Affiliation:
1. Lviv Polytechnic National University
Abstract
This article is devoted to research and analysis of recent cyberattacks on critical infrastructure of Ukraine using ransomware. In the article, the authors emphasize the growing importance of cyber security in today's digital environment due to the increase in the number of cybercrimes, in particular, attacks using ransomware. As a result, it is important to apply cybersecurity standards to effectively combat these threats. The article emphasizes the importance of implementing comprehensive measures that cover technical, organizational, and legal aspects to combat ransomware cybercrimes. The article also provides the main methods and tools for successfully countering ransomware, both for ordinary users and representatives of businesses and critical infrastructure facilities. Also, this paper offers an exploration of the benefits of cross-implementation of cybersecurity standards in the context of combating ransomware attacks and cybercrimes. The authors consider the methods and approaches to cyber security auditing, determine the advantages of the method of cross-implementation of standards, and offer recommendations for its effective use to ensure the security of information systems. This approach contributes to the creation of a comprehensive defense system that reduces the probability of success of attacks using ransomware and provides greater resilience of the organization to incidents and cybercrimes. The results of the study can be useful for organizations seeking to improve their cyber security and protect themselves from ransomware attacks and cybercrimes.
Publisher
Borys Grinchenko Kyiv Metropolitan University
Reference12 articles.
1. Global Cybersecurity Outlook 2022. [Electronic resource]. Resource Access Mode: https://www.weforum.org/reports/global-cybersecurity-outlook-2022
2. Hamed Taherdoost, Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview (2022). doi: 10.3390/electronics11142181
3. Cybersecurity Framework: Types, Components, Functions [Electronic resource]. Resource Access Mode: https://www.knowledgehut.com/blog/security/cyber-security-frameworks
4. 7 ransomware attacks. [Electronic resource]. Resource Access Mode: https://nordlayer.com/blog/ransomware-attacks-in-2023/
5. HISTORY OF RANSOMWARE. [Electronic resource]. Resource Access Mode: https://www.crowdstrike.com/cybersecurity-101/ransomware/history-of-ransomware/