RESEARCH OF METHODS OF PROTECTION AGAINST CYBERCRIME

ON THE INTERNET

Natalia A. Golovacheva

Senior Lecturer, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Maria D. Maslakova

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. Modern technologies have become a part of our daily lives, providing us with many amenities and opportunities. In the process of using these technologies, we often forget about the risks of losing privacy. Smartphones, tablets, and laptops – all these devices can track our actions and disclose a lot of information about us, especially when using certain programs and services. The urgency of this problem is evidenced by the increase in crimes in cyberspace. We are increasingly hearing in the news about cases of fraud on the Internet. More and more people are being attacked by online scammers. There is also an increase in the online activity of extremist, terrorist, and illegal communities on the network. We face anonymity, cases of manipulation of information on the Internet (for example, sexting and cyberbullying), the development of new forms of deviant behavior, and youth criminal subcultures in the virtual world. Due to the rapid development of technology, it is necessary to analyze the development of crimes in cyberspace. The article analyzes cybercrime and methods of defense against it on the Internet. Criteria for an adequate evaluation of methods of protection against cybercrime on the Internet are identified. And within the framework of experimental research, the best method of protection is determined, taking into account the requirements and needs of the user.

Key words: cybercrime, computer crimes, hacking, cyberattack, antivirus software, firewall, cryptographic information security, intrusion detection tools.


Creative Commons License

This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (2_Golovacheva, Maslakova.pdf) 2_Golovacheva, Maslakova.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/909
51 DownloadsUpdate this file (2_Golovacheva, Maslakova.pdf)