Abstract

The paper deals with the problem of classification of current models of cyber threats to infocommunication systems according to various modern factors in combination with the classical methodology. In accordance with this task of determining the current model of cyber-threats of digital data processing is considered as adaptive correction of modern cyber-threats according to current DARPA R&D. While for IT developers, threat modeling is a complex process with a bunch of pitfalls, for Internet users it's a fairly straightforward set of rules that can greatly en-hance your individual security on the Internet. Practice shows that most of the protected area flows from technical data chan-nels. The signal is distributed in a particular physical environment, it can be acoustic or electromagnetic, its interception is by means of mortgage devices and other ways. Devices can intercept electromagnetic radiation data, acoustic and visual in-formation. This method of interception is protected by restricting access to the pro-tected object Many try to hide behind technology, ignoring people and procedures. Sufficient attention should be paid to the entire security triad: people, procedures, technology. Cyber hygiene has long been widely used in effectively operating companies around the world. Knowing your risks requires working with people, implementing technolo-gy, and managing policies and procedures. When investigating different types of cyber threats, the main and often overrid-ing component is the victim's communication channel and the attacker's or insider's management system with its curators. Often, this link is hidden. Therefore, exploring these communication channels is the most important step in the cyber-threat inves-tigation process as a whole.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.