2018
DOI: 10.28925/2663-4023.2018.2.4767
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Cyber Cruise of Informational Resources of Automated Banking Systems

Abstract: The modern development of high technologies and computer technology greatly enhanced the development of automated banking systems of banking sector organizations and allowed the synthesis of information and communication technologies for their formation. However, the era of high technology has increased the range of threats to banking information resources; threats have gained signs of hybridity and synergy. In these conditions, the current issue in shaping the information security management system in banking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Shkodinsky [12] conducted a critical review of the domestic and foreign scientific literature and practical recommendations to ensure the protection of the banking institution from cyber threats in the digital economy. Yevseiev et al [27]. proposed an advanced classification of threats to bank information resources.…”
Section: Literature Surveymentioning
confidence: 99%
“…Shkodinsky [12] conducted a critical review of the domestic and foreign scientific literature and practical recommendations to ensure the protection of the banking institution from cyber threats in the digital economy. Yevseiev et al [27]. proposed an advanced classification of threats to bank information resources.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [30], the authors propose an improved version of the classifier of threats to banking information as one of the resources of critical cybernetic information systems (CCIS) of the state, taking into account their synergies and synergies of security components. Fig.…”
Section: Fig 1 Relationship Of Ccis With Cpsmentioning
confidence: 99%
“…The highest value in the resulting matrix is 6.0, corresponding to the pair (3,5). As you can see from the original incident matrix, they are practically not shared in the business processes under consideration, therefore, joint protection of these resources will lead to the protection of different groups of business processes.…”
Section: Business Processesmentioning
confidence: 99%