Author:
Kochetkova Natal'ya Pavlovna
Abstract
The subject of the study is cybersecurity, within the framework of the modern changing conditions of the information space, which is filled with such phenomena as the metaverse and the digital world. These systems create new threats and problems in the processing, transmission, preservation and confidentiality of data. Assuming that the intersection of cybersecurity, digital transformation (including the metaverse and the digital world) and phenomenological analysis is an important area of research, the paper examines aspects of building cybersecurity in the country. The merger itself is seen as a centrifugal current that cannot be stopped, but must be regulated, which suggests that the transformation of approaches to cybersecurity plays a crucial role in developing effective strategies to overcome the problems that arise in a rapidly changing digital landscape. The research methods are based on data collection, analysis and synthesis, which revealed key problems. The key method is a phenomenological analysis of the ongoing changes in the information sphere associated with the spread of the phenomena of the metaverse and the digital world, which made it possible to reflect the problems of information processing and insecurity from malicious attacks and propose a new approach to the formation of a cybersecurity system. The scientific novelty of the article lies in an integrated approach to studying the relationship of cybersecurity, the evolution of the information space and such new concepts, like the metaverse and the digital world. The transition to the latter is the next stage in the development of the information space, which can be traced in the gradual expansion of ecosystems and personal information platforms. All this suggests the need to expand the system of providing personal information, as well as data that gets into unsecured information networks. At the same time, domestic cybersecurity systems are being criticized, which indicates the need to find new solutions. One of these options may be a phenomenological approach to the study of data. The study shows how the use of phenomenological research methods allows us to take a fresh look at the capabilities of domestic developers to strengthen cybersecurity measures and adapt them to rapidly changing digital landscapes.
Reference20 articles.
1. Sarker I.H. Cybersecurity and threat analysis based on artificial intelligence//Discover Artificial Intelligence. 2024. Volume 4, No.1. rr.129-140"i"."/i" DOI: 10.1007/s44163-024-00129-0
2. Annaeva A. R., Ashirov G. D., Ataev G. N., Babaev N. B. Analiz aktual'nykh kiberugroz i metodov zashchity personal'nykh dannykh v tsifrovom mire //IN SITU. 2023.№10. s.16-20
3. Sinitsyn A., Kovaleva E. Tendentsii i vyzovy v oblasti internet-bezopasnosti i zashchity meditsinskikh dannykh//Mezhdunarodnyi zhurnal Kiberbezopasnost' i Kriptografiya. 2019. № 7(4). s.112-129
4. Yazgeldiev Sh., Kerimov A., Babaniyazov B. Internet-bezopasnost' i zashchita personal'nykh dannykh: tendentsii i vyzovy v tsifoirov epokhe//IN SITU. 2023. №7. s. 11-13
5. Khoreva L. V., Kuchumov A. V., Shraer A. V. Transformatsiya puti sovremennogo potrebitelya turistskikh uslug v fidzhital-srede // Professorskii zhurnal. Seriya: Rekreatsiya i turizm. 2023. №4 (20). s.50-59. DOI: 10.18572/2686-858X-2023-20-4-50-59