PHISHING, DDOS ATTACKS AND OTHER CYBERATTACKS - HOW TO PROTECT YOURSELF
Keywords:
phishing, DDoS attacks, cyber attacks, cybersecurity, threat classification, information protection, threat detection, counteraction to attacksAbstract
The paper analyzes scientific research and practice of implementing methods and tools to counter phishing, DDoS attacks and other types of cyberattacks. The features of cybersecurity are considered, including the classification of threats, methods for their detection and means of protection. The subject area of cyberdefense is analyzed, the main essences of attacks, their properties and potential consequences for computer systems are determined. The functional requirements for protective software are studied and methods for detecting threats based on their characteristics are considered.
References
Державна служба спеціального зв’язку та захисту інформації України. Державна служба спеціального зв’язку та захисту інформації України. URL: https://cip.gov.ua/ua/news/nakaz-ad-2021-10-06-601 (дата звернення: 23.03.2025).
ELARTU – Інституційний репозитарій ТНТУ імені Івана Пулюя: Методи захисту від кібератак на основі штучного інтелекту. ELARTU – Інституційний репозитарій ТНТУ імені Івана Пулюя: Домівка. URL: https://elartu.tntu.edu.ua/handle/lib/48319?locale=in (дата звернення: 24.03.2025).
How to spot and protect yourself from a phishing attack. Cybersecurity Guide. URL: https://cybersecurityguide.org/resources/phishing/ (date of access: 24.03.2025).
Guide to Understanding & Protecting Against DDoS Attacks. Makes Email Safe For Business: Microsoft 365, Google Workspace. URL: https://guardiandigital.com/resources/blog/ddos-attack-protection (date of access: 24.03.2025).
How to Spot and Avoid Phishing Attacks: Expert Tips for Online Safety | Hivenet. Hivenet: Distributed Cloud Storage & Computing | Secure, Sustainable. URL: https://www.hivenet.com/post/how-to-protect-yourself-from-phishing-attacks-top-tips-to-avoid-scams (date of access: 24.03.2025).