Modern cybercrime threats for modern organizations

التفاصيل البيبلوغرافية
العنوان: Modern cybercrime threats for modern organizations
المؤلفون: Panavas, Simonas, Sabaitytė, Jolanta
المصدر: Challenges to national defence in contemporary geopolitical situation (CNDCGS’2020): abstracts of the 2nd international conference and live firing show (LFS)’ 2020, March 31 – 02 April, 2020, Vilnius, Lithuania/Edited by S. Bekesiene and S. Hošková-Mayerová, Vilnius : Generolo Jono Žemaičio Lietuvos karo akademija, 2020, p. 50-51 ; ISBN 9786098074772 ; eISBN 9786098074987
سنة النشر: 2020
المجموعة: LSRC VL (Lithuanian Social Research Centre Virtual Library) / LSTC VB (Lietuvos socialinių tyrimų centras virtualią biblioteką)
مصطلحات موضوعية: cybersecurity, information security equipment, cybercrime, social engineering, cybersecurity plan
الوصف: The following results of the research were obtained: The cybercrime is defined as a crime related to computer-related crimes. Types of cybercrime identified include cyber-attacks, viruses, and social engineering. The analysis identified the types of cyber-attacks, social engineering, and viruses and their characteristics, which describe the signs of crime and potential harm. Analysis of the statistical data revealed that the cybercrimetends to grow, especially social engineering, because of the weakest part of the human being in the information security system. Measures are in place to prevent cybercrime, such as firewalls, antivirus software, public key infrastructure system, surveillance equipment, hacking tests, and staff training. Š The research of modern organization personnel resistance to modern cybercrime threat is carried out. The methodology of the experiment website HTML and PHP programming codes and operation algorithm is presented according to the created experimental scenario. Using the experimental method study, simulation of social engineering phishing type attack, it was found that 36% (266 persons) of organization personnel are not resistant to social engineering attacks, thus confirming the hypothesis (H) raised t – a network of the modern organization is not safe. If this were a real case of this type of attack, the chosen organization’s network would be infected with malicious software.
نوع الوثيقة: conference object
وصف الملف: application/pdf
اللغة: English
ردمك: 978-609-8074-77-2
978-609-8074-98-7
609-8074-77-1
609-8074-98-4
Relation: http://lka.oai.elaba.lt/documents/54411331.pdf; http://lka.lvb.lt/LKA:ELABAPDB54411331&prefLang=en_US
الاتاحة: http://lka.oai.elaba.lt/documents/54411331.pdf
http://lka.lvb.lt/LKA:ELABAPDB54411331&prefLang=en_US
Rights: info:eu-repo/semantics/openAccess
رقم الانضمام: edsbas.8687811A
قاعدة البيانات: BASE
الوصف
ردمك:9786098074772
9786098074987
6098074771
6098074984