Serghei A Ohrimenco - Profile on Academia.edu (original) (raw)

Papers by Serghei A Ohrimenco

Research paper thumbnail of PROTECTING BLOCKCHAIN FROM IOT DEVICE ATTACKS: CHALLENGES AND SOLUTIONS

MEST Journal, 2025

This paper focuses on the challenges and solutions in protecting blockchain technology from attac... more This paper focuses on the challenges and solutions in protecting blockchain technology from attacks through IoT devices, emphasizing the importance of integrating these technologies into modern systems. The study is based on the null hypothesis that there is no significant correlation between security challenges posed by IoT devices and the compromise of integrity, availability, or immutability of blockchain technology. While IoT devices enhance operational efficiency, they simultaneously represent vulnerabilities for potential cyberattacks that may jeopardize the security of blockchain systems. Identified security challenges, including DDoS attacks, data manipulation, ransomware, and protocol compromise, are analyzed through real-world cases and technological solutions. The analysis reveals that Zero Trust architecture, smart contracts, cryptographic algorithms, and artificial intelligence significantly enhance the security and resilience of integrated systems. User education, standardization of IoT security protocols, energy-efficient solutions, and collaboration between industries and regulatory bodies are key to mitigating risks. Based on the analysis, a significant correlation between IoT-related security challenges and blockchain compromise was established, rejecting the null hypothesis. The paper offers recommendations for improving the security of these technologies, highlighting the need for continuous monitoring and innovation in IoT and blockchain environments. It is intended to be useful for cybersecurity professionals, researchers working on IoT and blockchain integration, and companies implementing IoT devices in industrial and commercial contexts.

Research paper thumbnail of Building Digital Trust in Document-Centric Systems

14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2024), DECEMBER 2 - 3RD, 2024, UNWE, SOFIA, BULGARIA, 2024

The applied to document-centric systems. Various definitions of the ZT concept given in various s... more The applied to document-centric systems. Various definitions of the ZT concept given in various scientific sources are considered and analysed. The authors point out that the concept of ZT has been further developed in the context of the revision of the conceptual foundations of cybersecurity. An analysis of the composition of literature sources is given. The authors reviewed international standards for access control in documentcentric systems. The third part of the paper describes the document-centric approach, provide a constant assessment of the legitimacy of user actions based on certain risks.

Research paper thumbnail of COMMERCIAL SECRET MANAGEMENT IN TERMS OF SHADOW DIGITAL ECONOMY

Business Management, 2025

The article explores trade secret protection management in the context of the shadow digital econ... more The article explores trade secret protection management in the context
of the shadow digital economy (SDE). The study aims to identify threats to trade secrets associated with SDE and propose effective protection methods. It emphasizes that the economic value of trade secrets lies in their confidentiality, making them vulnerable to data leaks, cyberattacks, and other risks, particularly in the digital environment.
The authors examine the nature of trade secret in terms of SDE spread. The paper presents methods of trade secret protection, including documentary, economic-organizational, and information-analytical types. Special attention is paid to the combined use of patent protection and encryption techniques.
The study concludes with key findings, highlighting the need for enhanced
cybersecurity, international cooperation to combat cyber espionage, and improved organizational measures. This work significantly contributes to the understanding of commercial secret management and offers valuable recommendations for businesses operating in the digital economy.

Research paper thumbnail of Сборник доклади конференция Свищов 9 10 11 2023

Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. ... more Проф. д-р Марияна Божинова-председател Проф. д-р Андрей Захариев Проф. д-р Атанас Атанасов Проф. д-р Румен Брусарски Доц. д-р Искра Пантелеева Доц. д-р Любомир Иванов Доц. д-р Румен Ерусалимов ОРГАНИЗАЦИОНЕН КОМИТЕТ Доц. д-р Галина Чиприянова-председател Проф. д-р Андрей Захариев-съпредседател Членове: Проф. д-р Румен Брусарски Проф. д-р Стоян Проданов Доц. д-р Венцислав Василев Доц. д-р Людмил Несторов Доц. д-р Пламен Петков Доц. д-р Силвия Костова Ст. преп. д-р Виктор Монев Ст. преп. д-р Радослав Николов РЕДАКЦИОНЕН СЪВЕТ Проф. д.н. Божидар Божинов Проф. д-р Георги Иванов Проф. д-р Йордан Василев Проф. д-р Пенка Шишманова Проф. д-р Стефан Симеонов Проф. д-р Теодора Димитрова Доц. д-р Красимира Славева Публикуваните материали са рецензирани. Авторите носят отговорност за съдържанието на материалите, изразените мнения, използваните данни, цитираните източници и езиковото оформление на текстовете. Всички права запазени! Не се разрешават копиране, възпроизвеждане и разпространение на книги или на части от тях по какъвто и да е начин без писменото разрешение на авторите и Академично издателство "Ценов".

Research paper thumbnail of Econ Sanctions-

В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущ... more В монографии систематизированы различные аспекты санкций, включая их исторический контекст, текущие тенденции, а также многообразие подходов к оценке их эффективности. Особое внимание уделено анализу современных киберсанкций и их влиянию на международные отношения и глобальную экономику. Содержание данной монографии является логическим продолжением проведенных исследований авторов. Материал предназначен для широкого круга читателей, включая преподавателей, студентов, аспирантов экономических специальностей, научных сотрудников, работников организаций и предприятий. Карп М.В. -заведующий кафедрой «Бухгалтерского учета, аудита и налогообложения», ФГБОУ ВО «Государственный университет управления», Москва, Россия, профессор, д-р экон. наук; Карамова О.В. -профессор кафедры экономической теории ФГОБУ ВО «Финансовый университет при Правительстве РФ», Москва, Россия, профессор, д-р экон. наук.

Research paper thumbnail of New Forms and Features of Cyber Confrontations

13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE – 2023, 2023

The evolution of the cyberspace domain and its accompanying management tools has ushered in an er... more The evolution of the cyberspace domain and its accompanying management tools has ushered in an era characterized by the emergence of new forms of confrontation: cyber blockades and cyber sanctions. This development has paved the ways for enhanced capabilities in economic management, the expansion of diplomatic and trade relationships, and ultimately, the safeguarding of national interests at an unprecedented
level. This paper presents the results of an analysis of these new categories, elucidating their interconnectedness, and highlighting the evolution and continued development of these two domains, particularly within cyberspace. The authors draw attention t o the new dimensions of confrontation within the cyberspace realm, encompassing explicit and
hidden threats to individuals, society, and the state.

Research paper thumbnail of Cybersecurity risk

This paper presents the multifaceted field of cyber risks, their structure and composition, explo... more This paper presents the multifaceted field of cyber risks, their structure and composition, exploring the challenges posed by the rapid evolution of digital technologies. It highlights the prevalence of cyber risks as a set of activities performed in various sectors of human life, revealing the vulnerabilities faced by individual and collective users, commercial organisations, governments and individuals in today's hyperconnected landscape. The paper emphasises the importance of robust risk management strategies, highlighting the dynamic and persistent nature of cyber threats. A host of relevant international standards, frameworks and cyber risk management techniques to mitigate potential losses are reviewed. Approaches to defining the category of cyber risk are analysed. Daily attack techniques are reviewed. Risk analysis based on a set of reports from leading computer firms has been carried out. The structure of cyber security threats affecting the level of risk is determined. Despite the existing scientific and practical achievements in the field of cyber security, the ever-changing tactics of cyber criminals require constant adaptation of organisational and technical actions and the adoption of a set of proactive measures. Cyber risk management strategies are discussed, which include the selection of possible approaches, taking into account factors such as the level of cyber maturity, available resources, required skills and experience in cyber risk management. The article identifies the most prominent risk management tools, suggests some risk management strategies and advocates a comprehensive approach to cyber security that recognises the inevitability of cyber attacks and the need to build resilience in the face of emerging threats.

Research paper thumbnail of Threats Model for the Security of Personal Data During Their Processing

PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION ICAICTSEE-2022, 2022

The article describes the main steps to form a model of threats to the security of personal data ... more The article describes the main steps to form a model of threats to the security of personal data during their processing in information systems. Particular attention is paid to the deliberate actions of the violator, which lead to damage to the interests of the individual, society and the state. The results of the analysis of existing methods and standards are presented, including: ISO 27005-2022, The STRIDE Threat Model, NIST Special Publication 800-37. The hierarchical intruder model is described as one of the sources of threats along with malware carriers and bookmarks, the definition and description of attack channels.

Research paper thumbnail of SILENT WARFARE: UNDERSTANDING THE IMPACT OF CYBER BLOCKADES AND SANCTIONS

MEST Journal, 2024

Traditionally, experts considered several blockades, including sea and land, with the development... more Traditionally, experts considered several blockades, including sea and land, with the development of aircraft transportation-air, and with the advent of space technology and special satellites-space. Also, information blockades have been introduced with the rapid development of computer technology and communication tools. Each type of blockade had its historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20 th century, scientists operated the term cyber blockade and restrictions in cyberspace. The paper sequentially considers physical environments (domains): air, land, sea, outer space, information space, and cyberspace. Multiple definitions of cyberspace have emerged as this concept evolves and becomes more nuanced in response to rapid developments in the technical, technological, economic, and social dimensions of modern life. Due to their potential, cyber-attacks and cyber warfare have garnered significant attention considering the ongoing development of society and business. Cyber-attacks are carried out regularly-against government agencies, military and civilian departments, and private businesses. The growing dependence of countries on cyberspace can play a negative role in the process of confrontation. The enemy can attack those areas where cyberspace is a decisive element. The authors discussed the questions of cyber-blockade efficiency.

Research paper thumbnail of The Nature of Shadow Digital Economics

MEST Journal, Jan 15, 2021

The purpose of this paper is to analyze, discuss, and develop a study of world universal digitali... more The purpose of this paper is to analyze, discuss, and develop a study of world universal digitalization processes as well as challenges and threats, and develop an approach to defining the shadow digital economy. Along with huge innovative achievements, digitalization processes are accompanied by the formation of a digital economy and the growth of illegal activities. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business, and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. The analysis shows the causes and factors of the emergence and functioning of the new segment in the shadow economy. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emergence of new overt and hidden threats to the individuals, society, and the state. The main components of the digitalization process are analyzed. Conclusions are drawn about the development of shadow digitalization processes and the formation of a shadow digital economy, which is directly related to cybersecurity.

Research paper thumbnail of Peculiarities of Economic Crimes in the Banking Sphere

Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of CYBER THREATS MODELING: AN EMPIRICAL  STUDY

Business Maanagement, 2023

The immediacy of this study is determined by the need to fight back against the modern cyber thre... more The immediacy of this study is determined by the need to fight back
against the modern cyber threats that arise in the process of building a digital economy.
The issues of countering various cyber threats in the activities of small and medium enterprises, firms stand to be a serious problem. Its relevance is constantly increasing. This is due to a number of objective reasons, the main of which are the following.
Firstly, the globalization of economic processes, which leads to a situation where the technical, software and information component of the Information System (IS) is the same in relation to all countries developed in terms of information.
Secondly, a significant change in the landscape of the IS threats themselves. It should be noted that the changes affected both quantitative and qualitative characteristics. Malware, Network Scanning, Man in the Middle, Phishing, DNS Spoofing, Trojan Horses. These are just a few examples of cyber threats carried out against small and
mid-sized businesses and government information systems every day.
The current condition of the information security system of governmental and commercial structures does not provide efficient resolving of up-to-date cybersecurity problems and creation of confident interaction between the critical infrastructure objects.
It should be assumed that there is a need to update the theoretical and
methodological base and practical developments that can protect the rights and legitimate interests of the individual, business and the state from modern security threats and increase the level of security of our economy.

Research paper thumbnail of Cyber-attacks Scenarios Analysis

11TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE 2021), NOVEMBER 25-26TH, 2021, UNWE, SOFIA, BULGARIA, 2021

The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats... more The digital transformation, in all its aspects, is accompanied by a rapid growth of cyber threats and attacks on various critical infrastructure facilities. Some of cyberattacks target personal data, operations management processes, financial reporting results, etc., having as a final objective monetization of the results. Accordingly, there is a need for a complex and comprehensive analysis of information, which presents key
aspects of cyber-attacks. The current paper presents the results of a study aimed to identify and analyze possible scenarios, stages and facets of cyberattacks, highlighting potential motives, goals, objects, means of attack, specific actions, as well as the final potential results of cyber-attacks.

Research paper thumbnail of Organizing a cyber blockade

Management Strategies and Policies in the Contemporary Economy

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea, land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace. A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life. Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role ...

Research paper thumbnail of Экономические санкции против России в сфере информационных технологий

Новый смысл развития предпринимательства: модель опережения, технологии, кадры, 2023

Современная санкционная политика, направленная на ограничение доступа Российской Федерации к пере... more Современная санкционная политика, направленная на ограничение доступа Российской Федерации к передовым технологиям, имеет давние исторические корни.
Решая проблему недопуска технологического превосходства СССР в мире, в ходе так называемой "холодной войны" капиталистический лагерь стал использовать стратегию управляемого технологического отставания, включающую перечень товаров и технологий, запрещенных к ввозу в СССР и другие социалистические страны.

Research paper thumbnail of ORGANIZING A CYBER BLOCKADE

Strategii si politici de management in economia contemporana, 2023

Traditionally, experts considered several types of blockades, including sea, land, with the devel... more Traditionally, experts considered several types of blockades, including sea,
land, with the development of aircraft construction - air, with the advent of space technology and special satellites - space. With the rapid development of computer technology and communication tools, the information blockades have been introduced. Each type of blockade had its own historical characteristics; they differed in costs and, of course, efficiency. In the second half and at the end of the 20th century, scientists operated the term cyber blockade and restrictions in the field of cyberspace.
A number of definitions of cyberspace are provided, since this category changes and is refined depending on the rapidly developing technical, technological, economic and social aspects of our life.
Because of the threat they pose, cyber-attacks and cyber warfare receive significant attention once society and business is developing. The growing dependence of countries on the cyberspace can play a negative role in the process of confrontation; the enemy can attack those areas where cyberspace is a decisive element.

Research paper thumbnail of EcCrimes Visnik

Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікув... more Журнал включено до категорії «Б» переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук (юридичні науки) (додаток 4 до наказу МОН України від 28.12.2019 № 1643) Видання індексується в міжнародних базах даних «Index Copernicus International» та «Crossref»

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Estimation of the Key Segments of the Cyber Crime Economics

2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), 2021

Our everyday world is rapidly changing with the help of digital transformation and is increasingl... more Our everyday world is rapidly changing with the help of digital transformation and is increasingly dependent on information technology, and because of that our society needs to be prepared for new challenges and threats that come with the change. The composition of the latter is constantly shifting due to the development and improvement of computer technology, software, and methods for collecting, processing, and storing information and data. In these conditions, the relevance of scientific works on topics related to research in the field of cybercrime as an economic phenomenon increases drastically. The digital transformation of all aspects of daily activity turns the user's devices into the target of attacks aimed at taking possession of their private information (accounts, banking details, etc.) and recently even the devices' computing power. The authors see an immense necessity in studying of shadow (criminal) business models based on the development, debugging, and commercial distribution of criminal software.

Research paper thumbnail of Shadow of Digital Economics

Shadow of Digital Economics

2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019

the main purpose of this article is to analyze, discuss, and develop an approach to defining the ... more the main purpose of this article is to analyze, discuss, and develop an approach to defining the shadow digital economy that accompanies worldwide digitalization processes. Digital economy implies total globalization, creates an ultra-high competitive environment, provides a new quality of life, business and public services. At the same time, many traditional areas of activity are being destroyed. In addition to understandable achievements, it is necessary to analyze new obvious and hidden threats that digitalization processes carry. An analysis of the causes and factors of the emergence and functioning of the new segment in the shadow economy is conducted. The approaches to the definition of this category and its content are discussed. A classification of criminal-oriented products and services that are the basis of a highly profitable illegal business has been proposed. The problem of confrontation with Shadow Digital Economics acquires particular urgency in the face of the emerge...