DEVELOPMENT OF RECOMMENDATIONS FOR MINIMIZING THE RISKS OF ACCOUNT HACKING ON THE BASIS OF ANALYSIS OF THE MOST COMMON HACKING METHODS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2020.12.163171

Keywords:

multifactor authentication; phishing; password protection; biometric authentication

Abstract

With the spread of the Internet, social networks, messengers, etc. and their penetration
into all spheres of life of the modern individual, the number of attempts to obtain unauthorized
access to personal information of users is increasing. Accounts are the most vulnerable target for
hacking. Among the most common types of attacks - phishing, theft of cookies, use of keyloggers,
brute force. Social engineering techniques have become very popular among attackers. Using a
password in the form of a set of letters, numbers, and special characters is no longer sufficient to
provide the required level of account security. The introduction of combined systems increases the
number of identification features and increases data security. Systems based on contactless smart
cards, USB keys, hybrid smart cards, bioelectronic systems can be used as additional protection
mechanisms. One of the main recommendations for avoiding the consequences of fraudulent actions
is double or multifactor authentication to verify the identity of the client (requiring users to provide
data, such as a password, using other factors, such as a text message / SMS code or fingerprints).
Multi-factor authentication should be used on all available Internet services, where possible, to
ensure an acceptable level of security. There are two main types of multifactor authentication: the
MFA application, an authentication process that is activated when a user tries to access one or more
applications, and the MFA device, an authentication process that immediately activates the MFA at
the login point. One of the most common authentication factors is the phone number. Email codes,
text tokens, biometric verification, hardware tokens, security issues (secret issues) and more are also
used.

Downloads

Download data is not yet available.

References

V.L. Buryachok, V.B. Tolubko, V.O. Khoroshko, S.V. Tolyupa. Information and cybersecurity: sociotechnical aspect.— К.: SUT, 2015. - 288 с.

What is MFA - Multifactor Authentication? [Electronic resource]. Available: https://datami.ua/shho-takemfa-bagatofaktorna-autentifikatsiya/

S.I. Boloban, O.M. Pereguda, V.V. Uminsky, «Methods of authentication of users of information and

communication systems», Development and modernization of armaments and military equipment, №2. Рр.

-52, 2009.

KPMG-Ukraine. Global study on banking fraud [Electronic resource]. Available:

https://assets.kpmg/content/dam/kpmg/ua/pdf/2019/11/Global_Banking_Fraud_Survey.pdf

Datami. How to protect your own social networks? [Electronic resource]. Available: https://datami.ua/yakzahistiti-vlasni-sotsialni-merezhi/

A hacker from Ukraine has developed the world's largest phishing service for attacks on financial

institutions [Electronic resource]. Available: https://banda.media/ru/haker-z-ukrayiny-rozrobyvnajbilshyj-u-sviti-fishyng-servis-dlya-atak-na-finustanovy-kiberpolicziya/

Name the most common methods of hacking [Electronic resource]. Available:

https://uk.focuzcomputers.com/t-cnicas-de-hacking-comunes-que-debes-conocer

Mail hacking [Electronic resource]. Available:

https://brut4you.wordpress.com/2014/08/08/%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC-

%D0%BF%D0%BE%D1%87%D1%82%D1%8B/

O.S. Kulchytsky, V.V. Hrytsiuk, I.G. Zotova, «Analysis of existing approaches to user identification and

authentication in information and telecommunication systems» , Collection of scientific works of the Center

for Military Strategic Studies of the Ivan Chernyakhovsky National University of Defense of Ukraine, №3.

Рр. 60-64, 2016.

J.P. Kis, V.M. Teslyuk, «Methods and means of authentication of biometric data in information systems»,

Current economic problems, №12 (138). Рр. 174-182, 2012.

O. Korchenko, A. Davydenko, O. Vysotska, «Method of authentication of users of information systems by

their handwriting with multi-step correction of primary data», Information protection, №1. Рр. 40-51, 2019.

Downloads


Abstract views: 280

Published

2021-11-03

How to Cite

Litvinchuk, I., Korchomnyi, R., Borysov, I., & Korshun, N. (2021). DEVELOPMENT OF RECOMMENDATIONS FOR MINIMIZING THE RISKS OF ACCOUNT HACKING ON THE BASIS OF ANALYSIS OF THE MOST COMMON HACKING METHODS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(12), 163–171. https://doi.org/10.28925/2663-4023.2020.12.163171

Most read articles by the same author(s)