CYBER THREATS MODELING: AN EMPIRICAL STUDY

Authors

Keywords
empirical model, cyber threats, shadow digital economy

Abstract
The immediacy of this study is determined by the need to fight back against the modern cyber threats that arise in the process of building a digital economy. The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.

Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.

Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics.

Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and mid-sized businesses and government information systems every day.

The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.

It should be assumed that there is a need to update the theoretical and methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.

The article logically combines the study of the modern landscape of cybersecurity threats, the construction of an empirical model of security threats (with the allocation of a monetization block), the demonstration of the results of processing statistical data characterizing the distribution of the frequency of occurrence of specific threats.

The paper aims to build an empirical model of cyber threats based on a study of huge number of relevant literature sources and statistical data.

JEL: E26, C8, O17, M15
Pages: 17

To view the full text of the article click on the relevant button below.

More titles

  • THE ROLE OF HRM IN EMPLOYEE MOTIVATION: STRATEGIES AND KEY FACTORS IN THE MODERN WORKPLACE (EXAMPLE OF GEORGIA)

    An effective human resource management (HRM) system plays a pivotal role in the success of organizations and institutions. In today's dynamic landscape, enhancing service quality and gaining public trust are inextricably linked to motivating employees, evaluating their performance, defining clear responsibilities, and fostering a strong ...

  • THE ROLE OF HUMAN CAPITAL FOR ECONOMIC DEVELOPMENT IN A DIGITALIZED WORLD

    The article is aimed at studying the features of the relationship between economic development, human capital and information and communication technologies. The panel sample includes data for 87 countries for 2019. The study uses the World Bank approach to classify countries to groups by income levels. The relationships between the analysed ...

  • SOCIO-ECONOMIC ASPECTS AND RISKS OF URBANIZATION IN KAZAKHSTAN

    The article presents theoretical and practical issues of urbanization. The paper explores the theoretical concepts of regional development and their specific practical implementation. The statistical data on the population of the Republic of Kazakhstan for 2019 and 2020 are analyzed. An analysis of the factors of urbanization in the regions of ...