Conference PaperPDF Available

Cyber Threats and Cyber Security in Corporate Environment (OGIK'2018)

Authors:

Abstract

The purpose of my paper is to describe the most common types of attacks and vulnerabilities cocerning the company's data and systems using a developed, detailed model, introduce the scope of those who are responsible for the damage and also the core elements of creating IT security for the company.
01 23456478479
! "# $
%&'()*+,-./01(
2
3
456789:;8<=>?@AB7<C9DE
FGHGIJKLMNJMGOPHQMRKNSH
T0,0/0*U0V'0,WX,'YZ0*[\]'0,&[,WV0,WX,1(0,U*0]1,]'(&0^0/0V1[,
WX,&VXW*/]1&WV,['&0V'0,]V+,WV0,WX,1(0,'W*V0*[1WV0[,WX,&1[,X_*1(0*,
+0^0`W\/0V1a,bY,1(0,cV10*V01,'WVV0'1&VU,/&``&WV[,WX,_[0*[d,e0,(]^0,
'*0]10+,]V,&V0f(]_[1&Z`0,e]*0(W_[0,WX,+]1]d,]V+,e0,(]^0,'*0]10+,
1(0,W\\W*1_V&1Y,1W,eW*gd,(]^0,X_Vd,0f'(]VU0,+]1],]V+,'WVV0'1&WV,
h,*0U]*+`0[[,WX,+&[1]V'0,h,1(*W_U(,/]&`,[Y[10/[,]V+,[W'&]`,V01eW*g[a,
iWe0^0*d,'YZ0*[\]'0,&[,VW1,WV`Y,1(0,['0V0,WX,&VVW^]1&WV,Z_1,]`[W,
\*W^&+0[,W\\W*1_V&1&0[,XW*,]Z_[0d,+]1],'W**_\1&WV,]V+,1(0,_V]_1(W*&j0+,
_[]U0d,/]V&\_`]1&WV,W*,+0[1*_'1&WV,WX,ck,[Y[10/[,]V+,V01eW*g[a,
T0,\_*\W[0,WX,/Y,\]\0*,&[,1W,+0['*&Z0,1(0,/W[1,'W//WV,1Y\0[,WX,
]11]'g[,]V+,^_`V0*]Z&`&1&0[,'WV'0*V&VU,1(0,'W/\]VYl[,+]1],]V+,[Y[10/[,
_[&VU,],+0^0`W\0+d,+01]&`0+,/W+0`d,&V1*W+_'0,1(0,['W\0,WX,1(W[0,e(W,]*0,
*0[\WV[&Z`0,XW*,1(0,+]/]U0,]V+,]`[W,1(0,'W*0,0`0/0V1[,WX,'*0]1&VU,ck,
[0'_*&1Y,XW*,1(0,'W/\]VYa,
mYZ0*[\]'0,&[,],U`WZ]`,ck,+W/]&V,1(]1,(][,],V_/Z0*,WX,[0'_*&1Y,'*&1&']`,
X0]1_*0[,+_0,1W,&1[,\0'_`&]*,'(]*]'10*&[1&'[,1(]1,&V'*0][0,&1[,^_`V0*]Z&`&1Ya,
n(0V,0f\`W*&VU,'YZ0*,+0X0V[0,e0]gV0[[0[d,[0^0*]`,]\\*W]'(0[,(]^0,1W,
Z0,1]g0V,&V1W,]''W_V1a,oV,]11]'g,']V,'W/0,\(Y[&']``Y,X*W/,0f10*V]`,W*,
&V10*V]`,[W_*'0[d,/]Y,_[0,10'(V&']`p10'(VW`WU&']`,/01(W+[,W*,+0'0\1&WVd,
]V+,&1,']V,]`[W,W''_*,&V,\(Y[&']`d,&VXW*/]1&WV]`,W*,'WUV&1&^0,+&/0V[&WV[a,
T0,[\0'1*_/,WX,\0*\01*]1W*[,'W^0*[,]V,0f1*0/0`Y,e&+0,*]VU0,X*W/,
&V+_[1*&]`,[\&0[,1W,']*0`0[[,0/\`WY00[a,kW+]Yd,]``,'YZ0*,]11]'g0*[,]*0,
'WV[&+0*0+,][,(]'g0*[,ZY,\_Z`&',W\&V&WVd,*0U]*+`0[[,WX,e(01(0*,1(0Y,
\0*XW*/,(]*/X_`,]'1&WV[,&V,'YZ0*[\]'0,W*,\_1,1(0&*,gVWe`0+U0,&V,1(0,
[0*^&'0,WX,[0'_*&1Ya,cV,1(0,'WV10f1,WX,1(0&*,UW]`[d,[W'&]`,0VU&V00*[,1]*U01,
1(0,e0]gV0[[0[,WX,(_/]V,V]1_*0d,'*]'g0*[,+0[1*WYd,Z`]'g,(]1,(]'g0*[,]&/,
]1,V01eW*g,\0V01*]1&WVd,e(&10,(]1,(]'g0*[,]*0,eW*g&VU,1W,+010'1,]V+,
*0\]&*,^_`V0*]Z&`&1&0[a,T0,Z&UU0[1,+]/]U0[,1W,'W/\]V&0[,]*0,']_[0+,ZY,
&V+_[1*&]`,[\&0[d,(]'g1&^&[1[,]V+,1(0,[Wq']``0+,iros,['0V0[a,
i_/]V[,]*0,1(0,e0]g0[1,'YZ0*[0'_*&1Y,`&Vga,t01(W+[,WX,\[Y'(W`WU&']`,
0123456478479
!"#$
%$&"'"$(#(&#)*+%
%,&"#-""!&$%
-%*.,#"!
%(#/#!$$#)"""
#)&$#%# #%#$*
0(##%##)#"%#)%%1)
###&1"2&#)"
")"$#11*3
!$%#(!14%
"","1$#"*
5##"%$%&$%"(%1
%##6$#(#(&"$!$
##"%"/##$%#(76*5
#$1"$"$*.
#!""""$1#(
#(###1)*8#$"$"
%1)##"!"
92!&(%&(""#%*:#
%#($%(%%91!"##
#*0!%(##)#(""
###(#&"1%"#"!
(#!"/#!#*.""%%"
%$!%"!$#(
1(%%#"
%!#*0%($"$1"
"&&#)"2#*
5$%#"#&"&!9"%
#%##"9#&$#%&
$#/#!#(&#*;%%%6"/
9#(%6##1"9#$
6.0#(6#(&"$)($#&#$
%%%*
<=>?@@ABCBDEF#(&##(&#).0#("#(#
%(##)1%#)#(!
#(1#!6".0#(
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.