EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2023.22.226237

Keywords:

information security, cybersecurity, critical infrastructure, information security management system, cybersecurity standard, cybercrime, ransomware, information systems, ISO 27001, computer networks, security monitoring, SIEM, cybersecurity audit.

Abstract

This article is devoted to research and analysis of recent cyberattacks on critical infrastructure of Ukraine using ransomware. In the article, the authors emphasize the growing importance of cyber security in today's digital environment due to the increase in the number of cybercrimes, in particular, attacks using ransomware. As a result, it is important to apply cybersecurity standards to effectively combat these threats. The article emphasizes the importance of implementing comprehensive measures that cover technical, organizational, and legal aspects to combat ransomware cybercrimes. The article also provides the main methods and tools for successfully countering ransomware, both for ordinary users and representatives of businesses and critical infrastructure facilities. Also, this paper offers an exploration of the benefits of cross-implementation of cybersecurity standards in the context of combating ransomware attacks and cybercrimes. The authors consider the methods and approaches to cyber security auditing, determine the advantages of the method of cross-implementation of standards, and offer recommendations for its effective use to ensure the security of information systems. This approach contributes to the creation of a comprehensive defense system that reduces the probability of success of attacks using ransomware and provides greater resilience of the organization to incidents and cybercrimes. The results of the study can be useful for organizations seeking to improve their cyber security and protect themselves from ransomware attacks and cybercrimes.

Downloads

Download data is not yet available.

References

Global Cybersecurity Outlook 2022. [Electronic resource]. Resource Access Mode: https://www.weforum.org/reports/global-cybersecurity-outlook-2022

Hamed Taherdoost, Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview (2022). doi: 10.3390/electronics11142181

Cybersecurity Framework: Types, Components, Functions [Electronic resource]. Resource Access Mode: https://www.knowledgehut.com/blog/security/cyber-security-frameworks

7 ransomware attacks. [Electronic resource]. Resource Access Mode: https://nordlayer.com/blog/ransomware-attacks-in-2023/

HISTORY OF RANSOMWARE. [Electronic resource]. Resource Access Mode: https://www.crowdstrike.com/cybersecurity-101/ransomware/history-of-ransomware/

Imaji AO. Ransomware Attacks: Critical Analysis, Threats, and Prevention methods. Fort HaysState University, Hays, Kansas; March 5, 2019

Ransomware. [Electronic resource]. Resource Access Mode: https://www.eset.com/ua/support/information/entsiklopediya-ugroz/programma-vymogatel/

Abu Al-Haija, Qasem, and Noor A. Jebril. "Introduction to Ransomware." Perspectives on Ethical Hacking and Penetration Testing, edited by Keshav Kaushik and Akashdeep Bhardwaj, IGI Global, 2023, pp. 139-170. doi:10.4018/978-1-6684-8218-6.ch006

F. Teichmann, S. R. Boticiu, B. S. Sergi, The evolution of ransomwareattacks in light of recent cyber threats. how can geopolitical conflicts in-fluence the cyber climate?, International Cybersecurity Law Review 4 (3)(2023) 259–280

Beaman C, Barkworth A, Akande TD, Hakak S, Khan MK. Ransomware: recent advances, analysis,challenges and future research directions. Comput Secur. 2021 Dec 1;111:102490. doi:10.1016/j.cose.2021.102490

List of cyberattacks. [Electronic resource]. Resource Access Mode: https://en.wikipedia.org/wiki/List_of_cyberattacks

Cybersecurity war of russia against Ukraine. [Electronic resource]. Resource Access Mode: https://speka.media/kiberviina-rosiyi-proti-ukrayini-9qy4ok

Downloads


Abstract views: 85

Published

2023-12-28

How to Cite

Dudykevych, V., Harasymchuk, O., Partyka , A., Sovyn, Y., & Nyemkova, E. (2023). EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(22), 226–237. https://doi.org/10.28925/2663-4023.2023.22.226237

Most read articles by the same author(s)