Abstract

The prerequisites for the study are the widespread use of blockchain technology in various sectors of human life support where its application is an opportunity to repel cyber threats the forms of manifestation of which will only increase in the age of new technologies. The spread of cyber threats necessitates a set of measures aimed not only at identifying and combating them but also at active working to prevent their spread. The study aims to comprehensively study the use of blockchain technology in countering cyber threats. The research methods are as follows: a reasonable combination of the general scientific dialectical method with legal positivism; social relations and phenomena and their interaction with scientific categories in dialectical unity; consideration of a separate process based on comparative legal positivism; scientific methods of analysis and synthesis, induction and deduction. Results and novelty: today the creation and functioning of security systems, given the multiple nature of the factors of influence on electronic and telecommunication systems, should be complex; local attempts to counter cybercrime give short-term and ineffective results. Arguments are presented for the fact that today blockchain technology is one of the most modern means of countering cybercrime. This is due to the fact that it has a significant period of operation which allows conclusions to be drawn about its functionality and effectiveness, the availability of proven material and technical means and technologies for its implementation in the social sphere, as well as the possibility of its further development and improvement in relation to countering cyber threats in the conditions and vulnerabilities of the blockchain.

Highlights

  • Imperfection of the material and technical support of electronic and telecommunication systems affects the possibility of a criminal impact on the considered elements

  • The existence and further development of parallel electronic and telecommunication networks which has received the name of the “deep network” (“dark Internet”, etc.), is recognized as quite harmful and unsafe for the existence and functioning of generally recognized electronic and telecommunication networks, and as a result, harmful to the geopolitical structure of the world

  • It is argued that cyber terrorism forms the rapprochement of two worlds – virtual and physical [13]

Read more

Summary

Introduction

A significant breakthrough has been made in technological terms, which has made it possible to significantly increase the effectiveness of its use in almost all spheres of the functioning of modern society. Alternative systems and technologies have begun to appear and are actively used, operating alongside official, publicly available systems. This situation is inevitable, given the nature of its functioning and the legal order of regulation of the industry in question. There is an active introduction of the achievements of scientific and technological progress to increase the efficiency of the operability of electronic and telecommunication systems on a global scale. It would be absurd to assume that such technologies have been deprived of the attention of illegal (criminal) structures of various levels

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.