Preview

«System analysis and applied information science»

Advanced search

Reasons for the increase in cyber attacks: analysis of technical and non-technical factors

https://doi.org/10.21122/2309-4923-2023-3-48-54

Abstract

This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment.

Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data.

This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.

About the Author

A. V. Vasilyev
ScienceSoft company
Belarus

Aleksey V. Vasilyev, Lead Solution Adviser

Minsk



References

1. Karri, R.; Rajendran, J.; Rosenfeld, K.; Tehranipoor, M. Trustworthy Hardware: Identifying and Classifying Hardware Trojans. Computer; 2010; 43, pp. 39-46. DOI: https://dx.doi.org/10.1109/MC.2010.299

2. Weforum. Available online: https://www.weforum.org/agenda/2019/12/our-hardware-is-under-cyberattack-heres-how- to-make-it-safe/ (accessed on 1 January 2023).

3. Tehranipoor, M.; Wang, C. Introduction to Hardware Security and Trust; Springer Science & Business Media: Berlin/ Heidelberg, Germany, 2011.

4. McGraw, G. Building secure software: Better than protecting bad software. IEEE Softw.; 2002; 19, pp. 57-58. DOI: https://dx.doi.org/10.1109/MS.2002.1049391

5. Aslan, Ö. How to decrease cyber threats by reducing software vulnerabilities and bugs. Proceedings of the 1st International Mediterranean Science and Engineering Congress, Çukurova University; Adana, Turkey, 26–28 October 2016; pp. 639-646.

6. Aslan, O.; Samet, R. Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs. Proceedings of the IEEE 2017 International Conference on Cyberworlds; Chester, UK, 20–22 September 2017; pp. 222-225. DOI: https://dx.doi.org/10.1109/cw.2017.22

7. Techsurface. Available online: http://techsurface.com/2010/01/microsoft-security-development-lifecycle-sdl.html (accessed on 1 January 2023).

8. Broadcom. Available online: https://docs.broadcom.com/docs/istr-21-2016-en/ (accessed on 1 January 2023).

9. Mcafee. Available online: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2019.pdf (accessed on 1 January 2023).

10. Padhy, R.P.; Manas, R.P.; Suresh, C.S. Cloud computing: Security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur.; 2011; 1, pp. 136-146.

11. Alcaraz, C.; Zeadally, S. Critical infrastructure protection: Requirements and challenges for the 21st century. Int. J. Crit. Infrastruct. Prot.; 2015; 8, pp. 53-66. DOI: https://dx.doi.org/10.1016/j.ijcip.2014.12.002

12. Lipso, H.F. Tracking, and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues; Carnegie-Mellon University: Pittsburgh, PA, USA, 2002.

13. Ramirez, J.H.P. An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation. PhD Thesis; The University of Arizona: Tucson, AZ, USA, 2017.

14. Trend Micro. Available online: http://blog.trendmicro.com/trendlabs-security-intelligence/operation-woolen-goldfish-when-kittens-go-phishing/ (accessed on 1 January 2023).

15. Info Security Group. Available online: http://www.infosecurity-magazine.com/news/potao-trojan-served-up-by-russian/ (accessed on 1 January 2023).

16. Litefinance. Available online: https://www.litefinance.com/blog/for-professionals/cryptocurrency-exchange-hacks-history-causes-and-effects/ (accessed on 1 January 2023).

17. BBC: News. Available online: https://www.bbc.com/news/world-asia-42845505 (accessed on 1 January 2023).


Review

For citations:


Vasilyev A.V. Reasons for the increase in cyber attacks: analysis of technical and non-technical factors. «System analysis and applied information science». 2023;(3):48-54. (In Russ.) https://doi.org/10.21122/2309-4923-2023-3-48-54

Views: 373


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)