Information Security of the Person, Society and State最新文献

筛选
英文 中文
INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE 信息恐怖主义是当代对人类、社会和国家信息安全的威胁
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-1
Julia Andrusyshyn, Valeria Barannik
{"title":"INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE","authors":"Julia Andrusyshyn, Valeria Barannik","doi":"10.51369/2707-7276-2021-(1-3)-1","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-1","url":null,"abstract":"The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters).\u0000The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware.\u0000It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of inf","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Informational Dimension of Ukrainian National Security Policy in the Conditions of Modern Geopolitic Competition 现代地缘政治竞争条件下乌克兰国家安全政策的信息维度
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-10
V. Kozma
{"title":"Informational Dimension of Ukrainian National Security Policy in the Conditions of Modern Geopolitic Competition","authors":"V. Kozma","doi":"10.51369/2707-7276-2021-(1-3)-10","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-10","url":null,"abstract":"The problem of maintaining security has been relevant throughout world history. This task is relevant today. Ensuring Ukraine’s national security is a complex and multidimensional process. The complexity of this task increases when considering it in the new geopolitical environment. In the modern world, contradictions of a geopolitical nature are growing, and competition between countries is intensifying. These processes take place against the background of the humanity entering a new phase of its development associated with the formation of the information society. Issues of formation and development of the global information society are in the focus of world politics. In its turn, the information space is closely connected with world geopolitical processes, as the struggle of geopolitical actors to achieve information superiority is becoming the main direction of modern geopolitical competition.\u0000The information factor is playing an increasingly important role in the political upheavals and conflicts that are emerging in different parts of the world. Crises in modern society are diverse and can affect everyone without exception. Crises such as political and military, economic and financial, social and ethical, ecological and energy, etc. occur most often and are well studied. The entry of modern society into the information phase of its development has created the conditions for the emergence of social crises associated with the information sphere of human life. The information spheres of society and the state are closely interconnected. The process of their interaction and merging goes on intensively. Today we can observe a pronounced manifestation of information and political crises both in the domestic life of individual states and in the world political arena as a whole.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International-Legal Approaches and National-Legal Regulation of Counteraction to Misinformation 反虚假信息的国际法律途径与国家法律规制
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-7
A. Marushchak
{"title":"International-Legal Approaches and National-Legal Regulation of Counteraction to Misinformation","authors":"A. Marushchak","doi":"10.51369/2707-7276-2021-(1-3)-7","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-7","url":null,"abstract":"The article analyzes some aspects pertaining to the issues of counteraction to misinformation. The subject of the study encompasses the relations arising in the field of international-legal and national-legal regulation of this activity. In March 2021, the Center for Counteracting Disinformation was established in Ukraine. Its development under the influence of threats to the state’s information security requires a detailed analysis of theoretical and legal foundations of countering disinformation, taking into account the fundamental principles of freedom of thought and speech. \u0000The aim of the article is to reveal international legal approaches and national legal regulation of countering disinformation. \u0000Theoretical methods of analysis, synthesis and comparison were used in the process of research. In particular, the work provided an analysis of international law, as well as the European Union initiatives aimed at combating misinformation. The comparative-legal method was used in conducting a comparative study of international and Ukrainian legislation. The article presents the outcomes of the analysis of the empirical basis of the study, namely: international law and domestic regulations of Ukraine, research works, etc. \u0000The methodological approach to the study of international legal issues and national legal regulation of countering disinformation is based on the fundamental principles of freedom of thought and speech and their mandatory consideration in the development of a new legislation. \u0000The research reveals the presence of several groups of government experts within the UN system who focused on studying the issues related to cyber operations, the use of ICT that contradicts the norms of a responsible behavior of states. They proved that the issue of countering misinformation had not yet been resolved. On the basis of the Tallinn Handbook 2.0 analysis, the author concluded that the interference in the spheres of elections, health care system and other areas pertaining to state sovereignty through disinformation operations could be interpreted as contrary to the international law provisions.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directions and Prospects of Interaction of the Security Service of Ukraine With the ember-Countries of the Guam Organization in the Sphere of Ensuring Cyber Security and Countering Cyber Threats 乌克兰安全部门与关岛组织成员国在确保网络安全和打击网络威胁领域互动的方向和前景
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-6
Larisa Komarova, O. Tkachenko
{"title":"Directions and Prospects of Interaction of the Security Service of Ukraine With the ember-Countries of the Guam Organization in the Sphere of Ensuring Cyber Security \u0000and Countering Cyber Threats","authors":"Larisa Komarova, O. Tkachenko","doi":"10.51369/2707-7276-2021-(1-3)-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-6","url":null,"abstract":"Analysis of cyberattacks on the critical information infrastructure of Ukraine, and the fact of its increased complexity and more sophisticated relevant tools show the engagement of unfriendly countries, especially such as the Russian Federation, in destructive activities in Ukrainian cyberspace: in fact, Ukraine has become a testing ground for new cyber weapons and malicious strategies.\u0000Considering the cross-border nature of modern cyber threats and the priority of the Euro-Atlantic course of our country, an important vector of the activities of the Security Service of Ukraine has been to establish effective cooperation with international partners in combating cyber terrorism and hybrid aggression in cyberspace.\u0000Having this in mind the Security Service of Ukraine has established and maintained a high level of cooperation with intelligence services and law enforcement agencies in Europe, Asia and North America, as well as with key international organizations such as NATO, the OSCE, the Council of Europe, the UNO, the GUAM and others.\u0000At the same time, the Security Service of Ukraine has recently taken a proactive role as an initiator of innovations in the field of regional and international cybersecurity in relevant organizations.\u0000The issues of international cooperation of the Security Service of Ukraine in the field of cybersecurity within the framework of international and regional organizations were examined by such Ukrainian experts as V. Petrov, V. Khlevytsky, S. Bondarenko, O. Klimchuk, S. Petrov, N. Tkachuk, D. Melnyk and others.\u0000At the same time, these works, according to the authors’ opinion, do not reveal the features of international cooperation between the Security Service of Ukraine and the relevant special and law enforcement agencies of the Organization for Democracy and Economic Development GUAM in the field of cybersecurity and countering cyber threats.\u0000Given that Ukraine has recently been the object of cyberattacks, the sources of which originate from the Russian Federation, the establishment of the GUAM Regional Cybersecurity Center in Ukraine will help to strengthen the cyber security capacity of GUAM member countries.\u0000Moreover, the operation of this centre in our country, taking into account existing strong international contacts of Ukraine with NATO, EU, Council of Europe, OSCE, will help to create additional mechanisms for GUAM member states to exchange best world practices in cybersecurity as well as combating cybercrime, to increase the level of expertise of GUAM member states’ experts in these fields and to help improve the Organization’s image on the international arena.\u0000In this regard the Security Service of Ukraine should support the possible deployment of the technological component of the Center on the basis of the GUAM Secretariat in Ukraine, with the purpose of establishing the educational processes, information exchange, as well as remote access of relevant state bodies of GUAM member states. The provision of cor","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Special Knowledge in the Field of Forensic Computer-Technical Expert xamination in the Pre-Trial Investigation of Crimes Against the Foundations of National Security 在危害国家安全基础犯罪的审前侦查中运用法医计算机技术专家鉴定领域的专业知识
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-13
Iryna Ноra
{"title":"Use of Special Knowledge in the Field of Forensic Computer-Technical Expert xamination in the Pre-Trial Investigation of Crimes Against the Foundations of National Security","authors":"Iryna Ноra","doi":"10.51369/2707-7276-2021-(1-3)-13","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-13","url":null,"abstract":"In modern legal proceedings, the use of various forms of forensic expert exami-nation is important. The article analyzes the current state of forensic computer-technical expert examination and the cur-rent forensic expert practice in this area, considers the issue of the need for spe-cial knowledge to conduct this type of examinations. It is substantiated that fo-rensic computer-technical expert exami-nation is an independent type of forensic expert examination and belongs to the class of engineering and technical exam-ination. The definitions of the object, the subject of computer-technical examina-tion are presented, typical tasks are for-mulated. The issues, faced by the experts when assigning forensic computer-technical examinations for the study of new computer objects are considered. Determination of the expert’s assignment and the formulation of questions are considered as an important stage in the planning of an examination, on which the correct choice of research methodol-ogy depends. With the development of information technologies, investigators are interested in new objects for which it is necessary to prepare individual meth-odological recommendations, manuals for determining the sequence of conduct-ing various types of examinations. It has been substantiated that the conclusions of forensic experts on computer-technical examination are of great evi-dentiary value. They make it possible to: decipher the encoded information; find information that was considered missing, lost or destroyed; restore the mecha¬nism of a criminal event based on information traces.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability of the Russian Expansionist Ideology: a Global Comparative Dimension 俄罗斯扩张主义意识形态的稳定性:一个全球比较维度
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-5
O. Ivanov
{"title":"Stability of the Russian Expansionist Ideology: a Global Comparative Dimension","authors":"O. Ivanov","doi":"10.51369/2707-7276-2021-(1-3)-5","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-5","url":null,"abstract":"The article analyzes the factors that led to the fall of colonial regimes in the world leading countries of the world in different historical periods and in this context clarifies the reasons for the preservation of aggressive features pertaining to the current foreign policy of the Russian Federation. \u0000The aim of the article is to identify the reasons for the stability of the Russian expansionist ideology by means of historical and comparative analyses. The dynamic development of the system of international relations at different stages of historical development has proved the inviability of large colonial empires and the incompliance of expansionist means of implementing the geopolitical course of a state to the values of a civilized world. However, the Russian Federation continues to resort to them more actively, getting successfully adapted to emerging world realities and doing harm at the same time to the national interests of a number of independent states, including Ukraine. \u0000On analyzing the processes of the fall of colonial empires in England, Spain and Portugal, France and Japan, as well as the decline of expansion provide by the United States, the research proves that the occurrence of these events was caused by objective factors of development of a number of states and their inconsistency at the same time with the tendencies of further democratic and economic development. It has as well been proved by the author that all the tendencies of economic or political modernization, which are favorable for all other countries of the world, do not agree with the guarantees of an unhindered development provided by the Russian Federation nowadays. \u0000Particular attention has been paid to the historical origins of the “Russian world (“Russkii mir”)” ideology, its relationship with the ancient Roman concept of “Pax Romana”. There are some additional arguments presented in the research that prove the artificiality of the basic postulates of state Russia’s ideology.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction 当前在信息领域对乌克兰国家安全的威胁:识别和应对问题
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-2
D. Melnyk
{"title":"Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction","authors":"D. Melnyk","doi":"10.51369/2707-7276-2021-(1-3)-2","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-2","url":null,"abstract":"The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in other vitally important spheres. Therefore, their content and forms of manifestation should be borne on mind to effectively counteract their emergence and localization. \u0000Under current conditions, the information security of Ukraine directly depends on the high-quality management of the system of countering threats to the national security in the information sphere and effective protection of national interests under the guidance of authorized entities.\u0000One of the state’s primary tasks for today is the creation and development of a stably functioning mechanism to ensure the national security of Ukraine in the field of information for the counteraction to existing threats and prevention of potential ones. \u0000The efficiency of such a counteraction depends on the authorized bodies’ capabilities to timely and accurately detect the threats to the national security in the field of information, recognize and point out their sources, influence them in order to prevent offensive and harmful consequences.\u0000The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in ot","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Countering Informational Influences of the Russian Federation: National Experience 抵制俄罗斯联邦的信息影响:国家经验
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-4
Vitaly Khodanovych
{"title":"Countering Informational Influences of the Russian Federation: National Experience","authors":"Vitaly Khodanovych","doi":"10.51369/2707-7276-2021-(1-3)-4","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-4","url":null,"abstract":"The urgency of the chosen issue is due to the fact that since the beginning of the hybrid aggression in 2014, the domestic information space has been subject to various interventions from Russia: from biased Russian media coverage of events in Ukraine to outright lies from the Russian authorities. At the same time, such attention to our state by Russia has led to the formation in Ukrainian society of a certain level of resistance to hostile information influences and the acquisition by domestic state and public institutions, as well as scientific circles of unique experience in countering Russia in this area. The methods of counteraction developed so far are quite diverse in nature, and therefore require critical evaluation in order to improve the foundations of information security of both Ukraine and the world democratic community.\u0000The purpose of this article is to assess the state of information security of the nation and to determine further directions for its improvement on the basis of a retrospective analysis of the process of counteracting Russian information influences on Ukrainian society and the state.\u0000Reflective approach was chosen as the main one to study the national experience of counteracting the information influences of the Russian Federation, as it provides an opportunity to comprehend Ukraine's experience as a purposeful and organized process of strengthening the resilience of domestic state and public institutions to clearly planned multilevel aggression and creation of the foundations for the development of own information space.\u0000A comparison of main information operations of the Russian Federation targeting Ukraine, of the described in the article stages of Russian aggression with the measures taken by the Ukrainian state and society gives an opportunity to allege that the crisis stage in the information struggle and the formation of domestic sovereign information space as a phenomenon is over. So, if at the early stages of information aggression the Kremlin relied on the attractiveness of its civilizational concepts, such as \"Russian World\" or \"Moscow - Third Rome\", which should have led to Russia's victory by \"soft power\", today we observe the change of course towards cluster influences, tendencies (problems in the Ukrainian energy sector, \"anti-vaccination\" campaigns, etc.) aimed at destabilizing the domestic political situation in the country and bringing discord in relations with foreign partners. Currently, the information campaigns of the Russian Federation from an individual phenomenon (operational line of hybrid war) have been transformed into secondary (service) tool of other areas of aggression: military, economic, etc.\u0000Under the difficult conditions of multifaceted opposition to the aggressor, Ukraine managed to create a basis for the development of its own information space and its protection from unfriendly influences not only of Russia but also of other potentially interested geopolitical actors. At the same ","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security of Ukraine in the Context of National Security 国家安全背景下的乌克兰信息安全
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-9
Sergiy Knyazev
{"title":"Information Security of Ukraine in the Context \u0000of National Security","authors":"Sergiy Knyazev","doi":"10.51369/2707-7276-2021-(1-3)-9","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-9","url":null,"abstract":"The article considers issues related to the study of modern views and features of the regulatory framework of information security of Ukraine in the context of information security.\u0000It is noted that the current actions of the Russian Federation aimed at violating the territorial integrity, destabilization of the situation in Ukraine, which are implemented, including due to the destructive information impact have become a serious challenge for our state.\u0000According to the results of the analysis, it is determined that the security of any country comprehensively embodies all important areas of life and development of man, society and the state. Its components are informational, intellectual, political, military, economic, environmental and other factors. The place and role, as well as the priority of each of them are determined by the circumstances that actually develop over a period of time within and around the state.\u0000It is proposed to improve the legal and institutional arrangements for the management of State security by:\u0000– further development of national security legislation;\u0000– development and implementation of national standards and technical regulations for the use of information and communication technologies, harmonized with relevant European standards;\u0000– introduction of a nationwide system for determining and monitoring the level of protection of national interests in various spheres of life and taking into account real and potential threats to the information security of the state;\u0000– intellectual and personnel and resource support;\u0000– bringing legislation on the protection of various types of information with limited access to European standards, etc.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Analysis of Crimes in the Sphere of Information Technologies 信息技术领域犯罪的法医分析
Information Security of the Person, Society and State Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-14
Valery Kolesnyk
{"title":"Forensic Analysis of Crimes in the Sphere of Information Technologies","authors":"Valery Kolesnyk","doi":"10.51369/2707-7276-2021-(1-3)-14","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-14","url":null,"abstract":"The article deals with the issues of foren-sic support for preventing commission of crimes in the field of information tech-nology. It is called to attention that alt-hough introduction of modern infor-mation processes in various spheres of government activities, production and public relations has brought positive re-sults, it has also led to an increase in the cases of committing cyber crimes. Cyber crimes are a new phenomenon in general crime, therefore, the development of ad-vanced techniques to combat them is re-quired. In this process, the forensic sci-ence plays an important role, first of all, for the preparation of recommendations on methods for investigating cyber crimes. Forensic analysis of information technology crimes which are called cyber crimes indicates that their investigation is different from the investigation of other crimes. This is largely due to the fact that computer objects can be both means of committing such crimes and objects of criminal encroachment. Information stored on computer media can be per-ceived and evaluated solely by using computer equipment and digital technol-ogy. Without this, it is impossible to iden-tify persons involved in committing a crime and obtain the evidence necessary to solve the crime. To study and evaluate them as sources of evidence, one needs to resort to the help of specialists, com-puter equipment and sophisticated soft-ware. It distinguishes computer objects from other material objects that is why it is necessary to put computer objects into a separate category of sources of evi-dence in forensic science and criminal procedure.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信