACHES TO COUNTER THE MOST COMMON CYBERNETIC INTERVENTIONS IN INFORMATION AND TELECOMMUNICATIONS NETWORK |
title_sort |
analysis of existing approaches to counter the most common cybernetic interventions in information and telecommunications network |
publisher |
National Defence University of Ukraine named after Ivan Cherniakhovsky |
series |
Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
issn |
2311-7249 2410-7336 |
publishDate |
2018-08-01 |
description |
The rapid development of information and communication technologies and the global Internet opens up many new opportunities in all spheres of human life and in the country as a whole. On the other hand, the use of computers, mobile gadgets and other digital devices has contributed to the development of a new threat - cybernetic interventions, which are understood as actions in cyberspace directed against the information and telecommunications network with the aim of influencing it by disrupting its functioning, gaining control over the network, copy, delete, damage, insert or destroy data, create conditions for changing user behavior. In Ukraine, from 2014 to 2017, a number of cybernetic interventions were carried out, which were widely publicized both in the country and in the world.
In the context of the globalization of information processes and their integration into various spheres of public life, the leadership of the leading states of the world pays special attention to the creation and improvement of effective systems for protecting critical infrastructure against external and internal cyber threats. Therefore, it will be expedient to analyze the widespread cybernetic interventions that have been carried out on the territory of Ukraine and to consider existing methods and methods of preventing cybernetic interventions, as well as to offer a method and scheme for protection from cybernetic interventions. |
topic |
cybernetic interventions cyberattack firewall ips/ids cybersecurity cyberdefense |
url |
http://sit.nuou.org.ua/article/view/157590 |
work_keys_str_mv |
AT oleksiyycherednychenko analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork AT vitaliyvfesokha analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork AT yuriioprotsiuk analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork AT tetyanavbondarenko analysisofexistingapproachestocounterthemostcommoncyberneticinterventionsininformationandtelecommunicationsnetwork |
_version_ |
1725140856122376192 |