Effective protection of information systems and networks against attacks in the era of globalization

Katarzyna Witczyńska



The problem of ensuring the security of networks and computer systems of transnational companies is one of the most important issues of modern computer science. In scientific centers around the world, numerous studies are carried out to ensure the security of operating systems and application programs. The aim of the work is to provide theoretical and practical knowledge related to threats, security methods and the latest trends in effective protection of networks and information systems against attacks.


globalization, transnational company, Types of antivirus programs

Full Text:



Błaszczyk A., Wirusy. Pisanie wirusów i antywirusów, Read Me, Warszawa 1998.

Cavusoglu H., Mishra B., Raghunathan, S., The value of intrusion detection systems in information technology security architecture, "Information Systems Research", (2005), pp. 28-46.

Erbschloe M., Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code, Butterworth-Heinemann 2004, p. 28.

Krebs B., Online Anti-Virus Scans: A Free Second Opinion, Washington Post 2007.

Maraia V., The Build Master: Microsoft's Software Configuration Management Best Practices, Addison-Wesley 2006.

Shaw A.C., Projektowanie logiczne systemów operacyjnych, Wydawnictwo Naukowo-Techniczne, Warszawa 1980.

Vieler R., Professional Rootkits, John Wiley & Sons, 2007, p. 244.

Wróbel M., Metody zapewniania bezpieczeństwa systemów operacyjnych - Rozprawa Doktorska, POLITECHNIKA GDAŃSKA Wydział Elektroniki, Telekomunikacji i Informatyki, Gdańsk 2010.

Yegneswaran V., Barford P., Ullrich J., Internet intrusions: global characteristics and prevalence, [in:] Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, ACM, New York 2003.

Yung M., Young A., Cryptovirology: extortion-based security threats and countermeasures, [in:] IEEE Symposium on Security and Privacy, USA, 1996, pp. 129–140.

Internet sources:

Astechnica, https://arstechnica.com/information-technology/2015/06/fbi-says-crypto-ransomware-has-raked-in-18-million-for-cybercriminals/

Forbes, https://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#48b2c0423a91


Pctools, http://www.pctools.com/security-news/what-is-a-keylogger/

Techrepublic, http://www.techrepublic.com/article/4-tips-to-help-your-business-recruit-and-keep-cybersecurity-pros/

XComputerweekly, http://www.computerweekly.com/feature/Globalisation-IT-management-strategies


  • There are currently no refbacks.