ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

METHODS OF DETECTING AND NEUTRALIZING CYBER THREATS

Journal: International Scientific Journal "Internauka" (Vol.1, No. 174)

Publication Date:

Authors : ; ; ; ;

Page : 92-97

Keywords : cybersecurity; cyber threats; information influences; threats in cybersecurity;

Source : Download Find it from : Google Scholarexternal

Abstract

The study examines methods of detecting and neutralizing cyber threats to protect critical infrastructure in 2025. It considers signature analysis, anomaly analysis with AI decision-making, hybrid approaches, active, passive and proactive response methods. It suggests the integration of AI, big data, and SOAR systems to effectively counter APT, ransomware, and DDoS attacks. Evaluation, carried out through regular audits and adaptation of mechanisms to the specifics of the sectors to ensure the stability, reliability and speed of protection.

Last modified: 2025-08-25 05:03:29