Журнал «Современная Наука»

Russian (CIS)English (United Kingdom)
MOSCOW +7(495)-142-86-81

OVERVIEW OF TECHNICAL MEASURES TAKEN BY AN INTERNET AGGRESSOR FOR A SUCCESSFUL ACT OF CYBERBULLYING AND COMPUTER COUNTERMEASURES

Krepak Ivan   (postgraduate student, assistant, Financial University under the Government of the Russian Federation )

Scientific article’s purpose is to determine current tools and methods for carrying out acts of Internet aggression for a detailed study of manipulations and formation of measures to counteract cyberbullying. Internet bullying incidents from information security point of view occur with various sets of hardware and software, differ depending on intruder’s motives, his information security tools knowledge, legitimate and malicious software. Cyber aggressor’s separate criterion is the time restrictions, it is due to the hardware resources consumption of devices in operation. Detailed analysis of malware and information systems used was defined as a methodology. Since most acts of Internet bullying in the network space of the CIS countries occur in social networks, there are leaks of personal data and their improper use. To understand effectiveness of pinpoint qualification of information security incidents, the background state of Internet bullying in the school community was analyzed. Correlating current trends with a possible background situation contributes to the correct qualification of events and the selection of corrective technical countermeasures. Modern high school students, despite the high level of background cybercrime and the entertaining nature of such acts, are ready to positively cooperate with educational institutions’ administration for passive counteraction. Despite the fact that IT development computer attacks’ vector expansion, there is a positive trend in the intention to counteract.

Keywords:information security incident, virtual aggression, cyberbullying, OSINT, ISP, indicator of compromise, personal data leak, IS event filters, computer warfare

 

Read the full article …



Citation link:
Krepak I. OVERVIEW OF TECHNICAL MEASURES TAKEN BY AN INTERNET AGGRESSOR FOR A SUCCESSFUL ACT OF CYBERBULLYING AND COMPUTER COUNTERMEASURES // Современная наука: актуальные проблемы теории и практики. Серия: Естественные и Технические Науки. -2025. -№02. -С. 88-92 DOI 10.37882/2223-2966.2025.02.16
LEGAL INFORMATION:
Reproduction of materials is permitted only for non-commercial purposes with reference to the original publication. Protected by the laws of the Russian Federation. Any violations of the law are prosecuted.
© ООО "Научные технологии"