Abstract:
When analysing the state of the modern digital environment, it is necessary to emphasise that cyber threats pose a constant risk factor for both private companies and government institutions. It has been established that cyberattacks have become targeted, and their number is on the rise. Therefore, in order to quickly detect, respond to, and reduce the level of cyber incidents, it is necessary to create more effective mechanisms for countering and managing information security incidents. The purpose of this article is to study cyber incidents that have a negative impact on the country's information space and pose threats to all areas of activity. It has been found that cyber incidents vary in nature, including phishing attacks, sending spam to mailboxes, fraudulent messages, hacking private accounts, ransomware, creating complex and targeted attacks on critical infrastructure, and attacks that cause significant financial losses and lead to user distrust of the resources they use most often are also common. The research used the methods of analysis, synthesis, evaluative and situational, comparative, graphical and generalisation. It is becoming increasingly difficult to counter cyber threats, as with the development of information technology, fraudsters and cybercriminals are complicating and refining their methods of influence, which is why new, more effective methods of countering them are being developed. It has been established that cyber attacks most often have political and economic factors, so such attacks pose a particular threat when high-tech means are used. Areas such as economic, social and national security are the most at risk, where cyber incidents pose a significant threat. Therefore, the development of effective and efficient strategies for managing such cyber incidents is currently a pressing issue. The article concludes that there is a need to develop an effective and comprehensive approach to detecting, responding to, and restoring information that has been damaged after cyber incidents. It is discussed that with the increase in the level of threats, the requirements for the creation of modern approaches to integrating all important measures to ensure the resilience of digital systems to cyber threats, which have become increasingly widespread in recent years, are only possible through a combination of modern innovative technologies, the creation of effective security policies and international cooperation. Thus, cyber incident management is a continuous process that requires the training of highly qualified cybersecurity specialists, the creation of effective technical protection, interaction between teams, and a culture of security within the organisation. In the context of growing cyber threats and crime, it is important for law enforcement agencies to develop effective strategies to combat crime and take measures to protect the rights and freedoms of every citizen and the security of the entire state. JEL: G14, H56, L86
Description:
RYBALCHENKO, Liudmyla Volodymyrivna and Olha Andriivna HABORETS. Cyber Incident Management: Approaches and Best Practices. Online. In: Proceedings of the 29th International Scientific Conference Competitiveness and Innovation in the Knowledge Economy, Chișinău, Moldova, September 26-27, 2025. București: Editura ASE, 2026, pp. 488-491. ISSN 3100-5527. Disponibil: https://doi.org/10.24818/cike2025.59