Центр научного сотрудничества "Интерактив плюс"
info@interactive-plus.ru
+7 (8352) 222-490
2130122532
Центр научного сотрудничества «Интерактив плюс»
RU
428000
Чувашская Республика
г.Чебоксары
ул.Гражданская, д.75
428000, Россия, Чувашская Республика, г. Чебоксары, улица Гражданская, дом 75
+7 (8352) 222-490
RU
428000
Чувашская Республика
г.Чебоксары
ул.Гражданская, д.75
56.125001
47.208966

Cyberattacks of Companies in Social Media and How to Protect Against Them

Proceeding
International Scientific and Practical Conference «Science, education, society: trends and prospects»
Creative commons logo
Published in:
International Scientific and Practical Conference «Science, education, society: trends and prospects»
Author:
Boiarinova A. G. 1
Scientific adviser:
Savina S.V.1
Work direction:
Экономика (экономическая теория, финансы, бухгалтерский учет, статистика и др.)
Rating:
Article accesses:
898
Published in:
eLibrary.ru
1 FSFEI of HE "Financial University under the Government of the Russian Federation"
For citation:
Boiarinova A. G. (2020). Cyberattacks of Companies in Social Media and How to Protect Against Them. Science, education, society: trends and prospects, 229-231. Cheboksary: SCC "Interactive plus", LLC.

  • Metadata
  • Full text
  • Metrics

Abstract

In this article, the impact of cyberattacks on social media and ways of their prevention are considered. Methods and motives of cyberattacks are analyzed, and the types of cyberattacks are described. The article contains all the information a company needs to know about cyberthreats and cyberattacks.

References

  1. 1. Sood A. Targeted cyberattacks: multi-staged attacks driven by exploits and malware / A. Sood, R. Enbody. – Elsevier Science, 2014. – 158 p.
  2. 2. Cyberattacks [Электронный ресурс]. – Режим доступа: www.akamai.com/us/en/resources/cyber-attacks.jsp
  3. 3. Social cyberattacks and how to protect against them [Электронный ресурс]. – Режим доступа: https://mondo.com/blog-social-cyberattacks
  4. 4. Social Media Cyber Attack Risks [Электронный ресурс]. – Режим доступа: https://nordic-backup.com/blog/social-media-cyber-attack-risks/

Comments(0)

When adding a comment stipulate:
  • the relevance of the published material;
  • general estimation (originality and relevance of the topic, completeness, depth, comprehensiveness of topic disclosure, consistency, coherence, evidence, structural ordering, nature and the accuracy of the examples, illustrative material, the credibility of the conclusions;
  • disadvantages, shortcomings;
  • questions and wishes to author.