Cyber security and malware

Cyber security and malware

Authors

  • Svimon Okhanashvili Iakob Gogebashvili Telavi State University image/svg+xml

DOI:

https://doi.org/10.52340/idw.2023.72

Keywords:

cyber crime, cyber defense, cyber security, information security, network security, software security

Abstract

The development of modern technologies contributed to the development of the virtual world - the Internet space, where both private production and service departments, as well as state institutions, went on a work visit. This led to the spread and exchange of huge information in the Internet world, which in turn made it necessary to raise and strengthen the level of cyber security, which today is a necessary and demanding topic.

Thesis - Cyber security and malware is one of the most relevant topics today and calls for the detection of various types of cybercrime threats, their types and the implementation of necessary measures.

In fact, every day there are high-level threats on the Internet, most of which are related to cyber security, which in turn is one of the main measures, so to speak, of the Internet security policy, which implies: quick active response and action to protect information from various malicious programs and malicious actions.

Information threats can be caused both by human factors, such as various types of threats (unintentional, accidental, targeted), and by natural factors: storms, lightning, earthquakes, floods, etc.

In general, during cybercrime, attention is focused on: technical, software and organizational part. The software part refers to operating systems and application software shells, most of which are made by different companies and their installation requires a lot of attention in the direction of compatibility and compliance. Technical refers to digital devices and their capabilities, while organizational protection refers to: employee selection, education, distribution, placement in special positions, including the formation and enhancement of cooperation and teamwork, increasing the protection of work ethic, information and behavior requirements.

 

Downloads

Download data is not yet available.

References

https://ge.itstep.org/blog/a-wide-range-of-cyber-security-a-new-generation-of-non-mobile-viruses-and-the-principle-of-their-operation კიბერუსაფრთხოების ფართო სპექტრი - ახალი თაობის არაფაილური ვირუსები და მათი მუშაობის პრინციპი

https://eufordigital.eu/geo/discover-eu/cybereast-action-on-cybercrime-for-cyber-resilience-in-the-eastern-partnership-region/ CyberEast – კიბერდანაშაულზე ქმედება

https://police.ge/files/pdf/kiber_danashauli/Convention%20on%20Cybercrime%20GEO.pdf კონვენცია კომპიუტერული დანაშაულის შესახებ

https://www.websiterating.com/ka/research/cybersecurity-statistics-facts/#sources კიბერუსაფრთხოების სტატისტიკა, ფაქტები და ტენდენციები 2023 წლისთვის

Downloads

Published

2023-09-30

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.

Loading...