Abstract

The goal of the study creation of a protection model against cyberattacks on information and telecommunication resources used in practice Internet voice exchange services (VoIP). Research methods: analysis of Best Practices and scientific publications, system analysis, criterion comparison. Result: systematization of the cyberattacks main methods on VoIP and methods of protection against them, based on existing Best Practices and scientific publications. The investigation methodological scheme presented in a schematic form, is described. As a result, a list of 8 specialized and 9 main methods of cyberattacks, as well as 4 specialized and 10 main methods of protection was obtained, which made it possible to create a protection generalized model against cyberattacks on VoIP. The model representation in tabular form consists of 17 rows and 14 columns, which corresponds to the number of all cyberattack methods and protection methods. The cells of the table contain expertly obtained values of the effectiveness of counteracting cyberattacks by each of the protection methods according to a 3-point system. The model is extended with additional integral indicators of the danger of cyberattacks and the effectiveness of protection obtained analytically. 3 cyberattacks least amenable to protection and 3 most effective protection methods were identified. The scientific novelty consists in bringing together the whole set of cyberattacks methods on VoIP and protection against them methods into a single system that characterizes the effectiveness of countering.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call