IMPROVEMENT OF COMPUTER SYSTEM PROTECTION ASSESSMENT METHODS AGAINST HARMFUL SOFTWARE CODE

Authors

DOI:

https://doi.org/10.17721/ISTS.2024.7.5-10

Keywords:

identification, information security, eGovernment, organization of information security, firewalls

Abstract

Background. The issue of ensuring information security (IS) of state information systems today is not only not losing relevance, but with the development of the concept of eGovernment in countries and an increase in the number of e-services, it is becoming increasingly important.

Methods. The work used the method of analyzing the evaluation of the protection of the computer system against malicious software code, with the help of the method of optimization and evaluation of the protection of the computer system, the method of malicious software code was improved.

Results. The work improving the method of assessing the information security of computer systems from malicious software includes a recommendatory aspect of building e-government.

Conclusions. Cybersecurity threats, such as spam, phishing, spyware, and botnets, pose challenges for governments, especially for such young governments in any developing country. Malicious authors (hackers) create new combined threats to counter the security of the information system. New threats make it possible to bypass system firewalls, workstation configurations and various other intrusion detection systems. Many governments are working on cybersecurity legislation to help protect consumers and themselves. Some legislative efforts are focused on establishing government structures to provide support against systemic attacks. Some government legislation has been designed to prosecute criminals in order to deter criminal activity. The legislation has well developed a basis for the detection, analysis and internal prevention of malicious software. To effectively manage cybersecurity threats, governments must be involved from the beginning of the process to the end of the process. Businesses need to know where and to whom to report security risk information, and the government needs to support it. Improving the method of assessing the information security of computer systems from malicious software contains a recommendatory aspect of building an electronic government. The steps of building e-government, in contrast to the existing ones, differ in the completeness of the content of each stage of building e-government.

Downloads

Download data is not yet available.

References

Marco, P., & Marco, R. (2021). Security considerations about the adoption of web 2.0 technologies in sensitive eGovernment processes. In Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, ICEGOV'11 (pp. 285–288), New York, USA, ACM.

Benjamin, E., Hofmeyr, S., Forrest, S., & Michel, van Eeten (2015). Analyzing and modeling longitudinal security data, Promise and pitfalls. In Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015 (pp. 391–400), New York, USA, ACM.

Malik, S., Peter, B., & Omer, F. Rana (2015). Estimating risk boundaries for persistent and stealthy cyber-attacks. In Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig'15 (pp. 15–20), New York, USA, ACM.

Published

2024-07-01

Issue

Section

Cybersecurity and information protection

How to Cite

IMPROVEMENT OF COMPUTER SYSTEM PROTECTION ASSESSMENT METHODS AGAINST HARMFUL SOFTWARE CODE. (2024). Information Systems and Technologies Security, 1(7), 5-10. https://doi.org/10.17721/ISTS.2024.7.5-10

Most read articles by the same author(s)