Classification of Cyber Cruise of Informational Resources of Automated Banking Systems
Journal: Cybersecurity: Education, Science, Technique (Vol.2, No. 2)Publication Date: 2019-03-03
Authors : Serhii Yevseiev Khazail Rzayev Tamilla Mammadova Firuz Samedov Nataliia Romashchenko;
Page : 47-67
Keywords : banking information resources; information security; hybrid cyber threats; automated banking systems; threat classifier;
Abstract
The modern development of high technologies and computer technology greatly enhanced the development of automated banking systems of banking sector organizations and allowed the synthesis of information and communication technologies for their formation. However, the era of high technology has increased the range of threats to banking information resources; threats have gained signs of hybridity and synergy. In these conditions, the current issue in shaping the information security management system in banking sector organizations is the formation and analysis of modern threats. In order to generalize the approach of classification of hybrid cyber threats to the components of security: information security, cybersecurity, security of information banking information resources in the work proposed an advanced classification of threats to banking information resources. The classifier takes into account ISO / OSI model levels in automated banking systems, the targeting of threats to security services and their criticality of damage. The article analyzes contemporary international standards and normative documents of the National Bank of Ukraine on security issues of banking information resources. On the basis of this analysis, we propose estimates of the level of danger to intruders and the degree of implementation of protective measures under the conditions of modern hybrid cyber threats.
Other Latest Articles
- Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4–2.5 GHz
- GERT Models of Technology of Cloudy Anti-Virus Defense
- Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
- Audit of Information Security is the basis of Effective Protection of the Enterprise
- Methodological Aspects of the Internet of Things Disciplines Study
Last modified: 2019-03-03 20:54:23