Cyberfraud: new methods, old target
Автор: Shevko N.R., Lukina M.A.
Журнал: Виктимология @victimologiy
Рубрика: Предупреждение преступности
Статья в выпуске: 2 т.12, 2025 года.
Бесплатный доступ
The introduction of information technologies into all spheres of society has greatly simplifi ed the processes of citizens' appeals to government bodies, receiving government services electronically, and exchanging data between departments. All thanks to the fact that all necessary information is stored in abconvenient format - electronically. However, this also required special attention to the protection of confi dential information, ensuring safe handling of personal data. After all, by placing information in virtual space, it becomes possible for persons not authorized to read and use it to access it. Accordingly, vulnerabilities in the protection of personal data arise. They are not always related to software imperfections. Often, attackers, under various pretexts, using social engineering tools, provoke users to provide third parties with access to personal accounts. The authors present the most common schemes of fraudulent actions in the fi eld of computer information, as well as their consequences. The theoretical material is supported by offi cial statistical data on this issue, abstatistical analysis of data on the regions of the Russian Federation on the number of registered crimes of this category, as well as on the number of people who committed them.
Cybercrime, cyber fraud, cyber threat, cyber defense, data protection, phishing, information technology crime, computer information fraud
Короткий адрес: https://sciup.org/14133263
IDR: 14133263 | DOI: 10.47475/2411-0590-2025-12-2-250-259