Economic aspects of information protection under present large-scale cyber-attacks conditions

نویسندگان

چکیده

The main attacks that have caused irreparable damage to enterprises and organizations around the world in recent years radically changed attitude cyber-attacks fight against them are analyzed; systematized scientific technical prerequisites for security of information technology; substantiated tasks facing developers modern systems; consequences on investigated factors influencing financial losses due breaches identified.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying cyber attacks under local model information

This work considers the problem of detecting corrupted components as well as external attacks in a large scale decentralized system. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which cyberattacks have become an important threat. Despite the recent advances in the theory of detection and identification...

متن کامل

Cyber Stealth Attacks in Critical Information Infrastructures

Current Critical Infrastructures (CIs) are complex interconnected industrial systems that, in recent years, have incorporated information and communications technologies such as connection to the Internet and commercial off-the-shelf components. This makes them easier to operate and maintain, but exposes them to the threats and attacks that inundate conventional networks and systems. This paper...

متن کامل

Large-scale classification of traffic signs under real-world conditions

Traffic sign inventories are important to governmental agencies as they facilitate evaluation of traffic sign locations and are beneficial for road and sign maintenance. These inventories can be created (semi-)automatically based on street-level panoramic images. In these images, object detection is employed to detect the signs in each image, followed by a classification stage to retrieve the s...

متن کامل

Protection of flows under targeted attacks

Due to the importance of robustness in many real-world optimization problems, the field of robust optimization has gained a lot of attention over the past decade. We concentrate on maximum flow problems and introduce a novel robust optimization model which, compared to known models from the literature, features several advantageous properties: (i) We consider a general class of path-based flow ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ?????? ??????????????? ????????????? ?????????? ????????????

سال: 2022

ISSN: ['2522-4433', '2522-4441']

DOI: https://doi.org/10.33108/visnyk_tntu2022.02.063