scholarly journals ISSUES OF DETERMINING THE CONTEXT OF RESTRICTED INFORMATION SECURITY

10.23856/4621 ◽  
2021 ◽  
Vol 46 (3) ◽  
pp. 160-168
Author(s):  
Dmytro Kots ◽  
Maksym Kudrytskyi ◽  
Valentyna Dolia

The article analyzes the problematic issues of determining the content of the concept of protection of restricted information, in particular, the authors analyze the existing terminology used by the legislation of Ukraine on the protection of restricted information. The authors of the article, based on existing legislation regulating such information storage measures as information protection, technical protection of information, cryptographic protection of information, cyber protection, using the deductive method of research derived the definition of “protection of restricted information”. In addition, using various scientific research methods, the authors of the article highlight the issues of legal uncertainty and contradictions in the concepts of some types of restricted information protection, which are found in the guidance documents on the subject of research. Also, in the article: the properties of information are derived and the types of operations with information are determined. This took into account the understanding of the concept of “restricted information”, which was defined by one of the authors in his previous work; the idea of the content of protection of restricted information is summarized, and also each of properties of the information which make the content of its protection is investigated.

Author(s):  
Liliia Syrota

The purpose of the article is to compare worldview, philosophical and scientific approaches to the definition of the concepts of celebration and event.  To suggest your own definition of the event. Methodology. The author uses general scientific research methods (analysis, synthesis, systematization, comparison, opposition, description, specification). The article also based on semantic, functional research methods. The scientific novelty. The concept of “down” is the closest in meaning to the event In the socio-cultural context, since it has the organizational aspect (the stage of preparation, conduct) that dominates the event. Conclusions. An event is a set of steps/actions aimed at creating family, corporate or official mass meetings. It has always been aimed at the development and implementation of a service.


Author(s):  
Turhut Salayev

The article deals with scientific and theoretical understanding and the provision of the definition of the category "actors of administrative and legal support of information security in the customs area". The author has disclosed and analyzed the provisions of the administrative and legal doctrine of the above questio, besides, the problematic issues of the definition of "subjects of administrative and legal support of information security in the customs sphere" are identified, andthe necessity of distinguishing this concept from other related concepts and categories is defined. Disclosing issues of actors of administrative and legal support of information security in the cus-toms sphere, it is necessary to avoid substitution of concepts and clearly understand the difference between the concepts of "institutional mechanism of administrative and legal support of information security in customs" and "state mechanism of administrative and legal support of information security in the customs sphere "from the concept of" subjects of administrative and legal support of information security in the customs sphere ". After all, the concept that is the subject of our study, of all the above, has the most comprehensive and broad scope and meaning. That is why, disclosing a set of subjects of administrative and legal support of information security in the customs sphere, it is advisable to apply a broad approach to understanding this category, given that among such subjects must be considered non-state subjects. objects - local governments, public organizations, etc. Because without their activities such a list will not be complete, and the mechanism of administrative and legal support of information security in the customs sphere will not be such that covers all possible spheres of public life and methods of information security. The current general information and administrative legislation, as well as special legislation gov-erning the procedure of customs, is considered in order to more clearly disclose the features and legal status of the actors of administrative and legal support of information security in the customs area. Each of these entities plays an appropriate role and occupies the necessary place in the system of national security of Ukraine, information security of Ukraine in general and information security in the customs area in particular. This role can be described as the implementation of general control over information security in the customs area, as well as taking measures to respond to violations of information legislation and the emergence of threats to information in the customs area within the powers defined by law. At the same time, the administrative and legal provision of information security is carried out directly by the customs authorities.


Author(s):  
N. Sergiienko

The scientific article is devoted to analyze the intersectional relations between executive law of Ukraine and civil law of Ukraine. The classification of forms of intersectional relations, offered by M.Yu Chelyshev, was taken as the ground of theoretical and methodological base of scientific research the intersectional relations between executive law of Ukraine and civil law of Ukraine. Even though this scientist-lawyer researched the intersectional relations of civil law, grounding on the subject of his scientific researches, his classification is stated as universal and grounded enough and can be used for different legal researches. In the scientific article the intersectional relations between executive law of and civil law of Ukraine are discovered though direction as follows: 1) intersectional interaction between executive law of Ukraine and civil law of Ukraine (it represents by using in executive law definitions and constructions of civil law. As an example of definitions and constructions of civil law, that are used in executive law, can be stated the definition of agreement); 2) intersectional influence between executive law and civil law (it represents by mutual influence of compositions of executive law and civil law, especially norms and institutions. The bright example of that mutual influence is the legal status of some kinds of property on the context of forfeiture the property – some kinds of property are out of forfeiture in the executive process, despite that property are out of turnover restrictions); 4) intersectional legal and collision regulation (it represents by direct and indirect mutual renvois between civil legislation and executive legislation. As an example can be used the direct renvoi to art. 28 of The Civil Code of Ukraine from subpar. 5 par. 2 sec. III of The Instruction of Compulsory Execution Organization, approved by The Ministry of Justice of Ukraine from 02.04.2012 under № 512/5).


2021 ◽  
Vol 10 (37) ◽  
pp. 86-92
Author(s):  
Vitalii Makarchuk

The purpose of the article is to examine the role of the National Police of Ukraine in ensuring the information security of Ukraine. The subject of the study: The subject of the study is the competence of the National Police of Ukraine in ensuring the information security of Ukraine. Methodology: Dialectical method, epistemological method, analytical method, formal and legal method, normative and dogmatic method, the methods of legal modeling and forecasting were used in the research. The results of the study: The definition of “information security” and “cyber security” is provided. The main factors that negatively affect the information space in Ukraine, as well as current threats to Ukraine’s national security in the information sphere are identified. Practical implications: It is established that the number of crimes in the information sphere is growing every year. In this regard, the task of the National Police is to combat crimes and other offenses in this area, as well as to protect relevant rights and freedoms of citizens, society and the State. Value/originality: The tasks and powers in the area of information security protection of the National Police in general and the Department of Cyber Security, in particular, are defined.


2019 ◽  
Vol 16 (2) ◽  
pp. 281-293 ◽  
Author(s):  
João Antonio Aparecido Cardoso ◽  
Felipe Takeshi Ishizu ◽  
Jeferson Tadeu De Lima ◽  
Jefferson De Souza Pinto

Goal: The present work aims to present how the use of a blockchain two-factor authentication solution 2FA on a page developed on WordPress can contribute to the information security regarding user authentication. Design/Methodology/Approach: The research method employed is characterized as an exploratory research, since all the analysis is based on the theoretical reference data available on the subject. A field research was carried out in relation to the implementation of the multi-factor authentication plugin Hydro Raindrop MFA, which uses blockchain technology offered by The Hydrogen Technology Corporation and the Project Hydro platform over the Ethereum network. Thus, this paper sought to present and conceptualize some of the technologies used, pointing out their contribution to information security. Results: The main results showed that the use of decentralized technology, such as blockchain and the Hydro Raindrop Plugin, can contribute considerably in the process of user authentication, which may strengthen the safeguard of the information and assets of individuals and organizations by inhibiting or reducing the possibility of successful a hacker attack. This solution is at the forefront of innovation with regard to data security because it uses advanced blockchain technology. It might contribute in a satisfactory way to the preservation of critical data and information that are the core value of many organizations of the industry 4.0. Limitations of the investigation: This research was limited to analyzing how the implementation of the Hydro Raindrop multi-factor authentication solution on a WordPress page can be beneficial to ensure information security. Practical implications: This study’s findings can contribute to entities interested in cybersecurity. As a suggestion for future works, analyses of plugins or similar solutions available on the market in distinct types of websites, or performance comparisons between them, may be relevant to contribute to scientific research. Originality/Value: This work can contribute in an innovative way to scientific research, since it addresses a recently created solution that uses blockchain technology as its basis for a safer method of authentication.


2020 ◽  
Vol 19 (1) ◽  
pp. 21-21
Author(s):  
V. Zhuravel

The genesis and current condition of scientific approaches to defining methods in criminalistics are considered. It is noted that, despite the significant importance for the formation of the methodology of criminalistics science, no separate doctrine of its methods has been created yet. Conversely, scientists offer different definitions and classification constructions of methods of this science. There is not always a justifiable division of criminalistics methods into research methods and methods of practical activity. It is emphasized that the introduction of a single, unified, consistent classification of methods in criminalistics science is a prerequisite for the further effective scientific research in this area of knowledge and the solution of praxeological tasks in the activity of judicial investigative bodies, expert institutions, operational units. Finding out established approaches to the classification of methods in science of criminalistics will contribute to the final formation of the modern scientific criminalistics paradigm. In view of the results of the analysis of scientific approaches, it is proposed to divide the methods in forensics into two varieties, using the following terms: 1) methods of criminalistics that means methods of studying the subject of research of this field of knowledge, carrying out scientific research; 2) criminalistics methods, that is, the optimal methods of action of authorized subjects that are the result of the conducted research and recommended for practical use. Methods of criminalistics should be grouped into the following levels: philosophical, general scientific (methods of empirical research, methods of theoretical research, general logical methods), separate scientific (special) (borrowed, transformed, especially criminalistics). In turn, forensic methods can be divided into: methods of collecting, recording and investigating evidence; methods of using forensic and special techniques; methods of conducting individual investigative (search) actions; methods of designing and testing investigators, court, expert versions and construction of forecasting models, etc. The above points out that in the forensic scientific knowledge there is a complex, dynamic, subordinated system of numerous methods of different levels, spheres of action, directions, which are realized taking into account specific conditions and subject of research. At the same time, this system is open and constantly updated with new methods as a result of their development and renewing.


2021 ◽  
Vol 4 (1) ◽  
pp. 134-142
Author(s):  
Nina V. Skrynnikova ◽  

This article gives the concept of anxiety and disturbance as an object of research in various psychological scientific schools, as well as the characteristics of personal anxiety in early adolescence, which are directly related to the social situation of development and the leading activity of this age period. It also highlights the main caus-es of personal anxiety in early adolescence. The object of the research is anxiety and disturbance. The subject is personal anxiety in early adolescence. The aim of the study is to identify and characterize the features of personal anxiety in early adolescence. The following research methods were used: theoretical analysis of literature and sources, hypothetical-deductive method, modeling method. The results obtained are the basis for further empirical and practical work in this area.


Author(s):  
Douglas Schenck ◽  
Peter Wilson

The central theme of this book is the representation of information in a formal and precise manner. We therefore have to try and describe what information is before we can go on and talk about its representation. Also, we need to indicate why we want to utilize a formal means of representation. We are all experts in the subject of information — we use it every day. Unfortunately, information is an intangible and it is difficult to talk about intangibles; most of the time we do not even think about such matters but rest comfortably with an intuitive feel for such things. Good question! According to Webster’s, information is, among other things, 1: The communication of or reception of knowledge or intelligence 2a: Knowledge obtained from investigation, study or instruction 2b: The attribute inherent in and communicated by one or two or more alternating sequences or arrangements of something (as nucleotides in DNA or binary digits in a computer program) that produces specific effects 2c: A signal or character (as in a communication system or computer) representing data. From the same source, we learn that data is Factual information (as measurements or statistics) used as a basis for reasoning, discussion, or calculation. The salient words that we are concerned with are knowledge, communication and data. In general we are concerned about information in the real world. To make matters more precise, we introduce our own definition of information. Definition 1 Information is knowledge of ideas, facts and/or processes. Information can be communicated, that is it may be transferred between two or more partners. (Strictly speaking, as the producer and user of information may be one and the same, only a single ‘partner’ may be involved.) This may be done in real time or there may be a delay between one partner sending the information and another receiving it. For example, the authors wrote this document long before anyone else read it. Consequently, information storage is just a special case of communication. The ultimate goal in information modeling is to formulate descriptions of real world information so that it may be processed and communicated efficiently without any knowledge of its source and without making any assumptions.


2020 ◽  
Vol 3 (3) ◽  
pp. 84-97
Author(s):  
Nina V. Skrynnikova ◽  
◽  
Vladlen K. Ignatovich ◽  

The article gives the concept of younger adolescence, its age-related psychological characteristics, as well as socio-psychological adaptation. The main tasks of development of younger adolescents of a given age period, determined by the environ-ment of social development and the genesis of ideas about the socio-psychological adaptation of this age, are considered. The object of the study was the younger adolescence. The subject is the process of socio-psychological adaptation in early adolescence. The aim of the study was to identify the age-related characteristics of socio-psychological adaptation during this period. The objective of the study was to analyze the theoretical literature and sources in the field of psychological characteristics of adolescence and socio-psychological adaptation. The following research methods were used: theoretical analysis of literature, hypothet-ical-deductive method, modeling method. The results obtained are the basis for further work in this area.


Author(s):  
Lilia Kulykova ◽  

The subject of the research is the study of scientific researches of personalities, biographies and creative way of outstanding domestic scientists, scholars of Byzantium in the second half of the 19th – first half of the 20th century, who be-came the founders of Byzantine studies. Research methods. A system of theoretical and empirical research methods was used to study the specific purpose of scientific research and solving problems, namely: historical and pedagogical analysis and syn-thesis, definition of the purpose, subject and tasks, exploration, synthesis of abstrac-tion, comparison, generalization and analogy to clarify the peculiarities of the devel-opment of theoretical approaches underlying the renewal and expansion of the study of Byzantinists and their research on the specified topic; analysis of sources, as well as research materials with the subsequent synthesis of its results into a holistic system of views on this problem; personalistic and biographical method – for the analysis of historical, biographical, reference and encyclopedic literature devoted to historical and pedagogical personalities. The aim of the study is to present to modern historians and all those interested in studying the history of Byzantium, both in Ukraine and abroad, the names of prominent historians of the past and objectively evaluate their work and scientific results in terms of modern international scientific views and approaches. Conclusion. Personalized study of life and scientific and pedagogical heritage of professors and academics of Byzantine studies V. G. Vasilievsky, O. O. Vasiliev, V. E. Regel, Y. A. Kulakovsky, F. I. Uspensky, A. G. Gotalov-Gottlieb gave the opportunity to reveal their fundamental role in the development of domestic Byzantine studies, the establishment of their own scientific schools and areas in scientific and pedagogical activities, created scientific and educational literature on Byzantine history, medieval history and culture, national foreign research institutes, scientific societies, associations and more. The scholars in their monographs and textbooks gave a personal vision of the problem and an interpretation of the expediency and importance of studying the history and culture of Byzantium and the Middle Ages in general. V. G. Vasilievsky, O. O. Vasiliev, V. E. Regel, Y. A. Kulakovsky, F. I. Uspensky, A. G. Gotalova-Gotliba laid the foundation of the national scientific championship. Their names and works are our scientific pride "forgotten", "shot", destroyed or simply unknown today to the general public of modern scientists in Ukraine and abroad. Further research of publications and use of their works and textbooks could become a valuable source for modern researchers of Byzantine history, as well as a discovery and subject for acquaintance for modern foreign researchers.


Sign in / Sign up

Export Citation Format

Share Document