Skip to main navigation menu Skip to main content Skip to site footer

Information technologies and systems

December 13, 2024; Zurich, Switzerland: VII International Scientific and Practical Conference «GRUNDLAGEN DER MODERNEN WISSENSCHAFTLICHEN FORSCHUNG»


CURRENT VULNERABILITIES OF CRITICAL INFRASTRUCTURE: RISK ASSESSMENT AND PROTECTION


DOI
https://doi.org/10.36074/logos-13.12.2024.051
Published
09.01.2025

Abstract

Critical infrastructure is one of the most important elements of modern society, ensuring the continuous functioning of important industries such as energy, transportation, telecommunications, water supply, and others. One of the main aspects of security is identifying and eliminating the risks of exploiting vulnerabilities that can be used by attackers to attack and compromise systems. First of all, it is worth starting with an analysis of current vulnerabilities inherent in critical infrastructure enterprises.

References

  1. How to Manage Vulnerable and Outdated Components | Snyk Learn (б. д.). Snyk Learn. https://learn.snyk.io/lesson/vulnerable-and-outdated-components/.
  2. M10: Insufficient Cryptography | OWASP Foundation. OWASP Foundation, the Open Source Foundation for Application Security | OWASP Foundation. https://owasp.org/www-project-mobile-top-10/2023-risks/m10-insufficient-cryptography.
  3. Vasilyuk, V. (2006). Objects of information protection. Methods and means of information protection. Legal, regulatory and metrological support of the system of information protection in Ukraine: scientific and technical collection, Issue 2(13), 88-95.
  4. Windows Event Logs | TryHackMe. (2023, 2 August). Igor_sec's Blog. https://igorsec.blog/2023/08/02/windows-event-logs-tryhackme/.