Page 8 - ISCI’2017
P. 8
1 Problem’s Statement
Internet cyber criminals keep perfecting their fraud methods, leading to material losses up to tens of
billion dollars and posing serious risks to many countries (including Ukraine). Therefore, specialized
departments and structures have been created to combat this type of crime. They constantly get ever
more power and better technical facilities. One of the recent examples is the European Center of
Cybercrime Prevention that commenced its work in the beginning of 2013.
On March 19, Europol released a report “The EU Serious and Organized Crime Threat
Assessment” (SOCTA 2013) with an assessment of the growing globalized and organized crime rates
by means of the Internet (Official site of Europol, 2013).
Recently in Ukraine, there has occurred an increase of interest in the research in the Theory
of Security (TS). Many recent studies (Heiets et al., 2006; Kavun et al., 2012; Kirichenkо et al., 2008;
Kоzachenkо et al., 2003) have focused on the theory of security. However, the results of the survey
prove that TS is generally treated as a notion concerning protection from possible economic offenses
(Kurkin, 2004) rather than a security theory having its own structure, basic categories and indicators.
Unfortunately, Ukraine has ranked the fourth (following Russia, Taiwan, and Germany) among the
world countries presenting the highest cyber threats. This data was shown on the map of countries –
cyber-attacks sources, visualized in the report of Deutsche Telekom, a leading German operator.
Medicine cyber criminals keep perfecting their fraud methods, leading to material losses up to
tens of billion dollars and posing serious risks to many countries. Some examples of the data leakages
in the medical spheres can be indicated the following:
1. September, 2011, Science Applications International Corp., backup tapes stolen from a
car containing 5,117,799 patients’ names, phone numbers, Social Security numbers, and
medical information.
2. January, 2008, Stockport Primary Care Trust (U.K.), a member of staff lost a USB memory
stick containing data extracted from the medical records of patients. The data were being
carried personally to avoid sending them by e-mail because the employee thought that
they would be more secure.
3. May, 2009, Alberta Health Services, personal health information on thousands of
Albertans was skimmed from the Alberta Health Services Edmonton network as a
computer virus infected the network and stole medical information on 1,582 people,
including laboratory test results and diagnostic imaging reports. The virus captured
information from a computer screen and then transmitted it to an external website.
4. February, 2009, AIDS clinic, over a two-week period, Dartmouth College researchers, in
collaboration with P2P monitoring vendor Tiversa, searched file-sharing networks for key
8