<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Approaches to measuring the risk of cyberattacks in remote banking services of Russia</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander A. Berdyugin</string-name>
          <email>brdgn@bk.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavel V. Revenkov</string-name>
          <email>pavel.revenkov@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Security, Financial University under the Government</institution>
          ,
          <addr-line>Moscow, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <fpage>6</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>- Purpose. Due to the use of technology in banks their risks of information security breach are rising significantly. In the context of active introduction of remote banking systems (RBS) in banking business of Russia, additional study of issues of assessing the risk of cyberattacks on banking automated systems was required. Methods. The methods of financial management, probability theory, system analysis of scientific literature on fundamental and applied research, and a method of graphical interpretation of analyzed phenomena are used. The paper gives a detailed analysis of the concepts of “cyberspace” and “cybersecurity”. Remote banking is considered from the point of view of financial management. Attention is drawn to the factors of work in cyberspace that increase the levels of banking risks. The relationship of cyberattacks on banking automated systems and possible consequences for the bank is analyzed. Novelty. Given the wide spread of social engineering methods when committing fraudulent activities on the Internet the measures to increase the cyber literacy of population are needed. The method for assessing the risk of cyberattacks on RBS for use by risk department specialists and employees of internal control services is developed. As a result, considering innovative systems and technologies that await us in the future, the effectiveness of risk assessment for solving current challenges is increased. Results. Attempts are made to formulate the mathematical model of the probabilistic analysis of information security incidents to optimize the algorithm for responding to incidents. Calculations based on the proposed model made it possible to determine the duration of exploitation of vulnerability of RBS, when the probability of preventing an incident exceeds probability of its realization. The findings may be useful for scientific research on the risks of information security breach in RBS.</p>
      </abstract>
      <kwd-group>
        <kwd>cyberspace</kwd>
        <kwd>risk of cyberattacks</kwd>
        <kwd>RBS</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>risk assessment</kwd>
        <kwd>information security incident</kwd>
        <kwd>banking</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The latest achievements in the field of information and
telecommunication technologies have significantly changed the
process of conducting the banking business and have become
the basis for the active implementation of remote banking
systems (RBS). The most common remote banking options are:
Internet banking (managing bank accounts and cards via the
Internet and an on-line web browser) and mobile banking
(managing bank accounts and cards from tablet computers,
smartphones and other smart devices). The process of
interaction between the bank and the client in the conditions of
application of RBS is carried out in a virtual environment or, in
other words, in cyberspace.</p>
      <p>
        The concepts of “cyberspace” and “cybersecurity” are
currently absent in the legislation of the Russian Federation.
The terms “information space” and “information security” are
traditionally used. The concepts of “cyberspace” and
“cybersecurity” can be found in a number of international and
national standards related to ensuring information security.
Further on we will use these terms. If we combine different
approaches to the definition of these concepts, then cyberspace
is most often understood as an environment of information
interaction and data exchange implemented in computer
communication networks and networks, where the elements of
cyberspace are servers, computers, telecommunication
equipment, communication channels, information and
telecommunication networks, and cybersecurity is maintaining
the confidentiality, integrity and availability of information in
cyberspace. For the analysis of approaches to the definition of
the concepts of “cyberspace” and “cybersecurity” we used [
        <xref ref-type="bibr" rid="ref2 ref3">1,
2, 3</xref>
        ], as well as [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>
        The banking business began to use cyberspace, first of all,
due to significant cost savings for operating activities (there is
no need to maintain banking offices, and the client himself
performs the functions of the operator from his computer,
tablet or smartphone) [
        <xref ref-type="bibr" rid="ref17 ref6">6, 17</xref>
        ].
      </p>
      <p>
        We add that the daily increase in the number of cellular
subscribers and users of the global Internet network contributes
to the spread of RBS in various parts of the world (including
both developed and developing countries) [
        <xref ref-type="bibr" rid="ref18 ref7">7, 18</xref>
        ].
      </p>
      <p>Additional income comes from the increase the value of
cash flows due to the increase in commission fees and/or
reducing expenses due to growth in operating efficiency.
Consider the impact of scientific and technological progress on
return on equity ( ROE ):
</p>
      <p>ROE  ROA  EM  PM  AU  EM 

where PM is the profit margin; AU – asset turnover
ratio (asset utilization); EM – the value of the equity
multiplier. The main variable in the formula (1) is PM – net
profit to total revenue ratio and AU – the ratio of total revenue
to asset value. Return on equity ratio represents the amount of
the bank’s income per monetary unit of equity:</p>
      <p>ROE  NP E ,
where NP is net profit (the difference between income and
expenses), and E is the average equity.</p>
      <p>Investments in RBS increasing PM by minimizing costs
and AU by increasing the bank's commission income,
therefore ROA and ROE will increase. If the expansion of
market share and the increase in the asset base as a result of
innovations exceed the growth of capital, then the resulting
financial leverage (a higher EM value) will advance ROE .
For the banks with excess capital relative to the minimum,
which regulators require, it is necessary to invest in RBS and
other innovations.</p>
      <p>However, in addition to the obvious advantages, work in
cyberspace is accompanied by several factors that can increase
levels of banking risks:</p>
      <p>- remote banking operations are mostly “virtual” in nature
(in fact the client after the invoice and registration a contract
for the provision of services using RBS has no direct contact
with the bank). This type of interaction places increased
demands on customer identification (including the
implementation of the “Know your customer” principle).
Otherwise, an attacker may initiate operations on behalf of the
client;</p>
      <p>- the availability of “open” telecommunication systems (the
availability of the global Internet and cellular communications
in the absence of proper control over these types of
communications complicates the control over actual users of
these types of communications);</p>
      <p>
        - extremely high speed of transactions (the speed of
banking operations performed using RBS is limited to seconds,
which also imposes increased control requirements);
- the global nature of inter-network operational interaction
(since with RBS operations are performed not only in the
country in which the client is located, but also beyond its
borders, then additional sources of risks arise due to the
peculiarities of the legislation in each individual country
through which clients pay) [
        <xref ref-type="bibr" rid="ref19 ref8">8, 19</xref>
        ];
      </p>
      <p>- the possibility of using RBS for illicit activities (due to
insufficient control by regulators, speed of execution of the
operations themselves and the ability to hide some of the data
of the real perpetrators, etc.).</p>
      <p>
        In this paper (applicable in practice in the credit and
financial sphere), the authors use the term “risk of
cyberattacks” (RCa), which is understood as a measure of the
increase in typical banking risks (including financial losses)
arising from realization of a cyberattacks on banking
automated systems (BAS). The term RCa has already been
used by authors in scientific papers, for example, [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Thus, the aim of the study is to analyze cause-effect
relationships under the influence of computer attacks on typical
banking risks and to develop new (applicable in practice in the
credit and financial sphere) approaches to assessing RCa, due
to which possible to improve significantly the quality of
ensuring cybersecurity in organizations of the financial sector.</p>
      <p>II.</p>
      <p>EXPANDING PROFILES OF TYPICAL BANKING RISKS DUE</p>
      <p>TO COMPUTER ATTACKS</p>
      <p>Consider the main types of cyberattacks on BAS noted in
the annual reports of FinCERT of the Bank of Russia and the
company's Group-IB: attacks on AWP CBR, AWP SWIFT,
AWP RBS and attacks on self-service devices (Automated
Teller Machines – ATMs), where AWP CBR is an automated
workstation of a client of the Bank of Russia, AWP SWIFT is
an automated workstation of a client of the Society for
Worldwide Interbank Financial Telecommunications, AWP
RBS is an automated workstation of a client of RBS.</p>
      <p>To implement all of these attacks, first one needs to
download malicious software (malware) into the local area
network (LAN) of the credit institution. To do that, an attacker
sends an e-mail to a credit institution containing malware,
which is not detected by antivirus tools. After malware
infection, using SMB requests, a scan of the LAN segment
accessible to the infected machine is performed to infect new
workstations.</p>
      <p>The main reason why the above attacks are “successful” is
the human factor, which manifests itself in the form of a
negligent attitude of bank employees to the established
algorithm for preparing, storing, processing and transmitting
electronic customer orders. According to the Group-IB’s report
for 2018 year, in Russia 1-2 banks were subjected to computer
robberies every month. The damage from one theft on average
is 132 million rubles ($2 million).</p>
      <p>
        The development of the digital economy in Russia and the
minimization of the level of RCa are associated with an
increase in the level of cyberliteracy of the population of our
country [9]. Particular attention should be paid to the
understanding by all users of the global Internet that they work
often in a “trusted environment”. Therefore, knowledge of the
main types of cyber-fraud can significantly reduce the number
of hacker attacks. The development of computer discipline and
the prevention of uncontrolled development of cyberspace [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
can be facilitated by the studying of “blind” typing with ten
fingers. The authors of this paper propose introducing the
method of “blind” typing with ten fingers into the education
system in Russia, as the development of fine motor skills of the
hands contributes to the activation of the frontal lobes of the
brain. Proper finger positioning on a keyboard is analogic to
complying with traffic signs when traveling.
      </p>
      <p>
        Work in cyberspace, first of all, increases role of the
technical components of all typical banking risks (Fig. 1),
among which operational, legal, strategic, reputational and
liquidity risks can be highlighted (full list of typical banking
risks is given in the Letter of the Bank of Russia dated June 23,
2004 “On Typical Banking Risks” No. 70-T) [
        <xref ref-type="bibr" rid="ref10 ref21 ref23">10, 21, 23</xref>
        ].
Underestimation of the possible consequences of
cyberattacks can seriously affect the stability of a commercial
bank. In this regard, the assessment of RCa manifestations by
specialists of risk divisions should be carried out in a timely
manner, followed by notification to the management of the
credit organization so that the management of the credit
organization can take preventive measures in a timely manner.
      </p>
      <p>In the risk-divisions of credit institutions the specially
trained professionals should be able to assess the quality of the
vulnerability of different areas of digital circuit technology
bank, formed in each individual credit institution (including in
terms of increasing RCa). In order to understand the features of
the functioning of distributed computing systems and have a
clear understanding of the construction of information circuits
of banking electronic services via the Internet and mobile
communications, risk department specialists must have a
technical education in addition to humanitarian (economic or
legal) education.</p>
      <p>Modern cybersecurity systems must be well automated for
timely response on emerging incidents. The immediate start-up
of the response process should occur from virtually any signal
of information security monitoring systems. The effectiveness
of the response method can be checked by the formula:
</p>
      <p>RRL  REbefore  REafter </p>
      <p>RRC


where RRL is the effect of reducing risk (the method is
applicable when RRL1);</p>
      <p>REbefore and REafter
after application of the response method;</p>
      <p>– exposure to RCa before and</p>
      <p>RRC – costs associated with the application of a particular
response method.</p>
      <p>
        Of course, the calculation by the formula (2) of
compensation costs can be ignored in the presence of minor
consequences of the implementation of the RCa. There is
enough reserve for RCa in the budget plan [
        <xref ref-type="bibr" rid="ref14 ref22">14, 22</xref>
        ], as
described below.
      </p>
      <p>The consequences of cyber-risks are one of the components
of an organization’s operational risk. The Basel Committee on
Banking Supervision (BCBS) recommends using this approach
to risk assessment. In accordance with the recommendations of
the committee, commercial banks should create a reserve for
operational risk (OpR), considering the active use of digital
technologies. The assessment of capital, which is reserved for
OpR, is carried out using the basic indicative method:
1 3
KOpR    GI i 
3 i1

where KOpR is amount of capital allocated to cover OpR,
1 3</p>
      <p>
          GI i is average gross income for 3 years with the
3 i1
condition that GI i  0 ,   15% – factor established by the
Basel Committee on the basis of empirical research and
influenced by the banking community, which includes mainly
commercial banks in Europe. The average gross income of a
commercial bank for the past 3 years is calculated according to
the financial statements of the bank (See in detail in the articles
[
        <xref ref-type="bibr" rid="ref13 ref8">8, 13</xref>
        ]).
      </p>
      <p>However, European standards are not always the
benchmark for Russian's conditions. This requires developing a
method adapted to the characteristics of credit organizations of
the Russian Federation.
IQzlo  ;</p>
      <p>For the most objective assessment of the violation’s results,
the possible consequences of realization of the RCa for banks
and their customers should be considered. Authors propose a
method of quantitative account of the consequences,
considering such parameters as:</p>
      <p>1) an increase in the amount of damage incurred as a result
of realization of the RCa in the RBS, – conventional monetary
units n ;</p>
      <p>2) an increase in the intelligence coefficient of
cybercriminals (i.e., the smarter the hacker, the more damage
and opportunities to go unnoticed), is a dimensionless quantity
3) an increase in the period spent on restoring the continuity
of banking activity after realization of the RCa, – hours r  ;
4) reduction the time required for the manufacture and use
of cyber-weapons for realization of the RCa (Hacking
Services), – hours t  0 ;</p>
      <p>5) reduction in the cost of production (acquisition) of H&amp;S
for the implementation of cyberattacks, – conventional
monetary units d  ;</p>
      <p>6) reduction in the amount of overhead costs for using H&amp;S
for cybersecurity breach (Hacking Services), – conventional
monetary units v .</p>
      <p>Cyber-weapons is the generalized term proposed by the
authors includes a set of measures aimed at minimizing the
possible consequences of the manifestation of the RCa.
Determining the effectiveness of cyber-weapons ef  is as
follows:</p>
      <p>Thus, the ratio of formulas (3) and (4) allows us to
determine the size of the reserve for cyber-risk in the
composition of the OpR, that is RCa  KOpR ef .</p>
      <p>The use of this relationship for the management of the
continuity of credit institution activities may become the basis
for estimates of reserved capital for the RCa in the RBS.</p>
      <p>
        A significant part of the space-time continuum must be
scientifically investigated if one wishes to obtain reliable
results. In the opposite case, one might arrive to false
conclusions [
        <xref ref-type="bibr" rid="ref15 ref20">15, 20</xref>
        ]. The mathematical representation of the
RCa can be represented in the form of a model that underlies
the classical “task of meeting” of probability theory (in our
case, meet cybercriminals and anti-hacker in the network).
Opponents act in cyberspace independently at any time period,
their presence in the network is discrete due to the human
factor. Let's say
      </p>
      <p>S1 – event 1 (the penetration of hacker into the LAN);
S2 – event 2 (exploiting of RBS vulnerability);</p>
      <p>S3 – event 3 (the implementation of a computer incident
and theft of money).</p>
      <p>An event S1 means a signal from cybersecurity system and
the start of a response process. The time moments of the above
persons in the network are denoted as a and b , respectively,
and depicted on the axis aOb (Fig. 2).

ef 
n  IQzlo  r
d  v t


b  a  S2 if b  a

a  b  S2 if a  b</p>
      <p>
a  b  S2 </p>
      <p>By the property of the absolute value of a number, the
system (5) is equivalent to the inequality:</p>
      <p>The coordinates of the meeting points of the opponents fall
into the figure S1S2 BACS 2 . Let’s denote this hexagon by a</p>
      <p>Accordingly, the probability of the opposite event
(computer incident prevention – CIP) is equal to</p>
      <p>Let’s consider, how this model acts “in numbers”. For
example, the credit organization determined by its information
security (or cybersecurity) policy that the maximum response
time to an information security incident is no more than 90
minutes. Based on this S3  90 . Let’s compute the values of
PRCa and PCIP by the formulas (6) and (7) for different values
S2 (Table 1).</p>
      <p>From conditions of the task, double inequalities follow:
0  a  S3 and 0  b  S3 </p>
      <p>The coordinates of any point in the square S1S3 AS3
correspond to these inequalities.</p>
      <p>Denote this square by a figure F . The points of the figure
F have coordinates corresponding to the values of the stay of
the cybercriminal and the anti-hacker online. A computer
incident can be prevented as long as the difference between
presence of opponents on the network is less than S2 , i.e.

</p>
      <p>From this, we can determine the value S2 when
the implementation and prevention of the RCa are equally
possible, i.e. PCIP  PRCa  0,5 :
x  2  90  x</p>
      <p>The roots of this equation are x1  153,6 and x2  26,4 .
But the value x1  153,6 does not satisfy the condition of the
task, because it exceeds S3  90 . Therefore, if the vulnerability
of the RBS is exploited no longer than S2  26,4 minutes,
then the probability of the incident prevention exceeds the
probability of its realization. In other words, the longer the
vulnerability in BAS (including RBS) remains, the greater the
chance for the theft of money through its use.</p>
      <p>Thus, the RCa assessment methodology proposed by the
authors makes it possible to analyze information security
incidents that happened earlier to determine their relative
frequency, with further forecasting of incident response and
optimization of the response algorithm. Thank to its
implementation in the risk assessment methodologies used by
the cybersecurity units, it is possible to significantly increase
the effectiveness of measures aimed at minimizing the possible
consequences of realization of the RCa.</p>
      <p>IV.</p>
      <p>CONCLUSION
- new challenges and cybersecurity issues, which arise
due to credit and financial institution and their customers
using RBS, require continuous improvement of solutions and
often a substantial revision of the risk-management
procedures, which include the internal control procedures in
cyberspace. It also requires the mastering of measures to
increase cyber-literacy and prevent the uncontrolled
development of cyberspace (for example, financial literacy
and method of “blind” typing with ten fingers);</p>
      <p>
        - implementation of RBS allows credit organizations to
significantly reduce the cost of operating expenses, but the
work of the bank in cyberspace is associated with additional
sources of typical banking risks, which include: operational
and legal risk, strategically and liquidity risk, as well as the risk
of loss of business reputation;
- accounting and evaluation of RCa on a risk-based
approach should imply that each reason for the implementation
of RCa has a potential impact on the bank (associated with
disruption in the continuity of banking activities, reduced
quality of RBS, financial losses, etc.) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Nevertheless, for a
bank the size of the consequences of the destructive nature of
the losses is more important, rather than the reasons for the loss
of money (non-repayment of the loan, hacker attempt on the
security system, etc.).
      </p>
      <p>- the risk divisions of credit and financial organizations
should include specialists who are able to assess cyberrisks,
and the methodological support used to audit and resolve issues
of leveling the possible consequences of realization of the RCa
on the H&amp;S BAS must be updated in a timely manner;
- the scientific research and developments should be one of
the “pillars” of the RCa’s management structure at the RBS.
The models proposed in this paper (assessing the capital
reserved for RCa and the task of meeting a cybercriminal and
an antihacker in the network) are aimed at increasing the
effectiveness of RCa management in the RBS.
[9] A.Savelyev, “Legal aspects of ownership in modified open source
software and its impact on Russian software import substitution policy”.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>M.A. Eskindarov</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          <string-name>
            <surname>Abramova</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          <string-name>
            <surname>Maslennikov</surname>
          </string-name>
          and etc. “
          <article-title>The Directions of FinTech Development in Russia: Expert Opinion of the Financial University”</article-title>
          .
          <source>Mir novoy ekonomiki = World of new economy</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .26794/
          <fpage>2220</fpage>
          -6469-2018-12-2-6- 23 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Yu</surname>
            .
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Zelenkov</surname>
          </string-name>
          , “
          <article-title>Agility of enterprise information systems: a conceptual model, design principles and quantitative measurement”. Biznes-informatika = Business Informatics</article-title>
          , no.
          <volume>2</volume>
          (
          <issue>44</issue>
          ), pp.
          <fpage>30</fpage>
          -
          <lpage>44</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .17323/1998-
          <fpage>0663</fpage>
          .
          <year>2018</year>
          .
          <volume>2</volume>
          .30.44 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.M.</given-names>
            <surname>Kanner</surname>
          </string-name>
          , “
          <article-title>Features of advanced training of specialists in ensuring safety of significant objects of critical information infrastructure”</article-title>
          .
          <source>Bezopasnost' informatsionnykh tekhnologiy = IT Security</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          ,
          <year>2019</year>
          . DOI: http://dx.doi.org/10.26583/bit.
          <year>2019</year>
          .
          <volume>3</volume>
          .02 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Dazhong</given-names>
            <surname>Wu</surname>
          </string-name>
          , Anqi Ren, Wenhui Zhang, Feifei Fan and Janis Terpenny, “
          <article-title>Cybersecurity for digital manufacturing”</article-title>
          .
          <source>Journal of Manufacturing Systems</source>
          , vol.
          <volume>48</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2018</year>
          . DOI: https://doi.org/10.1016/j.jmsy.
          <year>2018</year>
          .
          <volume>03</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Melnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.P.</given-names>
            <surname>Durakovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Dvoryankin</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.S.</given-names>
            <surname>Gorbatov</surname>
          </string-name>
          , “
          <article-title>Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds”</article-title>
          .
          <source>Proceedings - 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)</source>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>160</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1109/FiCloud.
          <year>2017</year>
          .
          <volume>11</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Peterson</surname>
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Ozili</surname>
          </string-name>
          , “
          <article-title>Impact of digital finance on financial inclusion and stability”</article-title>
          .
          <source>Borsa Istanbul Review</source>
          , vol.
          <volume>18</volume>
          ,
          <issue>iss</issue>
          . 4, pp.
          <fpage>329</fpage>
          -
          <lpage>340</lpage>
          ,
          <year>December 2018</year>
          . DOI: https://doi.org/10.1016/j.bir.
          <year>2017</year>
          .
          <volume>12</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.V.</given-names>
            <surname>Revenkov</surname>
          </string-name>
          , “
          <article-title>Internal control in banks: Assessing the risk of cyber attacks”</article-title>
          .
          <source>Finansy i kredit = Finance and Credit</source>
          , vol.
          <volume>25</volume>
          , no.
          <volume>3</volume>
          (
          <issue>783</issue>
          ), pp.
          <fpage>500</fpage>
          -
          <lpage>513</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .24891/fc.24.11.2471 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Berdyugin</surname>
          </string-name>
          , “
          <article-title>Development of algorithm for assessment risk of cyber attacks in electronic banking”</article-title>
          .
          <source>Bezopasnost' informatsionnykh tekhnologiy = IT Security</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>86</fpage>
          -
          <lpage>94</lpage>
          ,
          <year>2019</year>
          . DOI: http://dx.doi.org/10.26583/bit.
          <year>2019</year>
          .
          <volume>2</volume>
          .06 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Computer</given-names>
            <surname>Law</surname>
          </string-name>
          &amp; Security Review, vol.
          <volume>33</volume>
          ,
          <issue>iss</issue>
          . 2, pp.
          <fpage>193</fpage>
          -
          <lpage>210</lpage>
          ,
          <year>April 2017</year>
          . DOI: https://doi.org/10.1016/j.clsr.
          <year>2016</year>
          .
          <volume>11</volume>
          .014.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.B.</given-names>
            <surname>Gisin</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.S.</given-names>
            <surname>Volkova</surname>
          </string-name>
          , “
          <article-title>Internal rate of return of investment projects with fuzzy interactive payments”</article-title>
          .
          <source>Proceedings of 2017 XX IEEE international conference on soft computing and measurements (SCM)</source>
          , pp.
          <fpage>731</fpage>
          -
          <lpage>733</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1109/SCM.
          <year>2017</year>
          .
          <volume>7970705</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.B.</given-names>
            <surname>Slavin</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.B.</given-names>
            <surname>Slavin</surname>
          </string-name>
          , “
          <article-title>Organizing the net-wide public expert evaluation based on collective intelligence technologies”</article-title>
          .
          <source>Management Sciences</source>
          , vol
          <volume>8</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2018</issue>
          , pp.
          <fpage>106</fpage>
          -
          <lpage>114</lpage>
          . DOI:
          <volume>10</volume>
          .26794/
          <fpage>2404</fpage>
          - 022X‑ 2018-8-2-
          <fpage>106</fpage>
          -114 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.I.</given-names>
            <surname>Dolganova</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Deeva</surname>
          </string-name>
          , “
          <article-title>Company readiness for digital transformations: problems and diagnosis”</article-title>
          .
          <source>Biznes-informatika = Business Informatics</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>72</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .17323/1998-
          <fpage>0663</fpage>
          .
          <year>2019</year>
          .
          <volume>2</volume>
          .59.72 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Maslennikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.I.</given-names>
            <surname>Korovin</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.N.</given-names>
            <surname>Afanasyeva</surname>
          </string-name>
          , “
          <article-title>Refinancing as an element of control over inflation”</article-title>
          .
          <source>Entrepreneurship and Sustainability Issues</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>438</fpage>
          -
          <lpage>453</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .9770/jesi.
          <year>2019</year>
          .
          <volume>7</volume>
          .
          <issue>1</issue>
          (
          <issue>31</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Biryukov</surname>
          </string-name>
          , “
          <article-title>How can an IT organization earn its customers' trust: A practical approach”</article-title>
          .
          <source>Biznes-informatika = Business Informatics</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>77</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .17323/1998-
          <fpage>0663</fpage>
          .
          <year>2019</year>
          .
          <volume>3</volume>
          .67.77 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Christina</surname>
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <surname>Sang-Yong Tom</surname>
          </string-name>
          Lee and
          <string-name>
            <surname>Jee-Hae</surname>
            <given-names>Lim</given-names>
          </string-name>
          , “
          <article-title>Information security breaches and IT security investments: Impacts on competitors”</article-title>
          .
          <source>Information &amp; Management</source>
          , vol.
          <volume>56</volume>
          ,
          <issue>iss</issue>
          . 5, pp.
          <fpage>681</fpage>
          -
          <lpage>695</lpage>
          ,
          <year>2019</year>
          . DOI: https://doi.org/10.1016/j.im.
          <year>2018</year>
          .
          <volume>11</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>S.I.</surname>
          </string-name>
          <article-title>Koz'minykh, “Modelling the Provision of Information Security of the Object of the Credit and Financial Sphere”</article-title>
          .
          <source>Finansy: teoriya i praktika = Finance: theory and practice</source>
          , vol.
          <volume>22</volume>
          , no.
          <volume>5</volume>
          (
          <issue>107</issue>
          ), pp.
          <fpage>105</fpage>
          -
          <lpage>121</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .26794/
          <fpage>2587</fpage>
          -5671-2018-22-5-
          <fpage>105</fpage>
          -121 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Konyavskaya</surname>
          </string-name>
          , “
          <article-title>Fundamentals of scientific research for information security specialists: on the approach to the textbook”</article-title>
          .
          <source>Bezopasnost' informatsionnykh tekhnologiy = IT Security</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2018</year>
          . DOI: http://dx.doi.org/10.26583/bit.
          <year>2018</year>
          .
          <volume>3</volume>
          .01 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>A.D. Gvishiani</surname>
            ,
            <given-names>F.S.</given-names>
          </string-name>
          <string-name>
            <surname>Roberts</surname>
            and
            <given-names>I.A.</given-names>
          </string-name>
          <string-name>
            <surname>Sheremet</surname>
          </string-name>
          , “
          <article-title>On the assessment of sustainability of distributed sociotechnical systems to natural disasters”</article-title>
          .
          <source>Russian Journal of Earth Sciences</source>
          , vol.
          <volume>18</volume>
          , no 4, pp.
          <fpage>ES4004</fpage>
          .
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .2205/2018ES000627.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>N.I.</given-names>
            <surname>Kasperskaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Manannikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.N.</given-names>
            <surname>Khairetdinov</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Shcherbakov, “
          <article-title>To the problem of assessing and ensuring the correctness of business processes”</article-title>
          .
          <source>Bezopasnost' informatsionnykh tekhnologiy = IT Security</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2019</year>
          . DOI: http://dx.doi.org/10.26583/bit.
          <year>2019</year>
          .
          <volume>3</volume>
          .01 (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L.</given-names>
          </string-name>
          <article-title>Statistics of Software Vulnerability Detection in Certification Testing</article-title>
          .
          <source>Journal of Physics: Conference Series</source>
          .
          <year>2018</year>
          . V. 1015. P. 042033. DOI :
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          - 6596/1015/4/042033.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Krivoruchko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.E.</given-names>
            <surname>Ponomarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Lopatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.V.</given-names>
            <surname>Mamuta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Emelin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.L.</given-names>
            <surname>Dostov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.R.</given-names>
            <surname>Maklakova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.S.</given-names>
            <surname>Bragina and P.M.</surname>
          </string-name>
          <article-title>Shust. Increasing the availability of payment services through the development of user identification systems</article-title>
          , Moscow: Scientific and
          <string-name>
            <surname>Publishing Center</surname>
          </string-name>
          INFRA-M,
          <volume>157</volume>
          p.,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .12737/monography_5bc4668ec191f5.
          <volume>05741010</volume>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Yun</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Qingxiong Weng and Nan Zhu, “
          <article-title>The relationships between electronic banking adoption and its antecedents: A meta-analytic study of the role of national culture”</article-title>
          .
          <source>International Journal of Information Management</source>
          , vol.
          <volume>40</volume>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>87</lpage>
          ,
          <year>June 2018</year>
          . DOI: https://doi.org/10.1016/j.ijinfomgt.
          <year>2018</year>
          .
          <volume>01</volume>
          .015
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23] Probabilistic Modeling in System Engineering / By ed.
          <source>A. Kostogryzov - London: IntechOpen</source>
          ,
          <year>2018</year>
          . 278 p. DOI:
          <volume>10</volume>
          .5772/intechopen.71396.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>