Threats to the information system in the physical environment and cyberspace

12/04/2020
by   Valeria Ageeva, et al.
0

The purpose of the study is to supplement and update the list of threats to the confidentiality and integrity of the system. The article focuses on the already compiled list of threats and a model of system, but also considers new threats and types of threats. Scientific novelty is in the interdisciplinary consideration of the issue with the involvement of the works of modern Russian and Western scientists. As a result of the study, new threats to the confidentiality and integrity of the system were described, the type of these threats was determined and classified by channels of communication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/06/2021

Detection of Insider Threats using Artificial Intelligence and Visualisation

Insider threats are one of the most damaging risk factors for the IT sys...
research
01/30/2023

Typing of data transfer processes in the information system within the framework of threat modeling

Work is aimed at automating the process of obtaining a list of security ...
research
02/28/2021

Countering Adaptive Network Covert Communication with Dynamic Wardens

Network covert channels are hidden communication channels in computer ne...
research
01/25/2020

A Review of Cybersecurity Incidents in the Water Sector

This study presents a critical review of disclosed, documented, and mali...
research
06/06/2020

Privacy threats in intimate relationships

This article provides an overview of intimate threats: a class of privac...
research
12/10/2022

A systematic literature review on insider threats

Insider threats is the most concerned cybersecurity problem which is poo...

Please sign up or login with your details

Forgot password? Click here to reset