ECONOMIC CHALLENGES OF THE COMPANY'S ACTIVITY DURING CYBERATTACKS IN THE CONDITIONS OF TOUGH COMPETITION
Abstract
Modern life has become much more comfortable thanks to various digital technologies. The Internet has brought positive changes to society's life, but with it comes a huge problem of personal data protection. Enterprises that need to protect customer data or confidential information of the enterprise itself from an information threat – a cyberattack – are also concerned with this issue. Every year, the number and types of cyberattacks increase and expand, and the competition becomes even more intense as companies improve their management and security systems. Despite new protection systems and their improvement, enterprises suffer from various types of cyberattacks that affect financial results and reputation. Their detrimental effects can lead to business downtime, data leakage (both customer and business) and the spread of viruses that can eventually destroy the system. Digitization is a powerful engine of economic growth in the world and almost all business markets are becoming increasingly digitized, and businesses that go digital not only increase efficiency, but also profitability. It also helps businesses better adapt to changes that occur under the influence of external factors. That is, the transition to digital technologies accelerates all business processes in each unit of the enterprise structure, which accelerates the interactive process with customers who have also transformed to a digital process. But the transition to digitization tools of operation, the enterprise is risky. The risk of digitalization is the leakage of data and cyberattacks that destroy platforms, sites and other information technology components or suspend the work of the enterprise for at least one day. For a business to stop work for a day is a huge expense, as well as eliminate the problems involved in a cyberattack and strengthen cyber security. The article examines the definition of the concept of "cyberattack", and also analyzes the gradation list of the largest cyberattacks: malware attack, phishing attacks, password attack, man-in-the-middle attack, SQL Injection attack, denial of service (DOS) attack and distributed denial of service (DDOS), insider threat, cryptojacking, zero-day exploit, watering hole attack, DNS tunneling, Drive-by download attacks, cross-site scripting attacks, DNS spoofing or "poisoning", IoT attack, session hijacking, URL manipulation.
References
Aristova I., Brusakova O., Koshikov D., Kaplya O. Developing information technology law and legislation: analysis of international experience and possibilities of its application in Ukraine. Revista de Derecho. Vol. 10 (II) (2021), pp. 117-128. ISSN: 1390-440X – eISSN: 1390-7794. DOI: https://doi.org/10.31207/ih.v10i2.287
Арсенович Л.А. Організація професійної підготовки фахівців із кібербезпеки основними суб’єктами національної системи кібербезпеки: практичний аспект. Ефективність державного управління. 2021. № 62. DOI: https://doi.org/10.33990/2070-4011.62.2020.205817
Пашко П.В., Лазебник Л.Л., Кіндзерський Ю.В. Підприємство в епоху глобальних трансформацій: виклики та перспективи розвитку: монографія. Університет державної фіскальної служби України. Ірпінь, 2019. 476 с.
Kirichenko, L., Radivilova, T., & Carlsson, A. (2017) Detecting cyber threats through social network analysis: short survey. SocioEconomic Challenges, 1, 1, 20–34.
Ставицький О.В., Шинкаренко А.Ю. Кібербезпека як один з механізмів забезпечення стабільного розвитку економіки України. Актуальні проблеми економіки і управління : Зб. наук. праць. Київ : НТУУ «КПІ», 2017. Вип. 11. URL: http://ape.fmm.kpi.ua/article/view/102862
Ulichev O.S., Meleshko Ye.V., Sawicki D., Smailova S. Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors // Proc. SPIE 11176, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, Wilga, Poland (ISSN: 0277-786X). – 2019. – 111761T.
Чупріна М.О., Орозонова О.О. Світові тренди розвитку ІТ-індустрії та технології. Бізнес, інновації, менеджмент: проблеми та перспективи : матер. 1 Міжнар. наук.-практ. конф. С. 144–145. URL: http://confmanagement.kpi.ua/proc/article/view/201193/201226
Aleinikova, O.V., Datsii, O.I., Kalina, I.I., Zavgorodnia, A.A., Yeremenko, Y., & Nitsenko, V.S. (2023). Digital technologies as a reason and tool for dynamic transformation of territory marketing. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, (1), pp. 154–159. DOI: https://doi.org/10.33271/nvngu/2023-1/154
Закон України «Про основні засади забезпечення кібербезпеки України». ВВРУ 2017, № 45, ст. 403. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text
Горбаченко С. Кібербезпека як складова економічної безпеки України. Галицький економічний вісник. 2020. № 5 (66). С. 180–186.
Кібербезпека підприємства: що враховувати. 2022. URL: https://jurliga.ligazakon.net/news/209245_kberbezpeka-pdprimstva-shcho-vrakhuvati
Aristova I., Brusakova O., Koshikov D., Kaplya O. (2021) Developing information technology law and legislation: analysis of international experience and possibilities of its application in Ukraine. Revista de Derecho. Vol. 10 (II), pp. 117–128. DOI: https://doi.org/10.31207/ih.v10i2.287
Arsenovich, L.A. (2021). Orhanizatsiia profesiinoi pidhotovky fakhivtsiv iz kiberbezpeky osnovnymy subiektamy natsionalnoi systemy kiberbezpeky: praktychnyi aspekt [Organization of professional training of cyber security specialists by the main subjects of the national cyber security system: practical aspect]. Efficiency of public administration, no. 62. DOI: https://doi.org/10.33990/2070-4011.62.2020.205817
Pashko P.V., Lazebnyk L.L., Kindzerskyi Yu.V. (2019) Pidpryiemstvo v epokhu hlobalnykh transformatsii: vyklyky ta perspektyvy rozvytku [Enterprise in the era of global transformations: challenges and development prospects: monograph.] State Fiscal Service University of Ukraine. Irpin, p. 476.
Kirichenko, L., Radivilova, T., & Carlsson, A. (2017) Detecting cyber threats through social network analysis: short survey. SocioEconomic Challenges, 1(1), 20–34.
Stavytskyi O.V., Shinkarenko A.Yu. (2017) Kiberbezpeka yak odyn z mekhanizmiv zabezpechennia stabilnoho rozvytku ekonomiky Ukrainy [Cyber security as one of the mechanisms for ensuring the stable development of the economy of Ukraine]. Actual problems of economy and management: Collection. of science works. Kyiv: NTUU "KPI". Issue 11. Available at: http://ape.fmm.kpi.ua/article/view/102862
Ulichev O.S., Meleshko Ye.V., Sawicki D., Smailova S. (2019) Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors. Proc. SPIE 11176, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, Wilga, Poland.
Chuprina M.O., Orozonova O.O. Svitovi trendy rozvytku IT-industrii ta tekhnolohii [World trends in the development of the IT industry and technology]. Business, innovations, management: problems and prospects: mater. 1 International science and practice conf. P. 144–145. Available at: http://confmanagement.kpi.ua/proc/article/view/201193/201226
Aleinikova, O. V., Datsii, O. I., Kalina, I. I., Zavgorodnia, A. A., Yeremenko, Y., & Nitsenko, V. S. (2023). Digital technologies as a reason and tool for dynamic transformation of territory marketing. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, (1), pp. 154–159. DOI: https://doi.org/10.33271/nvngu/2023-1/154
Zakon Ukrainy «Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy» (2017) [The Law of Ukraine "On the Basic Principles of Cyber Security of Ukraine"]. Available at: https://zakon.rada.gov.ua/laws/show/2163-19#Text
Gorbachenko S. (2020) Kiberbezpeka yak skladova ekonomichnoi bezpeky Ukrainy [Cyber security as a component of economic security of Ukraine]. Galician Economic Bulletin. No 5 (66). Pp. 180–186.
Enterprise cyber security: what to consider. (2022). Kiberbezpeka pidpryiemstva: shcho vrakhovuvaty [Enterprise cyber security: what to consider]. Available at: https://jurliga.ligazakon.net/news/209245_kberbezpeka-pdprimstva-shcho-vrakhuvati