PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2020 | z. 149 | 507--519
Tytuł artykułu

Analysis of the Internet Activity of Employees in the Context of Threats and Their Activity in the Network - a Case Study

Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Purpose: The aim of the article is to analyse selected aspects of network threats and Internet activity of the organization's employees. Design/methodology/approach: The article consists of two parts. The first one is theoretical. The second is a case study of an educational organization along with an analysis of selected aspects. Findings: Some network applications used by employees carry a high risk for the organization. On the one hand, they can be a vector of malware in an organization, they can contain the latest security vulnerabilities, use significant network resources or can hide the activity of attackers. On the other hand, they are of little importance to business: they are not related to the work and the activities of the organization. Practical implications: Analysis of user activity in the context of information security allows achieving tangible benefits, especially in increasing the level of information security. It also gives you the ability to tune and better match existing security solutions or implement new ones. Originality/value: This article contains a case study of a university unit in terms of threats related to users' online activity. The article presents the actual data collected for a period of eighteen months related to the activity of users on the network, as well as threats that have been recorded in the organization. (original abstract)
Rocznik
Numer
Strony
507--519
Opis fizyczny
Twórcy
  • University of Lodz
Bibliografia
  • 1. AV Test. The Independent IT-Security Institute. Retrieved from https://www.av-test.org/ en/statistics/malware/, 23.07.2019.
  • 2. Baig, A. Top 5 Countries Where Cyber Attacks Originate. Retrieved from https://securitytoday.com/Articles/2017/03/03/Top-5-Countries-Where-Cyber-Attacks- Originate.aspx?m=1&Page=1, 23.07.2019.
  • 3. CERT Polska (2019). Krajobraz bezpieczeństwa polskiego Internetu. Raport roczny z działalności CERT Polska 2018. Retrieved from https://www.cert.pl/wp-content/ uploads/2019/05/Raport_CP_2018.pdf, 23.07.2019.
  • 4. Chebyshev, V., Sinitsyn, F., Parinov, D., Liskin, A., Kupreev, O. (2018). IT threat evolution Q2 2018. Statistics. Retrieved from https://securelist.com/it-threat-evolution-q2-2018- statistics/87170/, 23.07.2019.
  • 5. Cofense Annaul Phishing Report 2019. Phishing Threat & Malware Review 2019. Retrieved from https://cofense.com/phishing-threat-malware-review-2019/, 23.07.2019.
  • 6. Cook, S. 2017-2019 Ransomware statistics and facts. Retrieved from https://www.comparitech.com/antivirus/ransomware-statistics/, 23.07.2019.
  • 7. Dobran, B. 27 Terrifying Rasomware Statistics & Facts You Need To Read. Retrieved from https://phoenixnap.com/blog/ransomware-statistics-facts, 23.07.2019.
  • 8. G Data. Malware figures for the first half of 2018. The danger is on the web. Retrieved from https://www.gdatasoftware.com/blog/2018/09/31037-malware-figures-first-half-2018- danger-web, 23.07.2019.
  • 9. Heathfield, S. Surfing the Web at Work. Retrieved from https://www.thebalancecareers.com/surfing-the-web-at-work-1919261, 23.07.2019.
  • 10. Kujawa, A., Zamora, W., Umawing, J., Segura, J., Tsing, W., Arntz, P., Boyd, C., Malwarebytes Labs (2019). 2019 State of Malware. Retrieved from https://resources.malwarebytes.com/resource/2019-state-malware-malwarebytes-labs- report/?utm_source=blog&utm_medium=post&utm_campaign=0119_ws_stateofmalwarer eportq119_mb, 23.07.2019.
  • 11. Morgan, S. Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021. Retrieved from https://cybersecurityventures.com/global-ransomware-damage- costs-predicted-to-reach-20-billion-usd-by-2021/, 23.07.2019.
  • 12. Olenick, D. Atlanta ransomware recovery cost now at $17 milliond, reports say. Retrieved from https://www.scmagazine.com/home/security-news/ransomware/atlanta-ransomware- recovery-cost-now-at-17-million-reports-say/, 23.07.2019.
  • 13. POLON Rejestry publiczne. Retrieved from https://polon.nauka.gov.pl/opi/aa/rejestry/ szkolnictwo?execution=e2s1, 23.07.2019.
  • 14. Vulnerability Database. Retrieved from https://vuldb.com/?exploits.20181108, 23.07.2019.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171604323

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.