PURPOSE AND PRINCIPLES OF INFORMATION ACTIVITY OF THE ARMED FORCES OF UKRAINE AND ITS ROLE IN PROVIDING THE INFORMATION SECURITY OF THE STATE IN MODERN CONDITIONS

Author(s):  
Bohdana Tychna ◽  
2019 ◽  
pp. 16-25
Author(s):  
Sergiy Zaporozhets

The article is devoted to the study of the state of information security of Ukraine in the military sphere in the context of hybrid warfare, analysis of the role and place of information security of the state and the military sphere in conditions of hybrid warfare. The list of the main threats to the information security of the state in the military sphere is established. The recommendations for neutralization of hybrid threats and the organization of counteraction in solving the hybrid war against Ukraine are given: conducting a systematic analysis of the use of the means, forms and methods of information fighting in the military sphere, determining the directions of ensuring information security of the state in this sphere; improvement of legislation on coordination of activities of public authorities and bodies of military administration in solving problems of providing information security; improving the types and means of protection of information in the information and telecommunication networks involved in the management of troops and weapons from unauthorized access; improving the forms and methods of counteracting information and psychological operations aimed at weakening the state’s defense capability; training of specialists in the field of information security in the military sphere. Establishment of the system of providing information security of the state in the military sphere in the conditions of hybrid war should be carried out in accordance with the following basic principles: high degree of integration of the information system of the Armed Forces of Ukraine into the information security system of the state; the preventive-defensive nature of the activities of information-fighting structures aimed at counteracting the challenges, dangers and threats to the national security of the state in the military sphere in any form of their manifestation; a clear division of information security responsibilities between the Ministry of Defense of Ukraine and the General Staff of the Armed Forces of Ukrain. It is revealed that one of the main tendencies in the development of the military-political situation in the world is the acceleration of the development of information technologies, increasing the capabilities of states to conduct information-psychological operations and operations in cyberspace, increasing the sensitivity of society to the death of civilians and the loss of military personnel in military configurations.


Author(s):  
Anzhelika Dilai

The main purpose of this article is to investigate the possible gaps in the strategic communications system proposed by the Ministry of Defense of Ukraine, trying to suggest also the ways to reconcile the possible divergences. Methodology. The study uses a comparative analysis to compare the key points of the Strategic Communications Concept of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine as well as the NATO Strategic Communications Concept. Based on the differences revealed by the method of ideal modeling, the accents are proposed that should be considered when making changes to the existing document and developing such normative legal acts. Results/Achievements. In 2017, the Ministry of Defense of Ukraine introduced the system of strategic communications as a response to Russian aggression at the state level. In this regard, a document called the Strategic Communications Concept of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine (hereinafter referred to as the Concept) was signed, which was supposed to contain a technological approach to counteracting information challenges, risks and threats, in particular, in the context of ATO / OOS. However, this study showed that the document contained a number of omissions, in particular, the focus was on the issue of the audience of strategic communications, channels of distribution of key messages in accordance with the existing narrative, the narrative in particular, and the use of the latest technologies by the actors in implementation of strategic communications. Consequently,o we have proposed some emphasis for further improvement of this document, which should reflect strategic nature, and can be used to develop such normative acts in the case of information security.


Author(s):  
Julia Fleischer

AbstractThe federal administration is significantly small (around 10 percent of all public employees). This speciality of the German administrative system is based on the division of responsibilities: the central (federal) level drafts and adopts most of the laws and public programmes, and the state level (together with the municipal level) implements them. The administration of the federal level comprises the ministries, subordinated agencies for special and selected operational tasks (e.g. the authorisation of drugs, information security and registration of refugees) in distinct administrative sectors (e.g. foreign service, armed forces and federal police). The capacity for preparing and monitoring government bills and statutory instruments is well developed. Moreover, the instruments and tools of coordination are exemplary compared with other countries, although the recent digital turn has been adopted less advanced than elsewhere.


2019 ◽  
pp. 16-25
Author(s):  
Sergiy Zaporozhets

The article is devoted to the study of the state of information security of Ukraine in the military sphere in the context of hybrid warfare, analysis of the role and place of information security of the state and the military sphere in conditions of hybrid warfare. The list of the main threats to the information security of the state in the military sphere is established. The recommendations for neutralization of hybrid threats and the organization of counteraction in solving the hybrid war against Ukraine are given: conducting a systematic analysis of the use of the means, forms and methods of information fighting in the military sphere, determining the directions of ensuring information security of the state in this sphere; improvement of legislation on coordination of activities of public authorities and bodies of military administration in solving problems of providing information security; improving the types and means of protection of information in the information and telecommunication networks involved in the management of troops and weapons from unauthorized access; improving the forms and methods of counteracting information and psychological operations aimed at weakening the state’s defense capability; training of specialists in the field of information security in the military sphere. Establishment of the system of providing information security of the state in the military sphere in the conditions of hybrid war should be carried out in accordance with the following basic principles: high degree of integration of the information system of the Armed Forces of Ukraine into the information security system of the state; the preventive-defensive nature of the activities of information-fighting structures aimed at counteracting the challenges, dangers and threats to the national security of the state in the military sphere in any form of their manifestation; a clear division of information security responsibilities between the Ministry of Defense of Ukraine and the General Staff of the Armed Forces of Ukrain. It is revealed that one of the main tendencies in the development of the military-political situation in the world is the acceleration of the development of information technologies, increasing the capabilities of states to conduct information-psychological operations and operations in cyberspace, increasing the sensitivity of society to the death of civilians and the loss of military personnel in military configurations.


Author(s):  
O. R. Stefurak ◽  
◽  
Yu. O. Tykhonov ◽  
O. A. Laptyev ◽  
S. A. Zozulya

The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological base is the basis for making sound and effective management decisions by information security of the state at all levels. The article identifies critical components of information space security based on an analytical analysis of threats of damage or unauthorized leakage of information at the objects of information activity. Based on the obtained analytical data, the stochastic model of threats of damage or unauthorized leakage of information at the objects of information activity has been improved. Based on the results of the proposed model, modeling was performed in order to confirm the analytical data and identified priorities for information security. The most critical areas and threats to information security are identified. The obtained results allow to plan the information security system taking into account the most probable threats. Plan and implement priority information security measures. Focus on protecting more likely areas of threat.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


Author(s):  
V. Nazarkin ◽  
O. Semenenko ◽  
A. Efimenko ◽  
V. Ivanov

The task of choosing the rational number of power structures is always one of the main priorities of any political leadership of the state. An insufficient number of armed forces is a threat to the national security of the state; an excess number creates pressures on the development of the country's national economy. Today, when the development programs of the Armed Forces of Ukraine are being formed in the context of the practical application of their units and subunits to carry out combat missions, questions of choosing a priority approach to the formation (justification) of the rational size of the Armed Forces of Ukraine is an urgent issue. The article proposes a structure for conducting research on the development and implementation of the methodology of military-economic substantiation of the rational strength of the Armed Forces of Ukraine in the system of defense planning of Ukraine in the formation of programs for their development for the medium and long term. The main objectives of this methodology are: scientific substantiation of the range of the necessary strength of the Armed Forces of Ukraine for the period of the program of their development; the choice of the indicator of the rational size of the Armed Forces of Ukraine according to the years of the program from a certain range of its changes; military-economic substantiation of this number under the influence of various limiting factors. The development and implementation of such a methodology will increase the efficiency of the formation and implementation of development programs of the Armed Forces of Ukraine, as well as the efficiency of using public funds for the development of power structures.


Sign in / Sign up

Export Citation Format

Share Document