CAUSES OF INFORMATION SECURITY BREACHES IN THE TELECOMMUNICATION NETWORKSAND METHODS OF PROTECTING INFORMATION
Автор: Elvira Bzhinava, Salome Makharadze, Manana Gogberashvili
Организация: Department of Digital Telecommunication Technologies, Georgian Technical University
Категория:
Ключевые слова: Digital, Security, Information, Antivirus, User, Internet network, Hacking, Phishing
Аннотация. The transition of all spheres of human activity to digital format has brought great achievements to humanity, simplified communication and increased the efficiency of business processes. Along with the positive aspects, the demand for privacy has increased significantly. Most data is stored in digital form, which pushes attackers to look for new ways to steal information. Businesses and individuals face meet cyber threats every year, the main goal of which is to damage electronic computer systems and networks, also to misappropriate information without authorization. The technological development of information protection tools has now reached a level where the necessity of their use has already been put at the forefront. Different cyberattacks, on the one hand, require different technological solutions, on the other hand, the creation of a complex protection system based on the selection of the minimum number of protection means used in the complex, which is equivalent to implementing an optimization process in accordance with costs. The goal of the work is to identify relevant specific reasons, analyze the results, and select protection measures to ensure information security. Methodology: the study uses qualitative research approaches, which involves a theoretical review and analysis of extensive literature. The conclusion are compiled from government reports and peer-reviewed journals. Are analyzed methods and technical means of security research, also future prospects and the need for mathematical calculations.
Библиография:
https://rt-solar.ru (15.11.2024)
ИСО / МЭК 27032:2012 – Информационные технологии. Методы обеспечения безопасности. Руководящие указания по кибербезопасности (ISO/IEC 27032:2012 Information technology - Security techniques – Guiolelines forcybersecurity). URL:http://www.iso.org/iso/ru/catalogue_detail?csnumber=44375, (15.11.2024).
ITU – T Recommendation X. 800: Secutity architechure for Open Systems Interconnection for CCITT applications. – URL:http://www.itu.int/гес/T-REC-X.800-199103-I
Jaap de Waard. The Private Security Industry in International Perspective // European Journal on Criminal Policy and Research. 1999. V. 7. Issue 2. P. 143 – 174.
Сабанов А.Г. Анализ применимости методов оценки рисков к процессам аутентификации при удаленном электронном взаимодействии. //Электросвязь, №5,2014 стр.44-47.
პერსონალურმონაცემთადაცვისსამსახურის 2023 წლისსაქმიანობისსტატისტიკა. URL:https://shorturl.at/wugEF
ყიფიანი ქ. „ინფორმაციის დაცვის მეთოდების კვლევა სატელეკომუნიკაციო ქსელებისა და სისტემების სტრუქტურისა და ფუნქციონირების ალგორითმის გათვალისწინებით“.დისერტაცია. 2019. გვ. 106.
https://sky-dynamics.ru/ (15.11.2024).
https://xserver.a-real.ru/blog/useful/zashchita-informatsii-v-seti-internet/(15.11.2024).
https://www.edpb.europa.eu(15.11.2024).
https://sky-dynamics.ru/stati/metody-i-sredstva-zashhity-informacii-v-internete/(15.11.2024).
Меню