9427163175

9427163175



D. Prokopowicz, S. Gwoździewicz, An analysis of the security of Information systems protection in the context of the glohal cyberatomy ransomware conducted on June 27, 2017 (in:) S. Gwoździewicz, K. Tomaszycki (ed.), Prawne i społeczne aspekty cyberbezpieczeństwa, International Institute of Innovations "Science-Education-Business" in Warsaw, Warsaw 2017, pp. 65-87. Chapter 1.4. ISBN 978-83-945923-2-5


PhD Dariusz Prokopowicz

Faculty of History and Social Sciences Cardinal Stefan Wyszyński University in Warsaw

PhD Sylwia Gwoździewicz

Department of Administration and National Security The Jacoh of Paradies University in Gorzow Wielkopolski

An analysis of the security of information systems protection in the context of the global cyberatomy ransomware conducted on June 27, 2017

Abstract:

The intensive development of information technology and data transmission sińce the end of the last ccntury has also been used to violate the laws and ethics of hacking and cybercrime. In recent years there has been a noticeable increase in hacker attacks, including successful attacks using ransomware malware, ie, blocking infected computers by encrypting access to the operating system or data contained on disks infected with a Computer virus. This article describes the security issues and the risks of hacker cyber attacks that were conducted on June 27 with the Petya ransomware virus. The key issue in the context of the scalę of malware spread is the efficient and rapid reaction of the media, in which messages are alerting citizens of emerging threats. This issue also applies to the Petya ransomware hacking attack by late June 2017, by which cybercriminals błock the operation of computers in many public and financial institutions and businesses. Initially, this cyberatak was mainly about institutions and cntities operating in Ukrainę, but in the subsequent hours of the spread of the Petya virus, Computer infections were also reported on a slightly smaller scalę in several other European countries, including Poland. The described cyberatak confirmcd the need to pcrmanently activate the processes of system improvemcnt and security procedures for the transfer, processing and archiving of classified data in Internet-connected 1T systems.

Keywords:

Cyber security, IT security, IT security, Petya virus, ransomware, cyber security, cyberspace, cyberattack, WannaCry, malware, malware, information security, security systems, security procedures, phishing, Microsoft Windows

65



Wyszukiwarka

Podobne podstrony:
skanuj0059 (23) 180 MARTA DEREK objectives of the economic development of the commune. For example,
IMG@59 Zachowywanie wiary An analysis of ESS 2004/5 data by researchers at the Catholic University o
189 • nik On the basis of an analysis of the formulations utilizing the concept of the commu-■ js cl
64 S. Źróbek, R. Cellmer, J. Kuryj2. An analysis of factors affecting the spatial differentiation of
i KANCELARIA PREZESA RADY MINISTRÓWOi The fifth part of the report prosides an analysis indicating t
BOYNTON (W.R.), KEMP (W.M.), KEEFE (C.W.) 1982 : An analysis of nutrients and other factors inf
82.    B.98300 HOUSEHOLDS as corporate firms : an analysis of household finance using
ŻÓŁTE STRONY YELLOW PAGES 103 Changes in Corporate Employment and HR Practice: An Analysis of 2007 S
Relating to skills: PEK_U01 — is capable to provide an analysis of simple networks in time domain an
PUBLIKACJE NAUKOWE PWr brak afiliacji PWr autora w danej pracy Frączek Ewa, Budzyń Grzegorz: An anal
6 Spis treści Anna Haczkowska, The analysis of difficulties arising during coding an-swers to open-e
an exhaustive analysis of the numerous weaknesses in Marcuse’s theory in which the contradictions in
21. Musee des enfants, Palais dc Longchamp, Marscillc. The expIanation of sculptures begins wit
the paper is presented as an instrument of risk analysis operating lever-age, financial leverage and
Abstract Comparison of security in GSM and UMTS systems The scope of my work encompasses the analysi

więcej podobnych podstron