scholarly journals Security issues of state information resources in crisis situations

2013 ◽  
Vol 2 (1) ◽  
pp. 95-98
Author(s):  
Davud Rustamov ◽  
Myrza Rzaev
2016 ◽  
Vol 29 (1) ◽  
Author(s):  
О. К. Юдін ◽  
В. Ю Іваннікова ◽  
С. Ю. Гирич

2021 ◽  
pp. 114-122
Author(s):  
S. GRIBOIEDOV

The main principles of state strategic planning in the sphere of cybersecurity are considered. The directions of improvement of public administration in the field of cyber protection of a critical information infrastructure and state information resources are identified. The shortcomings of the Cyber Security Strategy of Ukraine in 2016 are analyzed and summarized. The draft of Cyber Security Strategy of Ukraine for 2021 – 2025 is considered and directions for its improvement are proposed. The prospects of strategic state planning in the sphere of cybersecurity in the context of the spread of hybrid threats are outlined.


Author(s):  
Bohdan Nikolaienko ◽  
Serhii Vasylenko

With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.


2017 ◽  
Vol 36 (4) ◽  
Author(s):  
О.К. Юдін ◽  
Я.А. Симониченко ◽  
А.А. Симониченко

Author(s):  
Сергій Олександрович Гнатюк ◽  
Василь Миколайович Кінзерявий ◽  
Андрій Олександрович Охріменко

Author(s):  
Олександр Костянтинович Юдін ◽  
Сергій Степанович Бучик

Author(s):  
Stanislav Petrov

The article deals with international practices of counteracting the unlawful interference with the state digital information resources. Conclusions are formulated on applying international practices for the development of cyber defense and cyber security systems in Ukraine, improvement of law enforcement agencies powers in investigating cases of the unlawful interference with the state digital information resources. Key words: information, resources, state information resources, state digital information resources.


Sign in / Sign up

Export Citation Format

Share Document