Chrome Extension
WeChat Mini Program
Use on ChatGLM

Cybercrimes in the global security system in modern conditions

LEX HUMANA(2023)

Cited 0|Views3
No score
Abstract
The development of the information and digital world determines the formation of new public requests, firstly, to ensure the security of cyberspace. The development of social tasks that can be solved using information technologies is constantly growing, therefore the number of cybercrimes is increasing, and their specifics are changing. An analysis of the development trend of cybersecurity and cybercrime showed that the number and scale of cyberattacks will continue to grow. Accordingly, the purpose of the article is to find the development directions of approaches to ensuring security in cyberspace in accordance with modern global challenges. The article determines that new global challenges have significantly changed the system of people's life conducting financial transactions, trade, receiving services (administrative, communal, social, and household, etc.), and providing communication systems. In the conditions of the pandemic, the processes of all spheres of human activity only spread. The analysis of digitalization models for ensuring cybersecurity is presented in the article but needs clarification and further development, which relates to new global challenges in the security architecture in the world and on the European continent. The article considers approaches to ensuring the effectiveness of cybersecurity in new social conditions. The article uses the methods of control charts to conduct a sociological survey to rank the factors of influence on the cause-and-effect relationships of cybersecurity. The put-forward hypothesis regarding the structuring of influencing factors allows us to systematize directions for further research. The projection of the trend line of the number of cyberattacks and the number of subjects subjected to cyberattacks in the analyzed period determines the scaling and complication of protection processes both at the company level and at the state level.
More
Translated text
Key words
Cyber-attacks, Information technology, National security, Cyber security
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined