Abstract
The authors, relying on statistical data and practical experience, define illegal impact on the critical information infrastructure of the Russian Federation as an actively developing area. The article illustrates three most common methods of impact on objects of the critical information infrastructure of the Russian Federation: DDOS attack, infection with malware, exploitation of vulnerabilities in software and equipment of a subject of the critical information infrastructure of the Russian Federation.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have