Innovative Technologies in Cybersecurity
Abstract
The digital transformation of any organization must include cybersecurity, without which it is impossible to build a reliable information system. Today, many existing software products, security tools, and IT systems do not match the new environment in which they will have to perform their functions. After the departure of foreign software suppliers, the President of Russia made a decision on the development of the import substitution program and set a deadline for the transition to domestic means of protection until January 1, 2025. In particular, a ban on the use of any foreign software at the facilities of Russia's critical information infrastructure was introduced.
Given the current geopolitical situation and the current situation of cyber-threats, there is a need to develop indigenous solutions in the area of information security. Sberbank is actively engaged in import substitution of information security tools using innovative technologies. Sberbank successfully overcomes dependence on Western suppliers and on Western models and methods, changes outdated approaches to risk assessment and management, which helps to effectively address the challenges of replacing cybersecurity tools both for current tasks, and to work in the face of increasing cyber aggression.
References
2. Zakalkin P.V. Evolution of Cyberspace Management Systems. Voprosy kiberbezopasnosti = Cybersecurity issues. 2022; (1):76-86. (In Russ., abstract in Eng.) doi: https://doi.org/10.21681/2311-3456-2012-1-76-86
3. Savonin A.P. Economic Security in the Conditions of the Digital Economy. Finansovaja jekonomika = Financial Economics. 2021; (4):82-84. Available at: https://www.elibrary.ru/item.asp?id=45676973 (accessed 20.06.2022). (In Russ., abstract in Eng.)
4. Koryakovsky D., Terenin A. Iskusstvennyj intellekt na strazhe bankovskih dannyh: opyt Sberbanka [Artificial Intelligence on guard of banking data: Sberbank's experience]. BIS Journal ‒ Information Security of Banks. 2020; (2):42-48. Available at: https://ib-bank.ru/bisjournal/post/1319 (accessed 20.06.2022). (In Russ.)
5. Revenkov P.V., Oshmankevich K. R., Berdyugin A. A. Phishing schemes in the banking sector: Recommendations to Internet users on protection and development of regulatory tasks. Finance: Theory and Practice. 2021; 25(6):212-226. (In Russ., abstract in Eng.) doi: https://doi.org/10.26794/2587-5671-2021-25-6-212-226
6. Afanaseva N.S., Elizarov D.A., Myznikova T.A. Classifying and countering phishing attacks. Engineering journal of Don. 2022; (5):169-182. Available at: https://www.elibrary.ru/item.asp?id=48925602 (accessed 20.06.2022). (In Russ., abstract in Eng.)
7. Revenkov P.V., Berdyugin A.A. Quantitative approach to assessing the risk of cyberattacks in using electronic banking technology. Zaŝita informacii. Inside. 2020; (2):36-42. Available at: https://www.elibrary.ru/item.asp?id=42615396 (accessed 20.06.2022). (In Russ., abstract in Eng.)
8. Ameen N., Tarhini A., Shah M.H., Madichie N., Paul J., Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior. 2021; 114:106531. (In Eng.) doi: https://doi.org/10.1016/j.chb.2020.106531
9. Li Y., Saxunová D. A perspective on categorizing Personal and Sensitive Data and the analysis of practical protection regulations. Procedia Computer Science. 2020; 170:1110-1115. (In Eng.) doi: https://doi.org/10.1016/j.procs.2020.03.060
10. Choi J.P., Jeon D.-S., Kim B.-C. Privacy and personal data collection with information externalities. Journal of Public Economics. 2019; 173:113-124. (In Eng.) doi: https://doi.org/10.1016/j.jpubeco.2019.02.001
11. Ivanov K.V., Balyakin A.A., Malyshev A.S. Big Data Technologies as a National Security Instrument. St. Petersburg State Polytechnical University Journal. Economics. 2020; 13(1):7-19. (In Russ., abstract in Eng.) doi: https://doi.org/10.18721/JE.13101
12. Larionova S.L., Ryakhovski E.E. Organization of counteraction to financial transactions without the client’s consent. Financial Markets and Banks. 2021; (6):60-67. Available at: https://www.elibrary.ru/item.asp?id=46287383 (accessed 20.06.2022). (In Russ., abstract in Eng.)
13. Gushchina E.A., Makarenko G.I., Sergin M.Y. Ensuring information and technological sovereignty of the state under the conditions of development of digital economy. Pravo.bu. 2018; (6):59-63. Available at: https://www.elibrary.ru/item.asp?id=36983674 (accessed 20.06.2022). (In Russ., abstract in Eng.)
14. Romashkina N.P. Global military political problems in international informational security: trends, threats and prospects. Voprosy kiberbezopasnosti = Cybersecurity issues. 2019; (1):2-9. (In Russ., abstract in Eng.) doi: https://doi.org/10.21681/2311-3456-2019-1-2-9
15. Markov A.S., Sheremet I.A. Software Safety in the Context of Strategic Stability. Vestnik Akademii voennyh nauk. 2019; (2):82-90. Available at: https://www.elibrary.ru/item.asp?id=41590117 (accessed 20.06.2022). (In Russ.)
16. Erokhin S.D., Borisenko B.B., Martishin I.D., Fadeev A.S. Analysis of existing methods to reduce the dimensionality of input data. T-Comm. 2022; 16(1):30-37. (In Russ., abstract in Eng.) doi: https://doi.org/10.36724/2072-8735-2022-16-1-30-37
17. Alsova O.K., Stubarev I.M. Heterogeneous ensemble algorithm for classification of different types of data. Izvestia of Samara Scientific Center of the Russian Academy of Sciences. 2017; 19(6):118-123. Available at: https://www.elibrary.ru/item.asp?id=34964637 (accessed 20.06.2022). (In Russ., abstract in Eng.)
18. Kiselev A.S. On the Expansion of Legal Regulation in the Field of Artifi cial Intelligence: Deepfake as a Threat to National Security. Bulletin of Moscow Region State University. Series: Jurisprudence. 2021; (3):54-64. (In Russ., abstract in Eng.) doi: https://doi.org/10.18384/2310-6794-2021-3-54-64–
19. Chen S., Yao T., Chen Y., Ding S., Li J., Ji R. Local Relation Learning for Face Forgery Detection. Proceedings of the AAAI Conference on Artificial Intelligence. 2021; 35(2):1081-1088. (In Eng.) doi: https://doi.org/10.1609/aaai.v35i2.16193
20. Tolosana R., Vera-Rodriguez R., Fierrez J., Morales A., Ortega-Garcia J. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. Information Fusion. 2020; 64:131-148. (In Eng.) doi: https://doi.org/10.1016/j.inffus.2020.06.014
21. Bonettini N., Cannas E.D., Mandelli S., Bondi L., Bestagini P., Tubaro S. Video Face Manipulation Detection Through Ensemble of CNNs. 2020 25th International Conference on Pattern Recognition (ICPR). IEEE Computer Society; 2021. p. 5012-5019. (In Eng.) doi: https://doi.org/10.1109/ICPR48806.2021.9412711
22. Chai L., Bau D., Lim S.N., Isola P. What Makes Fake Images Detectable? Understanding Properties that Generalize. In: Vedaldi A., Bischof H., Brox T., Frahm J.M. (eds.) Computer Vision – ECCV 2020. ECCV 2020. Lecture Notes in Computer Science. Vol. 12371. Springer, Cham; 2020. p. 103-120. (In Eng.) doi: https://doi.org/10.1007/978-3-030-58574-7_7
23. Klyueva A.A., Belov D.A. Current legal research of deepfake technologies and new challenges for the Russian legal system. Voprosy rossijskoj justicii. 2021; (14):601-609. Available at: https://www.elibrary.ru/item.asp?id=46458856 (accessed 20.06.2022). (In Russ., abstract in Eng.)
24. Svirsh A.O., Oleinikova P.A. Razvitie tehnologii deepfake [Development of deepfake technology]. Modern Science. 2021; (12-4):309-320. Available at: https://www.elibrary.ru/item.asp?id=47460071 (accessed 20.06.2022). (In Russ.)
25. Nechai A.A. Use of Innovative Methods and Modern Technologies for Advanced Training in Cybersecurity. Azimut nauchnyh issledovanij: pedagogika i psihologija = Azimuth of Scientific Research: Pedagogy and Psychology. 2020; 9(3):193-196. (In Russ., abstract in Eng.) doi: https://doi.org/10.26140/anip-2020-0903-0043

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.