scholarly journals INFORMATION SECURITY IN THE GLOBAL POLITICAL AND ECONOMIC SPACE: MECHANISMS OF MANIPULATIVE INFLUENCE AND SYSTEMS OF COGNITIVE PROTECTION

Author(s):  
S. Kristinevich

The implementation technologies of power inequalities are actively used by governments of countries that position themselves as guarantors of world order, international clubs and organizations, within the framework of integration associations. Because of this, the practical side of the question is the need to develop “response reactions” and protection mechanisms built into the national security system. The article deals with the existing technology information and psychological impact and justified tactic to delegitimize information influence.

2020 ◽  
Vol 7 (3) ◽  
pp. 141-148
Author(s):  
Odiljon Turayev ◽  

This article describes the information-psychological security system as a subsystem of national security, and provides a terminological and retrospective analysis of sociological approaches to this concept. In addition, approaches to the concept of information and psychological security are reflected in scientific views as the vital interests of theindividual, society and the state, as information, as the human psyche, as ideology and ideas. The term "information and psychological security" is interpreted as the need to ensure the vital interests of the individual, society and social groups.The article pays special attention to methods of information and psychological impact on social processes and their negative and positive characteristics.


Author(s):  
Vladimir Chalapko

The article substantiates that the information impact carried out using the technologies of control and manipulation of public consciousness causes dysfunctional processes that impede the optimal functioning of state institutions. The main object of protection in this case is the public consciousness. It is noted that the specifics of information security allows it to cover all types of security: economic, socio-political, military and environmental, therefore its provision is a priority in the process of solving national security problems. The conditions for ensuring the main types of state security depend on ensuring information security at the present stage of development of society.


Author(s):  
Larysa Gromozdova ◽  
Inna Stenicheva

Purpose of the article: to determine the essence of different elements ofsocio-economic space of the region. Construction of the structure and isolationof individual elements of socio-economic space as a multi-vector formation.This article highlights the essence and different approaches to defining theconcepts, structure and mechanisms of formation of economic and social spacesof the region, innovation space as a basic element of socio-economic space.Research Methods: The methodological basis of the research is the fundamentalprinciples of economic theory, regional economy, scientific views and approachesof foreign and domestic scientists. To achieve the purpose of the study, themethods used at the empirical and theoretical levels were used: axiomatic,abstract, system-structural analysis, analogies and comparisons, graphoanalytic,by which the characterization of the nature of the concepts of space, socioeconomic space, as well as innovation space region. Their general properties,structure and functions are described.The criteria of optimality and balancesof interests in the formation of different types of space in the region areconsidered. The classification of the regional space is proposed, and the networkconnections of the innovation space according to components and elements arerevealed, which allows to study deeply the social, economic and other problemsof development of the region.Scientific novelty: the classification of regionalspace by separate constituent elements is proposed. The concept of “innovationspace” was introduced into scientific circulation, the scheme of networkconnections of the innovation space with other elements of the regional socioeconomic space was developed. Conclusions and Prospects for Further Research:In today’s context, it is possible to significantly improve the economic stateof development of Ukrainian regions by using a scientifically sound andcomprehensive approach to defining and studying the concepts of socioeconomic and innovative space.In the further study it is necessary to considerin detail the mechanism of organizational activity of innovation space in theregion. It is very important to pay attention to information support for theformation of the innovation space, the creation of a regional legal field ofinnovation space, mechanisms for coordinating regional innovation activitieswithin the innovation space, as well as the influence of internal and externalfactors on the formation and development of the innovation space.


Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed. The tendencies in the legal regulation of information security that took place at the initial stage of the formation of information legislation are revealed. Based on the factors that took place before the adoption of the Doctrine of information security of Ukraine, the laws of Ukraine “On the basic principles of ensuring the cybersecurity of Ukraine”, “On the national security of Ukraine”, in the context of the current legislation, based on the methodology of legal forecasting, it is concluded that in the future the development of normative legal information security will be developed on the basis of by-laws, mainly at the departmental level.


2018 ◽  
Vol 28 (6) ◽  
pp. 1849-1854
Author(s):  
Marin Petkov

The rapid development of science and technology has led to the emergence of a crisis in society. Science "pushes" religion, but does not offer a new moral code in its place. The definitions of "security" are almost as many and as controversial as postmodernism. For the purposes of this study, however, it will be sufficient to define security as "the functional state of a system that provides for the neutralization and counteraction of external and internal factors affecting or potentially damaging the system." This scientific article presents a study, which seeks to answer the question why the paradigm "security" is so important in the postmodern society, what are the roots of its influence and meaning, and to seek conclusions and guidelines for its increase.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Sign in / Sign up

Export Citation Format

Share Document