Analysis of modern types of cyberterrorism and methods of countering them

In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analy...

Full description

Saved in:
Bibliographic Details
Main Authors: Kakimzhan Bishmanov, Zarina Muratzhan, Zhanat Dilbarkhanova, Viktoriya Lyutsik
Format: Article
Language:Catalan
Published: Universitat Oberta de Catalunya 2024-10-01
Series:IDP
Subjects:
Online Access:https://raco.cat/index.php/IDP/article/view/428542
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analysis, and synthesis were employed to achieve this purpose. The study’s main results encompass a broad overview and analysis of modern forms of cyberterrorism and their key characteristics. As part of the study, a plan to combat cyberterrorism is implemented, incorporating diverse strategies and methods for preventing cyber threats. Python code is used to track network traffic, analyse data transmission, and block nodes causing harm, aiding in detecting and preventing potential cyberattacks. A structural scheme is developed to systematize the process of countering cyberattacks, containing a detailed action plan. The scheme starts with detecting potential attacks and ends with analysing the measures’ effectiveness and planning for future steps. In addition, real-world examples of global cyberattacks are provided, and other studies on this issue are examined. The practical value of this study lies in providing concrete recommendations and ways to enhance cybersecurity at both governmental and corporate levels.
ISSN:1699-8154