RESEARCH OF METHODS OF PROTECTION AGAINST CYBERCRIME
ON THE INTERNET
Natalia A. Golovacheva
Senior Lecturer, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Maria D. Maslakova
Student, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Abstract. Modern technologies have become a part of our daily lives, providing us with many amenities and opportunities. In the process of using these technologies, we often forget about the risks of losing privacy. Smartphones, tablets, and laptops – all these devices can track our actions and disclose a lot of information about us, especially when using certain programs and services. The urgency of this problem is evidenced by the increase in crimes in cyberspace. We are increasingly hearing in the news about cases of fraud on the Internet. More and more people are being attacked by online scammers. There is also an increase in the online activity of extremist, terrorist, and illegal communities on the network. We face anonymity, cases of manipulation of information on the Internet (for example, sexting and cyberbullying), the development of new forms of deviant behavior, and youth criminal subcultures in the virtual world. Due to the rapid development of technology, it is necessary to analyze the development of crimes in cyberspace. The article analyzes cybercrime and methods of defense against it on the Internet. Criteria for an adequate evaluation of methods of protection against cybercrime on the Internet are identified. And within the framework of experimental research, the best method of protection is determined, taking into account the requirements and needs of the user.
Key words: cybercrime, computer crimes, hacking, cyberattack, antivirus software, firewall, cryptographic information security, intrusion detection tools.
This work is licensed under a Creative Commons Attribution 4.0 International License.