Page 8 - ISCI’2017
P. 8

1 Problem’s Statement


            Internet cyber criminals keep perfecting their fraud methods, leading to material losses up to tens of

            billion dollars and posing serious risks to many countries (including Ukraine). Therefore, specialized
            departments and structures have been created to combat this type of crime. They constantly get ever

            more  power and  better  technical  facilities.  One  of  the  recent  examples  is  the  European  Center of
            Cybercrime Prevention that commenced its work in the beginning of 2013.

                   On  March  19,  Europol released a report “The EU Serious and Organized Crime Threat

            Assessment” (SOCTA 2013) with an assessment of the growing globalized and organized crime rates
            by means of the Internet (Official site of Europol, 2013).

                   Recently in Ukraine, there has occurred an increase of interest in the research in the Theory
            of Security (TS). Many recent studies (Heiets et al., 2006; Kavun et al., 2012; Kirichenkо et al., 2008;

            Kоzachenkо et al., 2003) have focused on the theory of security. However, the results of the survey
            prove that TS is generally treated as a notion concerning protection from possible economic offenses

            (Kurkin, 2004) rather than a security theory having its own structure, basic categories and indicators.

            Unfortunately, Ukraine has ranked the fourth (following Russia, Taiwan, and Germany) among the
            world countries presenting the highest cyber threats. This data was shown on the map of countries –

            cyber-attacks sources, visualized in the report of Deutsche Telekom, a leading German operator.

                   Medicine cyber criminals keep perfecting their fraud methods, leading to material losses up to
            tens of billion dollars and posing serious risks to many countries. Some examples of the data leakages

            in the medical spheres can be indicated the following:
                   1.  September, 2011, Science Applications International Corp., backup tapes stolen from a

                       car containing 5,117,799 patients’ names, phone numbers, Social Security numbers, and
                       medical information.

                   2.  January, 2008, Stockport Primary Care Trust (U.K.), a member of staff lost a USB memory

                       stick containing data extracted from the medical records of patients. The data were being
                       carried personally to avoid sending them by e-mail because the employee thought that

                       they would be more secure.
                   3.  May,  2009,  Alberta  Health  Services, personal health  information on  thousands of

                       Albertans was skimmed  from the Alberta Health Services Edmonton network as a
                       computer  virus  infected  the  network  and  stole  medical  information  on  1,582  people,

                       including  laboratory test results and diagnostic  imaging reports.  The virus captured

                       information from a computer screen and then transmitted it to an external website.
                   4.  February, 2009, AIDS clinic, over a two-week period, Dartmouth College researchers, in

                       collaboration with P2P monitoring vendor Tiversa, searched file-sharing networks for key
            8
   3   4   5   6   7   8   9   10   11   12   13