European Proceedings Logo

An Optimal Set Of Information Security Tools

Table 1:

Name of threat Relevance Vulnerability Approximate damage, million rubles
Malicious programs 0,21 0,10 169 
Cryptographers and wipers 0,14 0,07 46
DDoS-attack, Cyber attacks (to disorganise activity) 0,10 0,07 111
Unauthorized access to information 0,09 0,19 65
Outflow of confidential data, Cyber attacks (to steal an intellectual property) 0,15 0,18 91
Cryptocurrency mining, Fraud 0,07 0,04 26
Data loss (not Cryptographers) 0,02 0,07 91 
Hacking of web resources 0,08 0,13 145
Phishing 0,10 0,07 91
Internal attacks 0,02 0,09 104
< Back to article