ANALYSIS OF SECURITY THREATS AND INFORMATION PROTECTION MEASURES IN COMPUTER SYSTEMS OF HIGHER EDUCATION INSTITUTIONS
Abstract and keywords
Abstract (English):
The article conducts an analysis of current cyber threats targeting Russia. The tactics, techniques, and consequences of attacks are examined, and key protective measures for safeguarding information systems against external influences are systematized. The study is based on data from the FSB of Russia, Positive Technologies reports, and other authoritative sources. An algorithm for the cyclic update of protective measures in the information systems of higher educational institutions is proposed.

Keywords:
cybersecurity, phishing, malware, social engineering, DDoS attacks, vulnerabilities, data protection, cyber threats, public Wi-Fi networks, information security, multi-level access control, cyclic update of protective measures algorithm
Text
Text (PDF): Read Download
References

1. Federal Security Service of the Russian Federation. Official statement "The FSB of Russia has recorded more than five thousand hacker attacks on critical infrastructure of the Russian Federation since the beginning of 2022" dated April 13, 2023 [Electronic resource]. – URL: http://www.fsb.ru/fsb/press/message/single.htm!id=10439694@fsbMessage.html (accessed: March 17, 2025).

2. Kaspersky Cyber Threat Intelligence. Cyber threat landscape for Russia and the CIS 2024: analytical report / N. Nazarov, N. Shornikova, V. Burtsev [et al.] – Kaspersky, 2024. – 121 p. [Electronic resource]. – URL: https://www.kaspersky.ru/go/threat-landscape (accessed on April 4, 2025).

3. A Complete Guide to Phishing Attacks // Habr. – 2021. – February 25. [Electronic resource]. – URL: https://habr.com/ru/companies/varonis/articles/544140/ (accessed on March 18, 2025).

4. Phishing Emails: How to Recognize Them and Avoid Becoming Their Victim // Kaspersky. – 2023. – [Electronic resource]. – URL: https://www.kaspersky.ru/resource-center/preemptive-safety/phishing-prevention-tips (accessed on March 19, 2025).

5. Budarny G.S., Dyusmetova A.A., Kazantsev A.A., Krasov A.V. Social engineering: its methods and ways of protection // Actual problems of infotelecommunications in science and education (APINO 2023): Collection of scientific articles. XII International scientific, technical and scientific-methodical conference. In 4 volumes, St. Petersburg, February 28 – January 2, 2023. Volume 1. - St. Petersburg: St. Petersburg State University of Telecommunications named after prof. M.A. Bonch-Bruevich, 2023. - P. 200-204. - EDN PWVWPZ.

6. Matveev D.V. Phishing in the era of digitalization: methods and strategies of protection // Trends in the development of science and education. - 2024. - No. 115-6. - P. 110-115. – DOIhttps://doi.org/10.18411/trnio-11-2024-262. – EDN MSYLUK.

7. Current Cyber Threats: Q1 2024 // Positive Technologies. – 2024. – May 22 [Electronic resource]. – URL: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2024-q1/ (date of access: March 21, 2025).

8. Streltsov D. Current Cyber Threats: Q2 2024 // Positive Technologies. – 2024. – August 22 [Electronic resource]. – URL: https://www.ptsecurity.com/ru-ru/research/analytics/aktualnye-kiberugrozy-ii-kvartal-2024-goda/#id2 (date of access: March 21, 2025).

9. Golushko A. Current cyber threats: Q4 2024 – Q1 2025 / A. Golushko // Positive Technologies. – 2025. – March 20 [Electronic resource]. – URL: https://www.ptsecurity.com/ru-ru/research/analytics/aktualnye-kiberugrozy-iv-kvartal-2024-goda-i-kvartal-2025-goda/ (date of access: April 1, 2025).

10. Central Bank of the Russian Federation. Attack 2024: [report] / Bank of Russia. – Moscow, 2024. – 50 p. [Electronic resource]. – URL: https://cbr.ru/Collection/Collection/File/55129/Attack_2024.pdf (date of access: 04.04.2025).

11. Methods for detecting vulnerabilities in security systems // Hanston. – 2024. – February 29. [Electronic resource]. – URL: https://hanston.ru/press-centr/metody-obnaruzheniya-uyazvimostej-v-sistemah-bezopasnosti/ (date of access: 22.03.2025).

12. What is social engineering? // Kaspersky. – 2023. [Electronic resource]. – URL: https://www.kaspersky.ru/resource-center/definitions/what-is-social-engineering (date of access: 23.03.2025).

13. Protodyakonova A.V., Dmitrieva A.N. Information security and the Internet // Current issues of modern science: theory, methodology, practice, innovation: Collection of scientific articles based on the materials of the XIII International scientific and practical conference, Ufa, November 17, 2023. – Ufa: Scientific Publishing Center "Vestnik Nauki", 2023. – Pp. 228-231. – EDN ZKRMYA.

14. Zherokov Z.A., Georgiev I.S. Information security in social networks // Current issues of modern education: Collection of scientific papers. – Kirov: Interregional Center for Innovative Technologies in Education, 2024. – Pp. 78-80. – EDN CKZYJL.

15. Ermakov M.G. "Telephone" fraud // Problems of combating crime in the context of digitalization: theory and practice: Collection of articles from the XVIII International Scientific and Practical Conference, Barnaul, June 29, 2020 / Editors S.I. Davydov, V.V. Polyakov. Volume Issue XVI. – Barnaul: Altai State University, 2020. – Pp. 51-55. – EDN CQTEFK.

16. What are DDoS attacks and how can a telecom operator protect itself from them // VAS Experts. – 2024. – January 11. [Electronic resource]. – URL: https://vasexperts.ru/blog/dpi/chto-takoe-ddos-ataki-i-kak-ot-nih-zashhititsya-operatoru-svyazi/ (date of access: 24.03.2025).

17. Bondarev V.V. Introduction to information security of automated systems: textbook. – 3rd ed. – Moscow: Publishing house of Bauman Moscow State Technical University, 2021. – 252 p.: ill. – ISBN 978-5-7038-5541-6. – EDN BGPOQZ. [Electronic resource]. – URL: https://rucont.ru/efd/808476 (date of access: 04.04.2025).

18. Parshakova M.S., Uspensky N.K. Analysis of threats and risks of using public local wireless Wi-Fi networks // Fundamental and applied scientific research: current issues, achievements and innovations: collection of articles. XXXIX Int. scientific-practical. conf. - Penza: Science and Education, 2020. - Pp. 19-25. - EDN KHQLTA.

19. Skatkov A.V., Bryukhovetsky A.A., Moiseev D.V., Sukharev N.V. Models of distribution of protection resources for mitigating node failures based on the decay vector method under atypical attacks in 5G networks // Bulletin of Tula State University. Technical sciences. - 2023. - No. 7. - Pp. 512-518. – DOIhttps://doi.org/10.24412/2071-6168-2023-7-512-513. – EDN TKHXXG.

20. Trusilnikov S.V. Organization of a wireless local area network for Tomsk Trunk Company LLC // TUSUR-2009 Scientific Session: Proc. of the All-Russian Scientific and Technical Conf. – Tomsk: V-Spectr, 2008. – Part 2. – Pp. 192–194.

21. Dolgopyatov A.Yu., Dolgopyatov O.A. Software vulnerabilities // Inter-industry studies as a basis for the development of scientific thought: Collection of articles from the International Scientific and Practical Conference in 2 parts, Orenburg, December 27, 2022. Volume Part 1. – Ufa: Limited Liability Company "OMEGA SCIENCES", 2022. – Pp. 60-67. – EDN WKFGBS.

22. Shemsetdinov S. Ya., Dzhanmyradov A., Dovletova G. Ya., Bazarov B. Z. Providing recommendations for strengthening network security // Trends, factors and mechanisms for improving the effectiveness of domestic science: Collection of articles from the National (All-Russian) scientific and practical conference with international participation, Voronezh, September 22, 2024. – Ufa: OOO "Omega Science", 2024. – Pp. 45-47. – EDN KPSQQC.

Login or Create
* Forgot password?