Economic aspects of information protection under present large-scale cyber-attacks conditions
##plugins.themes.bootstrap3.article.main##
Анотація
The main attacks that have caused irreparable damage to enterprises and organizations around the world in recent years and radically changed the attitude to cyber-attacks and the fight against them are analyzed; systematized scientific and technical prerequisites for the security of information technology; substantiated the tasks facing the developers of modern information systems; the consequences of attacks on information are investigated and the main factors influencing financial losses due to security breaches are identified.
##plugins.themes.bootstrap3.article.details##
Номер
Розділ

Ця робота ліцензується відповідно до ліцензії Creative Commons Attribution 4.0 International License.
Посилання
1. Information technology. Security techniques. Information security management systems – Requirements: ISO/IEC 27001:2017.
2. Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https://tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
3. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https://tzi.com.ua/downloads/1.1-003-99.pdf.
4. Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
5. FBI/IC3: 2016 Internet Crime Report.
6. Ponemon Institute, 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
7. Ponemon Institute, 2018 Cost of Data Breach Study: Impact of Business Continuity Management – Research Report, 2018.
8. Ponemon Institute, Cost of a Data Breach Report 2019 – Research Report, 2019. DOI: https://doi.org/10.1016/S1361-3723(19)30081-8
9. Ponemon Institute, Key findings from the 2017 Cost of Data Breach Study: Global Overview – Research Report, June 2017.
10. Domarev V. V. Bezopasnost ynformatsyonnыkh tekhnolohyi. Systemny podhod. K.: TYD DS, 2004. Р. 655.
11. Zubok M. I. Osnovy bezpeky komertsiinoi diialnosti pidpryiemstv ta bankiv. K.: KNTEU, 2005. Р. 135.
12. Kopytin Yu. V. Model strakhuvannia ryzykiv informatsiinoi bezpeky. “Tsyfrovi tekhnolohii|. 2010. No. 8. P. 99.
13. Levchenko Ye. H., Prus R. B., Rabchun D. I. Pokaznyky bahatostupinchastykh system zakhystu informatsii. Visnyk Inzhenernoi akademii Ukrainy. 2009. No. 1. P. 128–133.
14. Odarchenko R/ S., Lukin S. Yu. Ekonomichna efektyvnist vprovadzhennia system zakhystu stilnykovykh merezh 4G. “Systemy obrobky informatsii”. 2012. Vypusk 4 (102). Tom 2. P. 52.