Abstract
This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment.Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data.This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.
Publisher
Belarusian National Technical University
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference17 articles.
1. Karri, R.; Rajendran, J.; Rosenfeld, K.; Tehranipoor, M. Trustworthy Hardware: Identifying and Classifying Hardware Trojans. Computer; 2010; 43, pp. 39-46. DOI: https://dx.doi.org/10.1109/MC.2010.299
2. Weforum. Available online: https://www.weforum.org/agenda/2019/12/our-hardware-is-under-cyberattack-heres-how- to-make-it-safe/ (accessed on 1 January 2023).
3. Tehranipoor, M.; Wang, C. Introduction to Hardware Security and Trust; Springer Science & Business Media: Berlin/ Heidelberg, Germany, 2011.
4. McGraw, G. Building secure software: Better than protecting bad software. IEEE Softw.; 2002; 19, pp. 57-58. DOI: https://dx.doi.org/10.1109/MS.2002.1049391
5. Aslan, Ö. How to decrease cyber threats by reducing software vulnerabilities and bugs. Proceedings of the 1st International Mediterranean Science and Engineering Congress, Çukurova University; Adana, Turkey, 26–28 October 2016; pp. 639-646.