D. Prokopowicz, S. Gwoździewicz, An analysis of the security of Information systems protection in the context of the glohal cyberatomy ransomware conducted on June 27, 2017 (in:) S. Gwoździewicz, K. Tomaszycki (ed.), Prawne i społeczne aspekty cyberbezpieczeństwa, International Institute of Innovations "Science-Education-Business" in Warsaw, Warsaw 2017, pp. 65-87. Chapter 1.4. ISBN 978-83-945923-2-5
PhD Dariusz Prokopowicz
Faculty of History and Social Sciences Cardinal Stefan Wyszyński University in Warsaw
PhD Sylwia Gwoździewicz
Department of Administration and National Security The Jacoh of Paradies University in Gorzow Wielkopolski
Abstract:
The intensive development of information technology and data transmission sińce the end of the last ccntury has also been used to violate the laws and ethics of hacking and cybercrime. In recent years there has been a noticeable increase in hacker attacks, including successful attacks using ransomware malware, ie, blocking infected computers by encrypting access to the operating system or data contained on disks infected with a Computer virus. This article describes the security issues and the risks of hacker cyber attacks that were conducted on June 27 with the Petya ransomware virus. The key issue in the context of the scalę of malware spread is the efficient and rapid reaction of the media, in which messages are alerting citizens of emerging threats. This issue also applies to the Petya ransomware hacking attack by late June 2017, by which cybercriminals błock the operation of computers in many public and financial institutions and businesses. Initially, this cyberatak was mainly about institutions and cntities operating in Ukrainę, but in the subsequent hours of the spread of the Petya virus, Computer infections were also reported on a slightly smaller scalę in several other European countries, including Poland. The described cyberatak confirmcd the need to pcrmanently activate the processes of system improvemcnt and security procedures for the transfer, processing and archiving of classified data in Internet-connected 1T systems.
Cyber security, IT security, IT security, Petya virus, ransomware, cyber security, cyberspace, cyberattack, WannaCry, malware, malware, information security, security systems, security procedures, phishing, Microsoft Windows
65