scholarly journals Innovative Technologies in Combating Cyber Crime

2018 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Azernikov A. D. ◽  
Norkina A. N. ◽  
Myseva E. R. ◽  
Chicherov K. A.

So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.

Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Hryhoriy Hnatienko ◽  
Natalia Tmenova

High-quality functioning of the information security system and solving problems that arise in the information protection, is currently a topical trend in various areas of human life. Successful cyber protection consist in creating and implementing a multi-level system of measures that cover various aspects with complex interact and complement each other. These measures have a different nature, and their priorities may differ significantly in terms of different services of the organization, so it is logical to formalize the sequence of cybersecurity implementation in a class of group choice tasks. The paper proposes a flexible mathematical apparatus for modeling information security problems and adequate application of the opinion analysis of experts’ team in practice. The approach to finding the resultant ranking of measures priority is described as a solution to the problem of multicriteria optimization, where the sequence of measures implementation may involve the interaction of performers and require regulation of the actions sequence of all elements and subsystems of the organizational system. This approach allows to combine different information security measures proposed by the experts of various departments; to find a compromise solution for a diverse group of experts; not to violate any expert's preferences under calculating the compromise ranking of cyber security measures. The proposed approach can be useful in developing appropriate cybersecurity measures and favorable in developing and implementing of rapid response procedures to threats, as well as it can be indispensable in the overall building or improving organization security system and it can contain elements of training, coordination, and complexity of expert team members, who are the heads of units of a single organizational system.


Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Sunil. C. Pawar ◽  
R. S. Mente ◽  
Bapu. D. Chendage

Cyberspace is a domain that uses the electronic and electromagnetic spectrum to store, modify, and exchange data through network and system-related physical infrastructures. Cyberspace is an endless space known as the Internet. Computer transactions, especially transactions between different computers, can be viewed as a space. Images and text on the Internet exist in cyberspace. The term is used in conjunction with virtual reality, giving the name of the imaginary place where a virtual object exists. If a computer creates a picture of a building that allows the architect to "walk in" and see what the nature of a design is, the building is said to be in cyberspace.Cybercrime is a series of organized criminal attack cyberspace and cyber security. Cybercrime such as Hacking into computer,this can be through a network system and clicking on unfamiliar links connecting to unrecognized Wi-Fi, downloading software and files to unsafe sites, consuming energy, electromagnetic radiation waves, and more. Cyber security is a serious problem and must be taken seriously as it has become a national concern. Currently, most electronic devices such as computers, laptops and cell phones come with built-in firewall security software, but even so, computers are not 100 percent accurate and reliable in protecting our data.


Author(s):  
Pavlo Katerynchuk

Cyber security and cyber space of Ukraine remained for a long time out of the attention of domestic researchers and, therefore, civil servants. For more than 20 years, the young Ukrainian state did not waste its efforts on the formation of not only effective and reliable troops, but also information security. The government did not endeavored to strengthen the country’s defense, and only weakened its lack of progress in fighting corruption and the dominance of Russian media and intelligence. As a result, in the spring of 2014, after a long confrontation between the regime of Viktor Yanukovych and the citizens of Ukraine, Russia failed to conduct special operations with the aim of annexing the Crimea and facilitate the war in Donbas. Not the least role in this played a raid for information and factors cyber Russian hackers for the purpose of paralyzing government agencies and influence on public opinion in Ukraine through Russian-controlled media. As a result of prolonged and massive cyber attacks, Ukrainian state structures, the banking system, industrial facilities and private business suffered significant material and reputational losses. At the same time in Ukraine began to realize the seriousness of cyber security as a component of national security and contribute to creating cyber police, national cyber security strategy, acceptance of a number of regulations on cyber security, strengthening public defense for the protection of domestic cyber space. At the moment, Ukraine is on the way to rethinking the role of cyber security and the formation of a national system of protection against cyber threats.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


Author(s):  
O. Dvoryankin

The article is about new information technologies of the Internet, such as anonymizers, intranet, extranet, proxy servers and overlay networks in particular. Their features, types, characteristics, positive and negative sides are also presented. Special attention is paid to personal information security. 


Author(s):  
Shivankur Thapliyal ◽  
Renu Bahuguna

Cyber and Information Security are one of the most concernable and challenging issues of today’s strengthen Information age. Cyber attackers and Cyber intruders performs and accomplished a very highly powerful and potential Cyber threat in our most sensitive Cyber Space and threaten our Cyber Security. So the need of the hour is that we have some robust and vigorous Cyber Security algorithms which protects our Cyber Space against these cyber Intruders or Cyber Criminals. Because many algorithms, which are currently runs to protect Cyber Space and responsible for potential data encryption and decryption mechanisms during sensitive transactions of data are worked very slow in manner and consume a large size of memory bandwidth and contains a very expensive computational cost and as the technological advancements in our Cyber Space, Cyber Intruder and Cyber Criminal achieved a very high skills mechanisms to breach the securities bridge of that algorithms, and some algorithms which contains a very typical and complex structure taking a lot of time to perform the mechanisms of desired security tasks and very costly rich for computations. So we design two Cyber Security algorithms models, which also contains a very complex and typical structure but never consume a lot of computation power and as well as memory and also contains a least cost for performing computations, these both two algorithms are a fusion of multiple ciphers and some control mechanisms, which are technically very strong as well as redirect to optimality. Randomization are the main theme point of first algorithm that’s why for Cyber Intruders and Cyber Criminals are very hard to find the actual pattern of data or to accomplished any Cyber Attacks. The detailed mechanisms of these algorithms are covers in the next upcoming sections of this research paper.


Sign in / Sign up

Export Citation Format

Share Document