EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES

Author:

Dudykevych Valeriy1ORCID,Harasymchuk Oleh1ORCID,Partyka Andrii1ORCID,Sovyn Yaroslav1ORCID,Nyemkova Elena1ORCID

Affiliation:

1. Lviv Polytechnic National University

Abstract

This article is devoted to research and analysis of recent cyberattacks on critical infrastructure of Ukraine using ransomware. In the article, the authors emphasize the growing importance of cyber security in today's digital environment due to the increase in the number of cybercrimes, in particular, attacks using ransomware. As a result, it is important to apply cybersecurity standards to effectively combat these threats. The article emphasizes the importance of implementing comprehensive measures that cover technical, organizational, and legal aspects to combat ransomware cybercrimes. The article also provides the main methods and tools for successfully countering ransomware, both for ordinary users and representatives of businesses and critical infrastructure facilities. Also, this paper offers an exploration of the benefits of cross-implementation of cybersecurity standards in the context of combating ransomware attacks and cybercrimes. The authors consider the methods and approaches to cyber security auditing, determine the advantages of the method of cross-implementation of standards, and offer recommendations for its effective use to ensure the security of information systems. This approach contributes to the creation of a comprehensive defense system that reduces the probability of success of attacks using ransomware and provides greater resilience of the organization to incidents and cybercrimes. The results of the study can be useful for organizations seeking to improve their cyber security and protect themselves from ransomware attacks and cybercrimes.

Publisher

Borys Grinchenko Kyiv Metropolitan University

Reference12 articles.

1. Global Cybersecurity Outlook 2022. [Electronic resource]. Resource Access Mode: https://www.weforum.org/reports/global-cybersecurity-outlook-2022

2. Hamed Taherdoost, Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview (2022). doi: 10.3390/electronics11142181

3. Cybersecurity Framework: Types, Components, Functions [Electronic resource]. Resource Access Mode: https://www.knowledgehut.com/blog/security/cyber-security-frameworks

4. 7 ransomware attacks. [Electronic resource]. Resource Access Mode: https://nordlayer.com/blog/ransomware-attacks-in-2023/

5. HISTORY OF RANSOMWARE. [Electronic resource]. Resource Access Mode: https://www.crowdstrike.com/cybersecurity-101/ransomware/history-of-ransomware/

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3