scholarly journals Tasks and powers of the National police of Ukraine in ensuring information security of the state

2021 ◽  
Vol 10 (37) ◽  
pp. 86-92
Author(s):  
Vitalii Makarchuk

The purpose of the article is to examine the role of the National Police of Ukraine in ensuring the information security of Ukraine. The subject of the study: The subject of the study is the competence of the National Police of Ukraine in ensuring the information security of Ukraine. Methodology: Dialectical method, epistemological method, analytical method, formal and legal method, normative and dogmatic method, the methods of legal modeling and forecasting were used in the research. The results of the study: The definition of “information security” and “cyber security” is provided. The main factors that negatively affect the information space in Ukraine, as well as current threats to Ukraine’s national security in the information sphere are identified. Practical implications: It is established that the number of crimes in the information sphere is growing every year. In this regard, the task of the National Police is to combat crimes and other offenses in this area, as well as to protect relevant rights and freedoms of citizens, society and the State. Value/originality: The tasks and powers in the area of information security protection of the National Police in general and the Department of Cyber Security, in particular, are defined.

2020 ◽  
Vol 79 (4) ◽  
pp. 32-38
Author(s):  
І. Д. Казанчук ◽  
В. П. Яценко

Based on the analysis of scientific concepts and legal principles the author has provided the definition of information security, provision of information security in Ukraine and has characterized its components. The current state of legal regulation of the organization and activity of cyberpolice units of the National Police of Ukraine has been analyzed. Particular attention has been paid to the legal analysis of the tasks, functions and structure of the Cyberpolice Department of the National Police of Ukraine. Special attention has been drawn to certain shortcomings of Ukrainian legislation in the field of ensuring information security by the police, its compliance with the norms and standards of international law. Taking into account the specifics of the tasks, the author has provided characteristics of the functions of cyberpolice units in the information sphere, which should be divided according to the purpose into: 1) basic (external), which are focused on law enforcement and preventive aspects; 2) auxiliary (intrasystem), which are focused on promoting the implementation of basic functions, the introduction of appropriate management mechanisms within the system. It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. It has been concluded that in order to improve the legal principles for the organization and activities of cyberpolice units of the National Police in the field of ensuring information security and counteracting cyber threats, first of all, it is necessary to optimize the organizational structure of cyberpolice, reasonably distribute the functions (powers) between cyberpolice units and other subjects combating cyber threats in Ukraine, to create appropriate conditions for reaching a qualitatively new level of interaction between them and coordination of their activities in the field of ensuring information security in modern conditions.


2020 ◽  
Vol 10 (40) ◽  
pp. 73-83
Author(s):  
Ihor Diorditsa ◽  
Kateryna Katerynchuk ◽  
Armenui Telestakova ◽  
Nataliia Kulak ◽  
Andrii Nastiuk

In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.


Author(s):  
M. Pleskach

The article is devoted to the issue on balancing the important interests of a person, a society and the state in cyber space by means of administrative law. The purpose of this article is to determine the legal nature and the role of the correspondence of the important interests of a person, a society and the state in cyber space in the context of administrative and legal provision of cyber security. The paper also deals with a proper balance between the law-enforcement interests of the state and the respect for fundamental human rights. The method of analysis has revealed in clarifying some features of concepts "interest", "need", "right". The method of synthesis has been used to define common concepts, for example "person's interest in cyberspace". Comparative legal method has been used in the process of comparison of the legislation of Ukraine and the international legislation that governs the issue on balancing the important interests of a person, a society and the state in cyber space. The author of this research presents the possible structure of person's cyber security through a set of important person's rights and interests in cyberspace, for example, the right to access to the Internet; the right to protect personal data in cyberspace; the right to be protected from aggressive marketing technologies in cyberspace, the prohibition of monitoring, including through cookies, HTTP, HTML5 markers or other technologies; the right to education, the right to access knowledge through the use of cyberspace etc. Conclusions and proposals of this research can be used for further research and for improving the administrative and information legislation of Ukraine, including the Law of Ukraine "On the Fundamental Principles of Cyber Security of Ukraine". Keywords: the balance of interests of the person, society and state, cyber space usage, public interest, private interest.


2021 ◽  
Vol 10 (39) ◽  
pp. 238-244
Author(s):  
Serhii Bratel ◽  
Nataliia Makarenko ◽  
Valentyn Bortnyk ◽  
Yurii Levchenko ◽  
Andrii Mykytchyk

The purpose of the article: is to study the threats to the information security of Ukraine and to analyze the legislative acts that define the tasks and functions entrusted to rule-of-law institutions to ensure information security of the State. Research methods: Logical method, normative and dogmatic method, monographic method, system and structural method, grouping method, the method of generalization are applied in the course of the study. Results of the research. Scientific approaches to the concepts of "information security", "cyber security" and "rule-of-law institutions" are considered. The threats to legal relations in this area are identified. Practical meaning. The role, mission and powers of the rule-of-law institutions in ensuring information and cyber security of Ukraine are established. Scientific novelty. The normative and legal acts, which enshrine the tasks and powers of rule-of-law institutions in ensuring the information security of the State in general and cyber security in particular, are analyzed in detail.


2020 ◽  
Vol 12 (6) ◽  
pp. 129-149
Author(s):  
A. V. Khudaykulova ◽  
N. Y. Neklyudov

The article studies “ontological” security concept. In a general sense the term depicts expectations of a state about its stable and predictable relations with counterparts. With the term gaining theoretical sway in constructivism since the 21st century, we argue, that it still lacks instrumental definition with fixed assumptions and variables. The analysis of ontological security is conducted in twofold manner. First, we overview the broad range of interpretations, demonstrate the absence of an instrumental definition of the concept and suggest some parameters of such a definition. Secondly, we study the ways how a state can gain ontological security. Three options of achieving ontological security are being presented: adaptation (assuming the role of ‘another’ from the external environment); change of rules (imposing its own role on the subject with whom the interaction occurs); and the breach of relations. At all these stages, the state tries either to adopt the norms and practices by which it interacts with the environment, or to redefine its position in ongoing relations with counterparties. We conclude by presenting a sought definition of the term and by arguing that the concept enhances the constructivist contribution to the IR theory since it allows to define the logic of states’ behavior in international arena. Thus, states seek to be socialized into an intersubjective reality and to define norms, practices and status through forging common and communicative knowledge with ‘other’. Otherwise, the state’s behavior could be irrational. Theory emphasizes the need to avoid situations of the ontological security dilemma: the state projects its own, mostly protective reality, which, however, does not provide it with ontological security from the counterparty and could potentially push for further escalation of crisis interactions.Authors declare the absence of conflict of interests.


2020 ◽  
pp. 183-190
Author(s):  
І. Є. Іванов

The article considers topical issues of information security in the activities of the National Police of Ukraine. It is determined that the main problem of information security in the law enforcement sphere arose due to the global contradiction between the possibilities of information technologies and the threats of their use. The settlement of the existing public information relations alone is insufficient, as the legislation does not keep pace with technical progress. The definition of "information security" is considered and the author's definition of this concept is offered. The main normative legal acts regulating the activity of the National Police in this direction are analyzed. It is stated that information security of the National Police of Ukraine is provided in two forms: organizational (related to the circulation, collection, processing, storage, use and protection of information); legal (preparation and approval of regulations (orders, instructions), development of regulations, instructions, algorithms, plans, etc.). The key to information protection is the administration of information systems. The European experience of information protection in the law enforcement sphere is considered. Attention is drawn to the need to implement a system of modern international information security standards ISO / IES series 27000, which is constantly updated. It is theoretically substantiated that: increasing the efficiency of the National Police of Ukraine can be solved through the introduction of a reliable information security system; to achieve the highest level of information security of law enforcement agencies it is necessary not only to improve the current legislation, but also to have a mechanism for its implementation; Security and protection in the information systems of the National Police should be based on a comprehensive approach to building a protection system, which provides for the integration into a single set of necessary measures and means of information protection at all levels of the information system.


2018 ◽  
Vol 30 (30) ◽  
pp. 87-101
Author(s):  
Klaudia Grzebiela

A sense of security is one of the basic human needs that can be guaranteed by the state using the available methods and techniques. At present, security categories are distinguished where information security has found its place. Due to the role of information and its impact on states, societies and entities, the literature has highlighted this issue. The wide scope of information security and related topics have led to the creation of concepts that do not reflect current knowledge about information security. The aim of the article is to select, among the definitions presented by the doctrine – the definition of information security most aptly capturing its essence. In this work the author used the descriptive methodology, focusing on the comparative analytical method.


2020 ◽  
Vol 3 ◽  
pp. 88-93
Author(s):  
K.N. Golikov ◽  

The subject of this article is the problems of the nature, essence and purpose of prosecutorial activity. The purpose of the article is to study and justify the role of the human rights function in prosecutorial activities in the concept of a modern legal state. At the heart of prosecutorial activity is the implementation of the main function of the Prosecutor’s office – its rights and freedoms, their protection. This means that any type (branch) of Prosecutor's supervision is permeated with human rights content in relation to a citizen, society, or the state. This is confirmed by the fact that the Federal law “On the Prosecutor's office of the Russian Federation” establishes an independent type of Prosecutor's supervision-supervision over the observance of human and civil rights and freedoms. It is argued that the legislation enshrines the human rights activities of the Prosecutor's office as its most important function. It is proposed to add this to the Law “On the Prosecutor's office of the Russian Federation”.


Author(s):  
Brent A. R. Hege

AbstractAs dialectical theology rose to prominence in the years following World War I, the new theologians sought to distance themselves from liberalism in a number of ways, an important one being a rejection of Schleiermacher’s methods and conclusions. In reading the history of Weimar-era theology as it has been written in the twentieth century one would be forgiven for assuming that Schleiermacher found no defenders during this time, as liberal theology quietly faded into the twilight. However, a closer examination of this period reveals a different story. The last generation of liberal theologians consistently appealed to Schleiermacher for support and inspiration, perhaps none more so than Georg Wobbermin, whom B. A. Gerrish has called a “captain of the liberal rearguard.” Wobbermin sought to construct a religio-psychological method on the basis of Schleiermacher’s definition of religion and on his “Copernican turn” toward the subject and resolutely defended such a method against the new dialectical theology long after liberal theology’s supposed demise. A consideration of Wobbermin’s appeals to Schleiermacher in his defense of the liberal program reveals a more complex picture of the state of theology in the Weimar period and of Schleiermacher’s legacy in German Protestant thought.


Sign in / Sign up

Export Citation Format

Share Document