TRAINING OF CYBER SECURITY AND CYBER DEFENSE FOR SPECIALISTS OF FINANCE, ECONOMIC AND BUSINESS MANAGEMENT
PDF (Ukrainian)

Keywords

cyber threat
cyberattack
cyber fraud
cyber defense of business and finance
corporate financial cybersecurity training

How to Cite

[1]
V. Y. Bykov, A. A. Romanovsky, and J. Y. Romanovskaya, “TRAINING OF CYBER SECURITY AND CYBER DEFENSE FOR SPECIALISTS OF FINANCE, ECONOMIC AND BUSINESS MANAGEMENT”, ITLT, vol. 80, no. 6, pp. 386–413, Dec. 2020, doi: 10.33407/itlt.v80i6.4101.

Abstract

The study is devoted to the extremely relevant topic - increasing population cyber awareness and based on the unique experience of the transnational training project "Fundamentals of Corporate Cybersecurity". The aim of this work is to offer a partial solution to the problem of preparing Ukrainian citizens (and potentially citizens from other countries) to confront cyber threats in their professional activities. The object of the study is the finance industry, which is a part of the high school programs of colleges and universities in many countries. The authors put forward the idea that: to prepare of non-specialists in the IT field on the basics of cyber protection - those who do not have special engineering and technical training in the field of IT and cyber defense, and specialists in the socio-economic sphere (business leaders, entrepreneurs, economists, financiers and others) - it is necessary to train on cybersecurity, which is focused on their professional activities. As a result of the studies, the authors concluded, that in many countries, especially developing countries, cybercrime is a major problem. The authors prove, that Ukraine needs intensive education of citizens of all age groups on the problems of financial crimes and fraud by Internet hackers and cyber criminals. Along with the professional training of specialists in the field of IT and cybersecurity, in Ukraine it is advisable to: Introduce education on home finance and technologies for their IT protection in the school system; to prepare of non-specialists in the IT field on the basics of cyber protection on the principles of IT, cybersecurity, financial, and economics in all of colleges, institutions and universities; organize training in IT and cybersecurity for Ukrainian citizens. To ensure Ukraine’s integration with Europe, close cooperation with developed nations and transnational organizations is crucial to developing a thriving cybersecurity sector. Ukraine has competent young IT specialists who successfully work for foreign companies and corporations. It is necessary to effectively use this human resource and it is advisable to create a coordinating training center for cybersecurity in the field of economic and financial activities.

PDF (Ukrainian)

References

Jessica Lindsay and Alex Hudson. “What is the fifth industrial revolution and how will it change the world?” [Електронний ресурс]. Доступно: https://metro.co.uk/2019/06/10/fifth-industrial-revolution-will-change-world-9738825/. Дата звернення: 15.04.2020

The fifth industrial revolution. When humans and machines combine. Digital Technology, Apr.03, 2018. [Електронний ресурс]. Доступно: https://www.genpact.com/insight/blog/the-fifth-industrial-revolution. Дата звернення: 15.04.2020

Stuart Lauchlan, “The Fifth Industrial Revolution is coming – and it's about trust, values and saving the planet”. [Електронний ресурс]. Доступно: https://diginomica.com/the-fifth-industrial-revolution-is-coming-and-its-about-trust-values-and-saving-the-planet. Дата звернення: 15.04.2020

Klaus Schwab, “The Fourth Industrial Revolution: what it means, how to respond”. [Електронний ресурс]. Доступно: https://www.weforum.org/agenda/authors/klaus-schwab. Дата звернення: 15.04.2020

Deep Shift Technology Tipping Points and Societal Impact. WORLD ECONOMIC FORUM, 2015. [Електронний ресурс]. Доступно: http://www3.weforum.org/docs/WEF_GAC15_Technological_Tipping_Points_report_2015.pdf

Закон № 2163-VІІІ “Про основні засади забезпечення кібербезпеки України” (Відомості Верховної Ради), № 45, с. 403, 2017.

Сучасні тренди кібербезпекової політики: висновки для України. Аналітична записка. Національний інститут стратегічних досліджень. [Електронний ресурс]. Доступно: http://old2.niss.gov.ua/articles/294/. Дата звернення: 10.02.2020.

2019 Internet Crime Report. [Електронний ресурс]. Доступно: https://pdf.ic3.gov/2019_IC3Report.pdf. Дата звернення: 11.05.2020

S. LaBello, “The Biggest Cyber Threats in 2019”. [Електронний ресурс]. Доступно: https://www.pratum.com/blog/429-the-biggest-cyber-threats-in-2019. Дата звернення: 12.05.2020

R. McLean, “A hacker gained access to 100 million Capital One credit card applications and accounts”, CNN Business, July 30, 2019. [Електронний ресурс]. Доступно: https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html. Дата звернення: 04.03.2020

D. Barrett, “Capital One says data breach affected 100 million credit card applications”, The Washington Post, July 30, 2019. [Електронний ресурс]. Доступно: https://www.washingtonpost.com/national-security/capital-one-data-breach-compromises-tens-of-millions-of-credit-card-applications-fbi-says/2019/07/29/72114cc2-b243-11e9-8f6c-7828e68cb15f_story.html. Дата звернення: 05.03.2020

Cybersecurity Industry Associations. Cyber Crime Magazine. [Електронний ресурс]. Доступно: https://cybersecurityventures.com/cybersecurity-associations/. Дата звернення: 25.05.2020

WORLD BANK GROUP. Financial Sector’s Cybersecurity: A Regulatory Digest∗. 2019 World Bank’s FinSAC Digest of Cybersecurity Regulations in the Financial Sector, 113 p. [Електронний ресурс]. Доступно: http://pubdocs.worldbank.org/en/940481575300835196/CybersecDIGEST-NOV2019-FINAL.pdf. Дата звернення: 05.04.2020

WORLD BANK GROUP. Global Cybersecurity Capacity Program. Lessons Learned and Recommendations towards strengthening the Program. 2019 The World Bank, 68 p. [Електронний ресурс]. Доступно: http://documents1.worldbank.org/curated/en/947551561459590661/pdf/Global-Cybersecurity-Capacity-Program-Lessons-Learned-and-Recommendations-towards-Strengthening-the-Program.pdf. Дата звернення: 10.04.2020

Защита денег: на борьбу с киберугрозами банки тратят больше, чем на развитие отделений. [Електронний ресурс]. Доступно: https://delo.ua/econonomyandpoliticsinukraine/dorogaja-zaschita-na-borbu-s-kiberugrozami-banki-363177/. Дата звернення: 10.02.2020.

Больше всего от кибератак страдает малый и средний бизнес – исследование. [Електронний ресурс]. Доступно: https://delo.ua/business/bolshe-vsego-ot-kiberatak-stradaet-malyj-i-sredn-360727/ . Дата звернення: 10.02.2020.

Фишинг: Как не попасться на удочку. [Електронний ресурс]. Доступно: https://delo.ua/business/fishing-kak-ne-popastsja-na-udochku-357348/. Дата звернення: 10.02.2020.

D.Schatz, R.Bashroush and Ju. Wall, “Towards a More Representative Definition of Cyber Security”, Journal of Digital Forensics, Security and Law, 12(2), Article 8, 53-74, 2017. [Електронний ресурс]. Доступно: https://commons.erau.edu/jdfsl/vol12/iss2/8/

В.Ю.Биков, О.Ю.Буров та Н.П.Дементієвська, «Кібербезпека в цифровому навчальному середовищі», Інформаційні технології та засоби навчання , 2(70), 313–331, 2019.

The Smart Grid Interoperability Panel–Smart Grid Cybersecurity Committee, “Guidelines for Smart Grid Cybersecurity”, NISTIR 7628 Rev. 1. [Електронний ресурс]. Доступно:

https://csrc.nist.gov/publications/detail/nistir/7628/rev-1/final. Дата звернення: 04.03.2020

ITU-T X.1205, SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security, Overview of cybersecurity. International Telecommunication Union, 64 p. [Електронний ресурс]. Доступно: https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=9136&lang=en. Дата звернення: 04.03.2020

Tari Schreider, “Cybersecurity Law, Standards and Regulations, 2nd Edition”, Rothstein Publishing; February 2020 [Електронний ресурс]. Доступно: https://www.ebooks.com/en-ua/book/209962921/cybersecurity-law-standards-and-regulations-2nd-edition/schreider-tari/?src=feed&gclid=CjwKCAjwyo36BRAXEiwA24CwGXnZH2wh9MpES6XqZ1aTj7qPkIBoX2douv55V34EXIxH8oRpwj3CpBoC1mAQAvD_BwE. Дата звернення: 29.06.2020

PriceWaterhouseCooper (PwC). “Global Economic Crime and Fraud Survey 2018: Ukrainian findings Pulling fraud out of the shadows”. [Електронний ресурс]. Доступно:

https://www.pwc.com/ua/en/survey/2018/pwc-gecs-2018-eng.pdf Дата звернення: 13.04.2020

J. Clement, “IC3: total damage caused by reported cyber crime 2001-2019”. In: Amount of monetary damage caused by reported cyber crime to the IC3 from 2001 to 2019 (in million U.S. dollars). [Електронний ресурс]. Доступно: https://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/#statisticContainer . Дата звернення: 15.04.2020

Ukrainian-American University Bachelor Programs Catalog 2019-2020. [Електронний ресурс]. Доступно: https://www.concordia.edu.ua/wp-content/uploads/2020/02/2020-bba-catalog.pdf. Дата звернення: 02.03.2020

Ukrainian-American University Master’s Degree Programs Catalog 2019-2020. [Електронний ресурс]. Доступно: https://www.concordia.edu.ua/wp-content/uploads/2019/07/ConcordiaUA-MBA-Catalog-Updated.pdf. Дата звернення: 02.03.2020

M. Rouse, “What is Cybersecurity? Everything You Need to Know”. [Електронний ресурс]. Доступно: https://searchsecurity.techtarget.com/definition/cybersecurity. Дата звернення: 25.05.2020

Kevin Helms, “Jim Rogers Discusses Bitcoin as Money and Why Governments Will Stop Crypto” [Електронний ресурс]. Доступно:https://news.bitcoin.com/jim-rogers-bitcoin/. Дата звернення: 21.07.2020 [29] BuiltIn Journal, “Blockchain. What Is Blockchain Technology? How Does Blockchain Work?

[Електронний ресурс]. Доступно: https://builtin.com/blockchain. Дата звернення: 21.07.2020

CBInsights, “How Blockchain Technology Could Disrupt Real Estate”. [Електронний ресурс]. Доступно: https://www.cbinsights.com/research/blockchain-real-estate-disruption/. Дата звернення: 21.07.2020

Tia Vialva, “3D Hubs 3D Printing Trends Report Forecasts 24% Growth in 3D Printing Industry over 5 Years”. [Електронний ресурс]. Доступно: https://3dprintingindustry.com/news/3d-hubs-3dprinting-trends-report-forecasts-24-growth-in-3d-printing-industry-over-5-years-167998/. Дата звернення: 21.07.2020

Statista Research Department, May 11, 2020 “3D printing industry - worldwide market size 2020-2024” . [Електронний ресурс]. Доступно: https://www.statista.com/statistics/315386/global-market-for-3dprinters/. Дата звернення: 21.07.2020


REFERENCES (TRANSLATED AND TRANSLITERATED)

Jessica Lindsay and Alex Hudson. “What is the fifth industrial revolution and how will it change the world?” [Online]. Avalible: https://metro.co.uk/2019/06/10/fifth-industrial-revolution-will-change-world-9738825/. Accessed on: 15.04.2020 (in English)

The fifth industrial revolution. When humans and machines combine. Digital Technology, Apr.03, 2018. [Online]. Available: https://www.genpact.com/insight/blog/the-fifth-industrial-revolution. Accessed on: 15.04.2020 (in English)

Stuart Lauchlan, “The Fifth Industrial Revolution is coming – and it's about trust, values and saving the planet.” [Online]. Available: https://diginomica.com/the-fifth-industrial-revolution-is-coming-and-its-about-trust-values-and-saving-the-planet. Accessed on: 15.04.2020 (in English)

Klaus Schwab, “The Fourth Industrial Revolution: what it means, how to respond.” [Online]. Available: https://www.weforum.org/agenda/authors/klaus-schwab. Accessed on: 15.04.2020 (in English)

Deep Shift Technology Tipping Points and Societal Impact. WORLD ECONOMIC FORUM, 2015. [Online]. Available: http://www3.weforum.org/docs/WEF_GAC15_Technological_Tipping_Points_report_2015.pdf (in English)

Law № 2163-VІІІ “About the basic principles of providing cyber security of Ukraine.” (Vidomosti Verkhovnoi Rady), no. 45, p. 403, 2017 (in Ukrainian)

Current trends in cybersecurity policy: conclusions for Ukraine. Analytical note. National Institute for Strategic Studies. [Online]. Available: http://old2.niss.gov.ua/articles/294/. Accessed on: 10.02.2020 (in Ukrainian)

2019 Internet Crime Report. [Online]. Available: https://pdf.ic3.gov/2019_IC3Report.pdf. Accessed on: 11.05.2020 (in English)

S. LaBello, “The Biggest Cyber Threats in 2019.” [Online]. Available: https://www.pratum.com/blog/429-the-biggest-cyber-threats-in-2019. Accessed on: 12.05.2020 (in English)

R. McLean, “A hacker gained access to 100 million Capital One credit card applications and accounts,” CNN Business, July 30, 2019. [Online]. Available: https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html. Accessed on: 04.03.2020 (in English)

D. Barrett, “Capital One says data breach affected 100 million credit card applications,” The Washington Post, July 30, 2019. [Online]. Available: https://www.washingtonpost.com/national-security/capital-one-data-breach-compromises-tens-of-millions-of-credit-card-applications-fbi-says/2019/07/29/72114cc2-b243-11e9-8f6c-7828e68cb15f_story.html. Accessed on: 05.03.2020 (in English)

Cybersecurity Industry Associations. Cyber Crime Magazine. [Online]. Available: https://cybersecurityventures.com/cybersecurity-associations/. Accessed on: 25.05.2020 (in English)

WORLD BANK GROUP. Financial Sector’s Cybersecurity: A Regulatory Digest∗. 2019 World Bank’s FinSAC Digest of Cybersecurity Regulations in the Financial Sector, 113 p. [Online]. Available: http://pubdocs.worldbank.org/en/940481575300835196/CybersecDIGEST-NOV2019-FINAL.pdf. Accessed on: 05.04.2020 (in English)

WORLD BANK GROUP. Global Cybersecurity Capacity Program. Lessons Learned and Recommendations towards strengthening the Program. 2019 The World Bank, 68 p. [Online]. Available: http://documents1.worldbank.org/curated/en/947551561459590661/pdf/Global-Cybersecurity-Capacity-Program-Lessons-Learned-and-Recommendations-towards-Strengthening-the-Program.pdf. Accessed on: 10.04.2020 (in English)

Money protection: banks spend more on cyber threats than on branch development. [Online]. Available: https://delo.ua/econonomyandpoliticsinukraine/dorogaja-zaschita-na-borbu-s-kiberugrozami-banki-363177/. Accessed on: 10.02.2020 (In Russian)

Small and medium-sized businesses suffer the most from cyberattacks – research. [Online]. Available: https://delo.ua/business/bolshe-vsego-ot-kiberatak-stradaet-malyj-i-sredn-360727/. Accessed on: 10.02.2020 (in Russian)

Phishing: How not to fall for the bait. [Online]. Available: https://delo.ua/business/fishing-kak-ne-popastsja-na-udochku-357348/. Accessed on: 10.02.2020 (in Russian)

D.Schatz, R.Bashroush and Ju. Wall, “Towards a More Representative Definition of Cyber Security,” Journal of Digital Forensics, Security and Law, 12(2), Article 8, 53-74, 2017. [Online]. Available: https://commons.erau.edu/jdfsl/vol12/iss2/8/ (in English)

V. Yu. Bykov, О. Ju. Burov, N. P. Dementievska, “Cyber Security in a Digital Learning Environment,” Information Technologies and Learning Tools, 70(2), pp. 313–331, 2019. (in Ukrainian)

The Smart Grid Interoperability Panel–Smart Grid Cybersecurity Committee, “Guidelines for Smart Grid Cybersecurity,” NISTIR 7628 Rev. 1. [Online]. Available:

https://csrc.nist.gov/publications/detail/nistir/7628/rev-1/final. Accessed on: 04.03.2020 (in English)

ITU-T X.1205, SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security, Overview of cybersecurity. International Telecommunication Union, 64 p. [Online]. Available: https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=9136&lang=en. Accessed on: 04.03.2020 (in English)

Tari Schreider, “Cybersecurity Law, Standards and Regulations, 2nd Edition,” Rothstein Publishing; February 2020. [Online]. Available: https://www.ebooks.com/en-ua/book/209962921/cybersecurity-law-standards-and-regulations-2nd-edition/schreider-tari/?src=feed&gclid=CjwKCAjwyo36BRAXEiwA24CwGXnZH2wh9MpES6XqZ1aTj7qPkIBoX2douv55V34EXIxH8oRpwj3CpBoC1mAQAvD_BwE. Accessed on: 29.06.2020 (in English)

PriceWaterhouseCooper (PwC). “Global Economic Crime and Fraud Survey 2018: Ukrainian findings Pulling fraud out of the shadows.” [Online]. Available:

https://www.pwc.com/ua/en/survey/2018/pwc-gecs-2018-eng.pdf Accessed on: 13.04.2020 (in English)

J. Clement, “IC3: total damage caused by reported cyber crime 2001-2019,” In: Amount of monetary damage caused by reported cyber crime to the IC3 from 2001 to 2019 (in million U.S. dollars). [Online]. Available: https://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/#statisticContainer . Accessed on: 15.04.2020 (in English)

Ukrainian-American University Bachelor Programs Catalog 2019-2020. [Online]. Available: https://www.concordia.edu.ua/wp-content/uploads/2020/02/2020-bba-catalog.pdf.

Accessed on: 02.03.2020 (in English)

Ukrainian-American University Master’s Degree Programs Catalog 2019-2020. [Online]. Available: https://www.concordia.edu.ua/wp-content/uploads/2019/07/ConcordiaUA-MBA-Catalog-Updated.pdf. Accessed on: 02.03.2020 (in English)

M. Rouse, “What is Cybersecurity? Everything You Need to Know.” [Online]. Available: https://searchsecurity.techtarget.com/definition/cybersecurity. Accessed on: 25.05.2020 (in English)

Kevin Helms, “Jim Rogers Discusses Bitcoin as Money and Why Governments Will Stop Crypto.” [Online]. Available:https://news.bitcoin.com/jim-rogers-bitcoin/. Accessed on: 21.07.2020 (in English)

BuiltIn Journal, “Blockchain. What Is Blockchain Technology? How Does Blockchain Work?”

[Online]. Available: https://builtin.com/blockchain. Accessed on: 21.07.2020 (in English)

CBInsights, “How Blockchain Technology Could Disrupt Real Estate.” [Online]. Available: https://www.cbinsights.com/research/blockchain-real-estate-disruption/. Accessed on: 21.07.2020 (in English)

Tia Vialva, “3D Hubs 3D Printing Trends Report Forecasts 24% Growth in 3D Printing Industry over 5 Years.” [Online]. Available: https://3dprintingindustry.com/news/3d-hubs-3dprinting-trends-report-forecasts-24-growth-in-3d-printing-industry-over-5-years-167998/. Accessed on: 21.07.2020 (in English)

Statista Research Department, May 11, 2020 “3D printing industry - worldwide market size 2020-2024.” [Online]. Available https://www.statista.com/statistics/315386/global-market-for-3dprinters/. Accessed on: 21.07.2020 (in English)

Authors who publish in this journal agree to the following terms:

  1. Authors hold copyright immediately after publication of their works and retain publishing rights without any restrictions.
  2. The copyright commencement date complies the publication date of the issue, where the article is included in.

Content Licensing

  1. Authors grant the journal a right of the first publication of the work under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others freely to read, download, copy and print submissions, search content and link to published articles, disseminate their full text and use them for any legitimate non-commercial purposes (i.e. educational or scientific) with the mandatory reference to the article’s authors and initial publication in this journal.
  2. Original published articles cannot be used by users (exept authors) for commercial purposes or distributed by third-party intermediary organizations for a fee.

Deposit Policy

  1. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) during the editorial process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see this journal’s registered deposit policy at Sherpa/Romeo directory).
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
  3. Post-print (post-refereeing manuscript version) and publisher's PDF-version self-archiving is allowed.
  4. Archiving the pre-print (pre-refereeing manuscript version) not allowed.

Downloads

Download data is not yet available.