CONTENT OF STATE ACTIVITIES TO ENSURE INFORMATION SECURITY

Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

In the article, in the theoretical and applied aspect, the content of state activities to ensure information security is considered. The analysis of the regulatory and legal framework of the information security system of Ukraine, the structure of public authorities involved in this activity in the context of the state information policy is carried out. On the basis of the Doctrine of Information Security of Ukraine, considered the main aspects of the activities of the Verkhovna Rada of Ukraine, the President of Ukraine, the Cabinet of Ministers of Ukraine, the Ministry of Digital Transformation of Ukraine, the Security Service of Ukraine, the State Special Service for Special Communications and Information Protection of Ukraine and other central executive bodies for the development and improvement of regulatory-legal base and practical implementation of measures aimed at ensuring information security. It is noted that in order to ensure the effective functioning of the information security system of Ukraine, it is necessary to increase the efficiency of the work of structural units for the protection of information in public authorities, organizations and enterprises, which will lead to the optimization of the work of departmental information security systems and increase the efficiency of the functioning of the information security system of Ukraine.

2020 ◽  
Vol 45 (2) ◽  
pp. 57-63
Author(s):  
Oleh Panchenko

The article analyzes the current problems of information security as a part of the national security of the state. The author identifies the reasons for the unsatisfactory situation in the field of information security. Particular attention is paid to the legal framework for information security and prospects for improving legislation, the problems of regulating relations in this area. Successful development and the very existence of Ukraine as a sovereign state is impossible without ensuring its national security. The society’s and the state’s information security is determined by the degree of their protection and, consequently, the stability of the main areas of life concerning dangerous, destabilizing, destructive, infringing the interests of the country information actions at both implementation, and retrieval. The state information policy, as activity of system of public authorities and administration in the information-psychological area occupies the central place in the system of regulation of both social and political relations in the modern information society. The transparency of the state information policy is the basis for ensuring the country’s socio-psychological stability and successful economic development. The practice of information and psychological influence is more and more developing in the modern world. The terms «informational» and «psychological» wars are widely used by politicians and political scientists, and are increasingly appearing in the context of the country’s information security issues. The purpose of this article is to determine the role of information security in the national security of the state and to study the legislative regulation in the information area of Ukraine. A radical change in the state’s approach to solving this problem should become one of the priorities in ensuring national security.


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


2020 ◽  
Vol 20 (2) ◽  
pp. 382-394
Author(s):  
Tatyana Ivanovna Ponka ◽  
Mirzet Safetovich Ramich ◽  
Yuyao Wu

The subject of the study is the new course of the PRC information policy, which was launched by the Fifth generation of the PRC leaders after the 18th Congress of the Chinese Communist Party in 2012. As a result, after the 18th Congress of the CPC was started the implementation of the Strong cyberpower strategy, which implies not only ensuring cyber security in the country, but also the usage of network resources to develop the national economy. Chinas new information policy was caused by the sharply increased role of information and communication technologies in international processes and the shift in the focus of international relations to the Asia-Pacific region. The PRCs information policy is based on the most advanced technologies in the IT sphere and the cooperation with private companies on regulating external and internal information security. The relevance of the research topic is due to the increasing role of ICT in international processes. In this context, the most important are the positions of the leading countries of the world to regulate this area, as well as the mechanisms and tools used by them. The Peoples Republic of China is one of the leaders in the field of scientific and technical developments and actively uses its achievements to accomplish tasks in the field of domestic and foreign policy. In this regard, the purpose of the study is to analyze and compare the development strategies of the PRC information policy and the resources that are necessary for their implementation. The unique network landscape, which was formed under the influence of government policy on control over published content and the sharing of digital services market among the three largest information corporations (Baidu, Tencent and Alibaba), has become an essential part of the countrys information security system and requires detailed study. The purpose of the article is to identify the evolution of Chinas information policy development strategy and resources for its implementation. This article also discusses the threats to the information security of the Peoples Republic of China and analyzes the approaches to ensuring it. The results of the study are the conclusions that show the role and place of information policy in the PRC foreign policy, the structure of the information security system and strategic approaches to the regulation of international relations in cyberspace.


Author(s):  
A.V. Pecheniuk

The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative legal acts aimed at bringing to civil, administrative and criminal responsibility for illegal collection, disclosure and use of information constituting a trade secret. The main stages of building an information security policy are summarized, the most common types of information threats related to the use of modern computer technologies are described. The necessity of developing a domestic original accounting (management) program that could be used in the long term by the vast majority of Ukrainian enterprises is pointed out. There are three groups of tools that are applied in the theory and practice of information security of the enterprise (active, passive and combined), emphasizing the need for planning and continuous monitoring in real time of all important processes and conditions that affect data security. It is noted that even if the information security system is built taking into account all modern methods and means of protection, it does not guarantee one hundred percent protection of the information resources of the enterprise, but a well-designed information security policy allows to minimize the corresponding risks. Key words: information security, information policy, information security, confidential information, information threats, information and communication technologies, software.


Author(s):  
O. Voitko ◽  
V. Onishchuk

The events analysis since the beginning of the aggravation of relations between Ukraine and Russia evidences about the inefficiency of information policy, incoordination of activity of different subjects of ensuring the information security of the state, the weak presence of Ukraine in the world information space etc. At the same time, the problems of ensuring the information security of the state and realization of effective set of counter-propaganda measures, realization of information policy, aimed at consolidating Ukrainian society and the international community for the purpose of suppression of armed aggression are identified by the higher military-political governance of Ukraine as the most priority. Various internal and external factors negatively affect at the ability of Ukraine to adequately respond to challenges and risks in the military sphere. The insufficient and unprofessional efforts of Ukraine’s state authorities in the field of counteraction to the Russian Federation’s propaganda and information-psychological operations are the most important ones. That’s why there’s necessity of development the system of opinions and determination of the plan of the higher military-political governance’s of Ukraine actions regarding the implementation of state information policy and providing of information security of Ukraine and legislative definition of a conceptual document. Besides the importance of this fact consist in that after the restoration of the territorial integrity of Ukraine the main aims of military policy will be prevention the emergence of new armed conflicts, systematic strengthen the state's defense capability and increasing the role and authority of Ukraine in the international area.


2017 ◽  
Vol 41 (1) ◽  
pp. 2-18 ◽  
Author(s):  
Inho Hwang ◽  
Daejin Kim ◽  
Taeha Kim ◽  
Sanghyun Kim

Purpose The purpose of this paper is to empirically investigate the negative casual relationships between organizational security factors (security systems, security education, and security visibility) and individual non-compliance causes (work impediment, security system anxiety, and non-compliance behaviors of peers), which have negative influences on compliance intention. Design/methodology/approach Based on literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 415 responses from employees at manufacturing and service firms that had already implemented security policies. The hypothesized relationships were tested using the structural equation model approach with AMOS 18.0. Findings Survey results validate that work impediment, security system anxiety, and non-compliance peer behaviors are the causes of employee non-compliance. In addition, the authors found that security systems, security education, and security visibility decrease instances of non-compliance. Research limitations/implications Organizations should establish a mixture of security investment in their systems, education, and visibility in order to effectively reduce employees’ non-compliance. In addition, organizations should recognize the importance of minimizing the particular causes of employees’ non-compliance to positively increase intentions to comply with information security. Originality/value An important issue in information security management is employee compliance. Understanding the reasons behind employees’ non-compliance is a critical issue. This paper investigates empirically why employees do not comply, and how organizations can induce employees to comply by a mixture of investments in security systems, education, and visibility.


Author(s):  
Iryna Sopilko

The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration. The author also considers the features of the foundation and development of the information society in Ukraine, the components of its state information policy for ensuring information security, and identifies the key operations of activity of state bodies in the information sphere. The approaches of scientists who studied certain aspects of national and information security were analyzed, based on their work valuable conclusions were drawn and the conceptual basis of the article was formed. Independently, the definition and characteristics of external and internal threats to the information security of the country are given, methods for solving the problems arising in this connection are introduced, ways of ensuring the information security of the state are indicated. Information security in this study is considered as the central element of the national security of Ukraine, as well as a problematic issue in the field of information protection and ensuring the high-quality functioning of the information space. The author made an in-depth analysis of the existing regulatory and legal instruments for ensuring information security, pointed out their shortcomings, and gave recommendations for their further advancement. Also, recommendations are given to improve the current situation with the regulation of information security in the country, the directions of the state information policy are suggested and ways to ensure the continuity of the functioning of the information security system of Ukraine are indicated.


Author(s):  
Oleh Kozlenko

Article explores application methods for systems structural analysis to use in study of security in information systems, which is based on variants of general attack scenarios, features of cybersecurity culture, q-analysis, which is part of MCQA . General security system analysis usually is based on different factors, which include  technical means, human-related mistakes in different ways and respond to security incidents. Q-analysis presents the basic principles of constructing model of information security systems elements connectivity on the example of two sets: set of threats and sets of security measures for information security and calculated numerical values. Elements of the two sets of are interconnected and form the basis of a system for ensuring their security. These calculations can be used to further determine overall formal assessment of security of the organization.


2016 ◽  
Vol 3 (2) ◽  
pp. 122-132
Author(s):  
E V Okhotsky

The article examines the legal framework, characteristics and main components of politics and public administration in the context of globalization and the crisis of the negatives of modern Russia, economic, organizational and information framework the integration of the state policy in the globalization processes and the practical implementation of the state policy of crisis and contractional orientation. Analyzes General, special and private in the process Manager’s specific anti-crisis actions in view of the potential opportunities and prospects out of the country on the path of sustainable socio-economic and political development; represented basic components of the mechanism of public crisis management, the most effective forms, methods and means of effective political and administrative activity in the conditions of crisis and unprecedented external unfriendly to Russia sanctions pressure.


Author(s):  
O. Pronevych

The article is devoted to understanding the specifics of the social mission and the state of legal consolidation of the administrative legal personality of councilors in public authorities and local governments. It is emphasized that the problem of selection of candidates for the positions of advisers to the heads of public authorities is the subject of lively discussion, as a rather controversial collective image of the adviser has formed in the public consciousness. This is due to his belonging to officials who hold a particularly responsible position and perform official duties in the presence of a high level of corruption risks. It is established that the commitment of candidates for advisers is carried out in the context of providing scientific support for the formation and implementation of public policy, implementation of best management practices, finding optimal management and legal algorithms for resolving conflicts, improving the quality of management decisions. The urgent need to improve the domestic service legislation by adopting a special law on patronage service in order to unify the legal framework for the organization and operation of patronage services. First of all, it is necessary to normatively enshrine the right of specific public authorities to establish a patronage service, to provide an exhaustive list of patronage service positions for each of these bodies, to provide the right of equal access to patronage service, to introduce a single mechanism for selection and appointment of patronage service employees. professional achievements and personal business qualities, to differentiate their powers depending on the specifics of public authority of individual officials, which create patronage services. There is also a need to specify the functions, main tasks and powers of advisers to heads of public authorities, articulation of basic qualification requirements for candidates for advisers, clear definition of legal bases of interaction of advisers with career civil servants and communication with civil society institutions, articulation of moral and ethical imperatives. official activity of advisers. Keywords: public service, patronage service, adviser in state authorities and local self-government bodies, staff adviser, advisor on a voluntary basis.


Sign in / Sign up

Export Citation Format

Share Document