Cyber security in telecommunication networks and systems

Author(s) Collection number Pages Download abstract Download full text
Пановик У. П. № 1 (68) 122-135 Image Image

The article examines current cybersecurity issues in modern telecommunications networks, emphasizing the need to enhance protection methods due to cyberattacks’ increasing frequency and complexity. It discusses the rise of cybersecurity threats in contemporary telecom networks, stressing the necessity for their study and resolution. A detailed analysis of recent trends and cyberattack statistics is conducted, particularly in Ukraine. It covers primary threats like DDoS attacks, viruses, phishing, and others, along with descriptions of cybercriminal categories and their attack methods.

Contemporary methods of protecting information resources are analyzed, including data encryption and the utilization of complex authentication algorithms. The ad­vantages and disadvantages of various encryption methods, such as AES and RSA, are discussed. Special attention is given to configuring Cisco routers as key components of cybersecurity, detailing setup steps like establishing basic parameters, employing Access Control Lists (ACLs) to restrict access, and using authentication and authorization functions to enhance security. The role of firewalls in cybersecurity systems, their main functions, and their types are examined. The article describes firewall configuration stages, covering security policy configuration, network traffic monitoring, detecting and blocking suspicious activities, and support for security rule updates. Emphasis is placed on vulnerability analysis and timely identification of potential threats.

A conclusion is drawn regarding the necessity of a systematic approach to cybersecurity, incorporating modern technologies, continuous monitoring, user education, and coordination of security measures. The importance of flexible and adaptive security systems capable of responding to new threats is underscored.

Keywords: cybersecurity, telecommunication networks, cyber-attacks, VMDR, Cisco routers, firewalls, encryption, information systems.

doi: 10.32403/1998-6912-2024-1-68-122-135


  • 1. Panovyk, U. P., & Tkachuk, R. L. (2023). Kiberbezpeka cherez pryzmu systemnoho analizu: Komp’iuterni tekhnolohii drukarstva, 1 (49), 197–208. Doi: https://doi.org/10.32403/2411-9210-2023-1-49-197-208 (in Ukrainian).
  • 2. Yakymenko, Yu. M., & Rabchun, D. I. ta inshi. (2023). Tekhnichnyi audyt zakhyshchenosti informatsiino-telekomunikatsiinykh system pidpryiemstv: Kiberbezpeka: osvita, nauka, tekhnika, 4 (20), 45−61. DOI:10.28925/2663-4023.2023.20.4561 (in Ukrainian).
  • 3. Ancu, A.-E., & Barbu, A. (2023). Identification of critical factors for improvinf the security of telecommunication systems. International Conference of Management and Industrial Engineering, 11, 239−246. DOI: 10.56177/11icmie2023.54 (in English).
  • 4. Gnatyuk, S. et al. (2022). The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems. International Workshop on Intelligent Information Technologies & Systems of Information Security. Retrieved from https://ceur-ws.org/Vol-3156/paper29.pdf (in English).
  • 5. Mohan, J. P., Sugunaraj, N., & Ranganathan, P. (2022). Cyber Security Threats for 5G Networks. IEEE International Conference on Electro Information Technology (eIT), Mankato, MN, USA, 446−454. DOI: 10.1109/eIT53891.2022.9813965 (in English).
  • 6. Onyema, Edeh Dinar, & Amina, Elbatoul et al. (2022). Cyber Threats, Attack Strategy, and Ethical Hacking in Telecommunication Systems. In book: Security and Privacy in Cyberspace (pp. 25−45) Publisher : Springer, DOI: 10.1007/978-981-19-1960-2_2 (in English).
  • 7. SANS Vulnerability Management Survey. SANS Institute. Retrieved from https://www.sans.org/white-papers/38900/ (data zvernennia 04.04.2024) (in English).
  • 8. Sova, O. (2022). Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system: Technology Audit and Production Reserves, 4 (2 (66)), 25–28. doi: http://doi.org/10.15587/2706-5448.2022.261874 (in English).
  • 9. Toapanta, S. M., & Mafla Gallegos, L. E. et al. (2020). Analysis of Models of Security to Miti­gate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications. 3rd International Conference on Information and Computer Technologies (ICICT), San Jose, CA, USA, 445−450. DOI: 10.1109/ICICT50521.2020.00077 (in English).
  • 10. Yifeng, He, Nan, Ye, & Rui, Zhang. Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security. Wireless Communications and Mobile Computing. Article ID 2295130, 19 pages. DOI: https://doi.org/10.1155/2021/2295130 (in English).