DIGITAL TRANSFORMATION OF THE ECONOMY: THREATS TO INFORMATION SECURITY

  • Mustafaev A.G. Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia
  • Kobzarenko D.N. Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia
  • Buchaev A.Y. Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia

Abstract

The digital economy includes a variety of economic processes carried out using information technology. Digital transformation processes, including those associated with the fourth industrial revolution, open up new paradigms for the use of information technologies for users.More and more companies are building business processes based on end-to-end integration of information flows and their continuous analytics, making management decisions based on data. At the same time, these processes create new threat surfaces for a large number of economic agents. Participants in digital interactions are interested in the confidentiality of critical information or personal data.Thus, there is an acute issue of ensuring information security of technological data processing processes in organizations. The aim of the work is to consider the challenges and threats that are associated with the process of digital transformation in the economic sphere. Digital security risks are dynamic in nature, which is due to physical laws and the specifics of the digital environment, as well as human participation in these processes.Analysts have noted an increase in the number and severity of the impact of information security incidents on critical digital infrastructure, leading to large-scale disasters. These trends are driving the work of organizations and governments to ensure the information security of critical information infrastructure, such as healthcare or finance. The solution to the problem of ensuring information security of the digital economy from cyber threats should take into account that the main difference between socio-economic systems and traditional information processing systems is that the functioning of the former is directly related to business processes, which in most cases are irreversible. To overcome the described problems, information security risks in cyber-physical systems should be considered based on the methods used in the management of economic and social risks.

Keywords

data analysis, information protection, information security, cyber threat, personal data, vulnerability, digital transformation, digital economy

References

Teoh C.S., and Mahmood A.K. National cyber security strategies for digital economy // Journal of Theoretical and Applied Information Technology. 2017. Vol. 95(23). Pp. 6510-6522. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1109%2FICRIIS.2017.8002519

Digital Security Risk Management for Economic and Social Prosperity: OECD Recommendation and Companion Document (2015). OECD. URL: https://dx.doi.org/10.1787/9789264245471-en (accessed on 06.03.2021).

Recommendation of the Council on Digital Security of Critical Activities, OECD/LEGAL/0456 (2019). OECD. URL: https://www.oecd.org/digital/ieconomy/recommendation-on-digital-security-of-critical-activities.htm (accessed on 10.03.2021).

Global Cybersecurity Index 2020 (2021). ITU. URL: https://www.itu.int/epublications/publication/global-cybersecurity-index-2020/en/ (accessed on 12.03.2021).

Kuzmin V. Database // RG.RU. 2020. № 54(8108). URL: https://rg.ru/2020/03/12/mishustin-zaiavil-o-neobhodimosti-sozdaniia-cifrovogo-specnaza-v-rf.html (accessed on 15.03.2021). (In Russ.).

Sieglar M.G. Eric Schmidt: Every 2 Days We Create As Much Information As We Did Up To 2003 (2010). TechCrunch. URL: https://techcrunch.com/2010/08/04/schmidt-data (accessed on 13.03.2021).

Global Top 100 companies by market capitalisation (2020). PWC. URL: https://www.pwc.com/gx/en/audit-services/publications/assets/global-top-100-companies-2020.pdf (accessed on 15.03.2021).

Bank budushchego: bez ofisov, sotrudnikovi bez kliyentov? [The bank of the future: no offices, no employees and no clients?] (2018). Klerk.ru. URL: https://www.klerk.ru/buh/articles/477541 (accessed on 10.03.2021). (In Russ.).

Sberbank sozdal strukturu SberX, chtoby prevratit'sya v konkurenta Google [Sberbank created the SberX structure to become a competitor to Google] (2018). The Bell. URL: https://thebell.io/sberbank-sozdal-strukturu-sberx-dlya-konkurentsii-s-google-i-facebook (accessed on 15.03.2021). (In Russ.).

Gref nazval svoyey vinoy utechku dannykh kliyentov Sberbanka [Gref blamed Sberbank's customer data leak] (2019). Lenta.ru. URL: https://lenta.ru/news/2019/11/27/vina/ (accessed on 16.03.2021). (In Russ.).

RAEK: kiberprestupnost' – real'naya ugroza dlya tsifrovoy ekonomiki [RAEC: cybercrime is a real threat to the digital economy] (2017). RAEC. URL: https://raec.ru/live/raec-news/9436 (accessed on 12.03.2021). (In Russ.).

Humayed A., Lin J., Li F., and Luo B. Cyber-Physical Systems Security – A Survey // IEEE Internet of Things Journal. 2017. Vol. 4(6). Pp. 1802-1831. DOI: https://doi.org/10.1109/JIOT.2017.2703172

Joseph R.C. Data Breaches: Public Sector Perspectives // IT Professional. 2018. Vol. 20(4). Pp. 57-64. DOI: https://doi.org/10.1109/MITP.2017.265105441

Mustafayev A.G. The concept of security of the internet of things ecosystem based on software-defined networks // Industrial Automatic Control Systems and Controllers. 2019. Vol. 7. Pp. 62-66. (In Russ.). DOI: https://doi.org/10.25791/asu.07.2019.751

Rafique K., Tareen A.W., Saeed M., Wu J., and Qureshi S.S. Cloud computing economics opportunities and challenges / In Proceedings – 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT. 2011. Pp. 401-406. DOI: https://doi.org/10.1109/ICBNMT.2011.6155965

Mustafayev A.G. Monitoring the security of the internet of things infrastructure based on machine learning technologies // Industrial Automatic Control Systems and Controllers. 2020. Vol. 2. Pp. 36-41. (In Russ.). DOI: https://doi.org/10.25791/asu.2.2020.1156

McAfee Uncovers Flood of Attacks on Corporate Cloud Accounts as Companies Work from Home (2020). McAfee. URL: https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/press-release.html?news_id=ef81c271-da74-4b80-a203-5dbf9680b8b8 (accessed on 19.03.2021).

Yang P., Xiong N., and Ren J. Data Security and Privacy Protection for Cloud Storage: A Survey // IEEE Access. 2020. Vol. 8. Pp. 131723-131740. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1109%2FACCESS.2020.3009876

Walker-Roberts S., Hammoudeh M., and Dehghantanha A. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure // IEEE Access. 2018. Vol. 6. Pp. 25167-25177. DOI: https://doi.org/10.1109/ACCESS.2018.2817560

WannaCry cyber-attack cost the NHS £92m as 19,000 appointments cancelled (2018). The Telegraph. URL: https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled (accessed on 19.03.2021).

V Singapure proizoshla samaya krupnaya v istorii strany kiberataka [The largest cyberattack in the history of the country occurs in Singapore] (2018). SecurityLab.ru. URL: https://www.securitylab.ru/news/494576.php (accessed on 15.02.2021). (In Russ.).

Chuang-Hs., Weng T.-Ch., Tsai J.-Sh., Horng M.-F., and Kuo Y.-Hw. A Reliable IoT Data Economic System Based on Edge Computing / In Proceedings – 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). 2018. Pp. 1-5. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1109%2FPIMRC.2018.8580742

Mehmood A., Natgunanathan I., Xiang Y., Poston H., and Zhang Y. Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications // IEEE Access. 2018. Vol. 6. Pp. 33552-33567. DOI: http://dx.doi.org/10.1109/ACCESS.2018.2841972

Deng R., Xiao G., and Lu R. Defending Against False Data Injection Attacks on Power System State Estimation // IEEE Transactions on Industrial Informatics. 2017. Vol. 13(1). Pp. 198-207. DOI: https://doi.org/10.1109/TII.2015.2470218

Satheesh Kumar M., Ben-Othman J., and Srinivasagan K.G. An Investigation on Wannacry Ransomware and its Detection / In Proceedings – 2018 IEEE Symposium on Computers and Communications. 2018. Pp. 1-6. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1109%2FISCC.2018.8538354

"WannaCry" ransomware attack losses could reach $4 billion (2017). CBSNews. URL: https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses (accessed on 18.03.2021).

Wernberg-Tougaard Chr. IT-Security Beyond Borders – an Assessment of Trust Levels Across Europe. In book ISSE/SECURE 2007 Securing Electronic Business Processes. 2007. Pp 82-92. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1007%2F978-3-8348-9418-2_9

Nazvany 4 glavnyye prichiny, po kotorym na Zapade ne pokupayut rossiyskiy khaytek [4 main reasons why Russian hi-tech is not bought in the West] (2020). CNews. URL: https://www.cnews.ru/news/top/2020-03-23_soosnovatel_iot_factory_obyasnil (accessed on 18.03.2021). (In Russ.).

Barony i magnaty: v chem kongress SSHA obvinyayet Kremniyevuyu dolinu [Barons and tycoons: what the US Congress accuses Silicon Valley] (2020). Gazeta.ru. URL: https://www.gazeta.ru/tech/2020/10/07/13309873/monopoly.shtml (accessed on 11.03.2021). (In Russ.).

Ashibani Y., and Mahmoud Q.H. Cyber Physical Systems Ssecurity: Analysis, Challenges and Solutions // Computers & Security. 2017. Vol. 68. Pp. 81-97. DOI: https://www.researchgate.net/deref/http%3A%2F%2Fdx.doi.org%2F10.1016%2Fj.cose.2017.04.005

About the Authors

Arslan G. Mustafaev – Doctor of Technical Sciences, Docent; Professor, Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia. E-mail: Arslan_mustafaev@mail.ru. SPIN РИНЦ 3544-1265. ORCID 0000-0003-3463-4303
Dmitry N. Kobzarenko – Doctor of Technical Sciences; Professor, Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia. E-mail: dmitry@fail.ru. SPIN РИНЦ 9846-8451
Abdulhamid Ya. Buchaev – Software Designer, Dagestan State University of National Economy, Makhachkala, Republic of Dagestan, Russia. E-mail: ayb@dginh.ru

For citation

Mustafaev A.G., Kobzarenko D.N., and Buchaev A.Y. Digital Transformation of the Economy: Threats to Information Security // BENEFICIUM. 2021. Vol. 2(39). Pp. 21-26. (In Russ.). DOI: 10.34680/BENEFICIUM.2021.2(39).21-26

Published
2021-08-01
Section
OBJECT STRATEGIC MANAGEMENT IN THE FRAMEWORK OF GLOBAL DIGITAL ECONOMY