Javascript must be enabled to continue!
RESEARCH ON THE RISKS IN CYBERSPACE DURING SPORTING EVENTS
View through CrossRef
ABSTRACT Introduction: Every major sporting event, is a huge challenge in terms of information security. The main reason for this is the huge spectator interest, the active media coverage of the event, which „attracts“ and an unwanted contingent of people seeking to acquire „assets“ in a dubious way. Developing more innovative and effective malware protection mechanisms is considered an urgent requirement in the cybersecurity community. Methodology: In the research process we have applied: information research, document analysis, historical analysis, conclusions based on personal experience, monitoring, synthesis, and theoretical analysis. A theoretical overview of the basics of security and requirements for information technology supporting sports events. Results: The purpose of the report is to analyze the cybersecurity of information systems supporting mass sporting events and to create systems of measures to prevent cyberterrorist attacks during sporting events. Discussion: In support of the allegations made so far concerning the information security of any mass sporting event, we will cite various examples. As with any Internet-related system, hackers can try to manipulate the content or interfere with sports websites and e-mail systems. Conclusion: One way to increase cybersecurity during a „mass sporting event“ is to hire specialized companies to control cyberspace activities. Although cybercriminals are becoming more advanced, with the right approach and a little common sense, we can learn to stay one step ahead. The sport will continue to use more and more technology.
Scientific Publishing House NSA Press
Title: RESEARCH ON THE RISKS IN CYBERSPACE DURING SPORTING EVENTS
Description:
ABSTRACT Introduction: Every major sporting event, is a huge challenge in terms of information security.
The main reason for this is the huge spectator interest, the active media coverage of the event, which „attracts“ and an unwanted contingent of people seeking to acquire „assets“ in a dubious way.
Developing more innovative and effective malware protection mechanisms is considered an urgent requirement in the cybersecurity community.
Methodology: In the research process we have applied: information research, document analysis, historical analysis, conclusions based on personal experience, monitoring, synthesis, and theoretical analysis.
A theoretical overview of the basics of security and requirements for information technology supporting sports events.
Results: The purpose of the report is to analyze the cybersecurity of information systems supporting mass sporting events and to create systems of measures to prevent cyberterrorist attacks during sporting events.
Discussion: In support of the allegations made so far concerning the information security of any mass sporting event, we will cite various examples.
As with any Internet-related system, hackers can try to manipulate the content or interfere with sports websites and e-mail systems.
Conclusion: One way to increase cybersecurity during a „mass sporting event“ is to hire specialized companies to control cyberspace activities.
Although cybercriminals are becoming more advanced, with the right approach and a little common sense, we can learn to stay one step ahead.
The sport will continue to use more and more technology.
Related Results
Children's orientation towards sporting events and sporting emotions
Children's orientation towards sporting events and sporting emotions
This paper investigated the relationship between middle school students' orientation towards sporting events and their level of sporting emotions. The sample consisted of 212 stude...
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cybe...
Exploring Chinese cyber discourse: integrating political and legal perspectives
Exploring Chinese cyber discourse: integrating political and legal perspectives
Abstract
Cyberspace, with the rapidly growing network of users and communication technologies, provides venues for myriad social and political interactions. The very...
The Utopian Code: Cyberspace as a Democratization of Technology
The Utopian Code: Cyberspace as a Democratization of Technology
[Introduction] William Gibson’s 1984 novel, Neuromancer, declared cyberpunk as a fully realized science fiction subgenre that reverberates into the current time. The text follows a...
The Utopian Code: Cyberspace as a Democratization of Technology
The Utopian Code: Cyberspace as a Democratization of Technology
[Introduction] William Gibson’s 1984 novel, Neuromancer, declared cyberpunk as a fully realized science fiction subgenre that reverberates into the current time. The text follows a...
Regulation in Cyberspace
Regulation in Cyberspace
Regulation in cyberspace is an emerging challenge. It is a complex and dynamic domain that is largely driven by the business-civilian sector and has the potential to cause signific...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Responsibilities to Protect Children in Cyberspace: Analysis of Legal Regulations in Vietnam
Responsibilities to Protect Children in Cyberspace: Analysis of Legal Regulations in Vietnam
In the digital era, all activities related to learning, playing, entertaining, and connecting with friends... can take place in cyberspace. It is impossible to deny the positive va...

