Analysis of modern types of cyberterrorism and methods of countering them
In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analy...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | Catalan |
| Published: |
Universitat Oberta de Catalunya
2024-10-01
|
| Series: | IDP |
| Subjects: | |
| Online Access: | https://raco.cat/index.php/IDP/article/view/428542 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849389460598292480 |
|---|---|
| author | Kakimzhan Bishmanov Zarina Muratzhan Zhanat Dilbarkhanova Viktoriya Lyutsik |
| author_facet | Kakimzhan Bishmanov Zarina Muratzhan Zhanat Dilbarkhanova Viktoriya Lyutsik |
| author_sort | Kakimzhan Bishmanov |
| collection | DOAJ |
| description | In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analysis, and synthesis were employed to achieve this purpose. The study’s main results encompass a broad overview and analysis of modern forms of cyberterrorism and their key characteristics. As part of the study, a plan to combat cyberterrorism is implemented, incorporating diverse strategies and methods for preventing cyber threats. Python code is used to track network traffic, analyse data transmission, and block nodes causing harm, aiding in detecting and preventing potential cyberattacks. A structural scheme is developed to systematize the process of countering cyberattacks, containing a detailed action plan. The scheme starts with detecting potential attacks and ends with analysing the measures’ effectiveness and planning for future steps. In addition, real-world examples of global cyberattacks are provided, and other studies on this issue are examined. The practical value of this study lies in providing concrete recommendations and ways to enhance cybersecurity at both governmental and corporate levels.
|
| format | Article |
| id | doaj-art-d6e73ced066742c1aaaa3acea7bb11b2 |
| institution | Kabale University |
| issn | 1699-8154 |
| language | Catalan |
| publishDate | 2024-10-01 |
| publisher | Universitat Oberta de Catalunya |
| record_format | Article |
| series | IDP |
| spelling | doaj-art-d6e73ced066742c1aaaa3acea7bb11b22025-08-20T03:41:57ZcatUniversitat Oberta de CatalunyaIDP1699-81542024-10-014110.7238/idp.v0i41.428542Analysis of modern types of cyberterrorism and methods of countering themKakimzhan Bishmanov0https://orcid.org/0009-0007-4344-9800Zarina Muratzhan1https://orcid.org/0009-0002-2008-8225Zhanat Dilbarkhanova2https://orcid.org/0009-0004-8917-8741Viktoriya Lyutsik3https://orcid.org/0009-0002-6272-2212Al-Farabi Kazakh National UniversityM. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of KazakhstaM. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of KazakhstanTuran UniversityIn light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analysis, and synthesis were employed to achieve this purpose. The study’s main results encompass a broad overview and analysis of modern forms of cyberterrorism and their key characteristics. As part of the study, a plan to combat cyberterrorism is implemented, incorporating diverse strategies and methods for preventing cyber threats. Python code is used to track network traffic, analyse data transmission, and block nodes causing harm, aiding in detecting and preventing potential cyberattacks. A structural scheme is developed to systematize the process of countering cyberattacks, containing a detailed action plan. The scheme starts with detecting potential attacks and ends with analysing the measures’ effectiveness and planning for future steps. In addition, real-world examples of global cyberattacks are provided, and other studies on this issue are examined. The practical value of this study lies in providing concrete recommendations and ways to enhance cybersecurity at both governmental and corporate levels. https://raco.cat/index.php/IDP/article/view/428542cyber threatscybersecurityinformation protectioninformation technology |
| spellingShingle | Kakimzhan Bishmanov Zarina Muratzhan Zhanat Dilbarkhanova Viktoriya Lyutsik Analysis of modern types of cyberterrorism and methods of countering them IDP cyber threats cybersecurity information protection information technology |
| title | Analysis of modern types of cyberterrorism and methods of countering them |
| title_full | Analysis of modern types of cyberterrorism and methods of countering them |
| title_fullStr | Analysis of modern types of cyberterrorism and methods of countering them |
| title_full_unstemmed | Analysis of modern types of cyberterrorism and methods of countering them |
| title_short | Analysis of modern types of cyberterrorism and methods of countering them |
| title_sort | analysis of modern types of cyberterrorism and methods of countering them |
| topic | cyber threats cybersecurity information protection information technology |
| url | https://raco.cat/index.php/IDP/article/view/428542 |
| work_keys_str_mv | AT kakimzhanbishmanov analysisofmoderntypesofcyberterrorismandmethodsofcounteringthem AT zarinamuratzhan analysisofmoderntypesofcyberterrorismandmethodsofcounteringthem AT zhanatdilbarkhanova analysisofmoderntypesofcyberterrorismandmethodsofcounteringthem AT viktoriyalyutsik analysisofmoderntypesofcyberterrorismandmethodsofcounteringthem |