<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-8-2-0-2</article-id><article-id pub-id-type="publisher-id">3142</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF THE GROWTH OF CYBERATTACKS OF THE INFORMATION SECURITY MARKET OF THE RUSSIAN FEDERATION&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF THE GROWTH OF CYBERATTACKS OF THE INFORMATION SECURITY MARKET OF THE RUSSIAN FEDERATION&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name><name xml:lang="en"><surname>Kuzminykh</surname><given-names>Yegor Sergeevich</given-names></name></name-alternatives><email>egor2014ru@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2023</year></pub-date><volume>8</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2023/2/ИТ_НР_8.2_2_x8xDzCX.pdf" /><abstract xml:lang="ru"><p>The IT sphere is progressing without stopping, which is why information security employees have to regularly progress along with all software updates to maximize the effectiveness of ensuring the security of the company in which they work. To do this, companies need to hire a qualified information security officer who will train staff to &amp;quot;properly&amp;quot; use a computer, will regularly update software, install new ones and will be able to withstand attacks by intruders in real time. In 2022, the Russian segment was attacked by foreign hackers, which led to big problems for all sectors of the country. Companies and even government agencies had to resist constant attacks. Currently, there is a transition to domestic software, which makes the situation easier. Also, in 2022-2023, a large amount of funds was allocated for the development of new software and the fight against intruders. In this article, some types of attacks on companies were considered, the most relevant, 0-day, which information is more interested in attackers, which industries were attacked and how. How all these changes affected the Russian information security market and forecasts for the future.</p></abstract><trans-abstract xml:lang="en"><p>The IT sphere is progressing without stopping, which is why information security employees have to regularly progress along with all software updates to maximize the effectiveness of ensuring the security of the company in which they work. To do this, companies need to hire a qualified information security officer who will train staff to &amp;quot;properly&amp;quot; use a computer, will regularly update software, install new ones and will be able to withstand attacks by intruders in real time. In 2022, the Russian segment was attacked by foreign hackers, which led to big problems for all sectors of the country. Companies and even government agencies had to resist constant attacks. Currently, there is a transition to domestic software, which makes the situation easier. Also, in 2022-2023, a large amount of funds was allocated for the development of new software and the fight against intruders. In this article, some types of attacks on companies were considered, the most relevant, 0-day, which information is more interested in attackers, which industries were attacked and how. How all these changes affected the Russian information security market and forecasts for the future.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>cyber-attacks</kwd><kwd>attacks</kwd><kwd>hackers</kwd><kwd>intruders</kwd><kwd>zero-day attack</kwd><kwd>0-day</kwd><kwd>domestic software</kwd><kwd>market</kwd><kwd>information security</kwd><kwd>IB</kwd><kwd>antiviruses</kwd><kwd>security</kwd><kwd>Russian segments</kwd><kwd>budget</kwd><kwd>IB budget</kwd><kwd>import substitution</kwd></kwd-group><kwd-group xml:lang="en"><kwd>cyber-attacks</kwd><kwd>attacks</kwd><kwd>hackers</kwd><kwd>intruders</kwd><kwd>zero-day attack</kwd><kwd>0-day</kwd><kwd>domestic software</kwd><kwd>market</kwd><kwd>information security</kwd><kwd>IB</kwd><kwd>antiviruses</kwd><kwd>security</kwd><kwd>Russian segments</kwd><kwd>budget</kwd><kwd>IB budget</kwd><kwd>import substitution</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Avramenko V.S., Bobreshov-Shishov D.I., Malikov A.V. A method for identifying zero-day vulnerabilities based on the analysis of exploits behavior // Problems of technical support of troops in modern conditions. &amp;ndash; 2018. &amp;ndash; pp. 45-48.</mixed-citation></ref><ref id="B2"><mixed-citation>Gladushenko S.G., Iskolny B.B. Assessment of the probability of zero-day computer attacks // REDS: Telecommunication devices and systems. &amp;ndash; 2017. &amp;ndash; Vol. 7. &amp;ndash; No. 4. &amp;ndash; pp. 481-483.</mixed-citation></ref><ref id="B3"><mixed-citation>Zero-day information attack [Electronic resource]. URL: https://dzen.ru/a/W-b33EE2PACqYwQf.</mixed-citation></ref><ref id="B4"><mixed-citation>Proactive protection [Electronic resource]. URL: https://helpdesk.bitrix24.ru/open/9160201/.</mixed-citation></ref><ref id="B5"><mixed-citation>The number of cyber-attacks in Russia and in the world [Electronic resource]. URL: https://www.tadviser.ru/index.php/Статья:Number of cyberattacks in_Russia_and_world.</mixed-citation></ref><ref id="B6"><mixed-citation>Positive Technologies: what the past year has brought and what challenges to cybersecurity to expect in 2023 [Electronic resource]. URL: https://www.ptsecurity.com/ru-ru/about/news/positive-technologies-chto-prines-ushedshij-god-i-kakih-vyzovov-kiberbezopasnosti-zhdat-v-2023-m/.</mixed-citation></ref><ref id="B7"><mixed-citation>Maslova M.A. IT infrastructure risks and methods for their solution // Research result. Information technologies. &amp;ndash; Т.7, №4, 2022. &amp;ndash; P. 34-40. DOI: 10.18413/2518-1092-2022-7-4-0-4.</mixed-citation></ref><ref id="B8"><mixed-citation>Russian software (Domestic software) [Electronic resource]. URL: https://www.tadviser.ru/index.php/Статья:Russian Software Support_(Domestic_BY).</mixed-citation></ref><ref id="B9"><mixed-citation>The transition to domestic software will accelerate in 2023 [Electronic resource]. URL: https://rg.ru/2023/02/02/perehod-na-otechestvennoe-po-uskoritsia-v-2023-godu.html.</mixed-citation></ref><ref id="B10"><mixed-citation>Information security (Russian market) [Electronic resource]. URL: https://www.tadviser.ru/index.php/Статья:Information Security (Market_Russia).</mixed-citation></ref><ref id="B11"><mixed-citation>Omelchenko V.I., Isaev M.Yu. The use of tablet computers with domestic software during training sessions // Information technologies: actual problems of training specialists taking into account the implementation of the requirements of the Federal State Educational Standard. &amp;ndash; 2021. &amp;ndash; pp. 354-357.</mixed-citation></ref><ref id="B12"><mixed-citation>Golubev O.B., Popova E.Yu. The use of domestic software in the educational process // Modern problems and prospects of teaching mathematics, physics, computer science at school and university. &amp;ndash; 2020. &amp;ndash; pp. 168-172.</mixed-citation></ref><ref id="B13"><mixed-citation>Maslova M.A., Smirnov N.S. Software implementation of information security risk assessment Modern problems of radio electronics and telecommunications. &amp;ndash; 2022. &amp;ndash; № 5. &amp;ndash; P. 203.</mixed-citation></ref></ref-list></back></article>