scholarly journals Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects

2020 ◽  
Vol 10 (40) ◽  
pp. 73-83
Author(s):  
Ihor Diorditsa ◽  
Kateryna Katerynchuk ◽  
Armenui Telestakova ◽  
Nataliia Kulak ◽  
Andrii Nastiuk

In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.

2021 ◽  
Vol 10 (37) ◽  
pp. 86-92
Author(s):  
Vitalii Makarchuk

The purpose of the article is to examine the role of the National Police of Ukraine in ensuring the information security of Ukraine. The subject of the study: The subject of the study is the competence of the National Police of Ukraine in ensuring the information security of Ukraine. Methodology: Dialectical method, epistemological method, analytical method, formal and legal method, normative and dogmatic method, the methods of legal modeling and forecasting were used in the research. The results of the study: The definition of “information security” and “cyber security” is provided. The main factors that negatively affect the information space in Ukraine, as well as current threats to Ukraine’s national security in the information sphere are identified. Practical implications: It is established that the number of crimes in the information sphere is growing every year. In this regard, the task of the National Police is to combat crimes and other offenses in this area, as well as to protect relevant rights and freedoms of citizens, society and the State. Value/originality: The tasks and powers in the area of information security protection of the National Police in general and the Department of Cyber Security, in particular, are defined.


Eduweb ◽  
2021 ◽  
Vol 15 (2) ◽  
pp. 181-193
Author(s):  
Vira Mizetska ◽  
Olena Sierykh ◽  
Hanna Savchuk ◽  
Diana Yevtimova ◽  
Oleh Synieokyi

The aim of the study is to characterize the impact of the COVID-19 pandemic on the administration of the educational process on the examples of legal and linguistic-didactic aspects. The object of the study is systemic and functional changes in science and education under the influence of the COVID-19 pandemic. The subject of the study is public relations in the field of education and science in their legal and linguistic-didactic aspect under the influence of the COVID-19 pandemic. Research methods are general scientific and special scientific methods, in particular, system-structural, formal-legal, hermeneutic; methods of analysis, synthesis. As a result of the research, the peculiarities of administration of educational processes in the conditions of COVID-19 in the aspect of mechanisms of legal support of activity of bodies of education and science, linguodidactics were formulated; the characteristic of systemic changes in the sphere of education which have occurred under the influence of the distribution of a coronavirus is carried out; describe the main approaches contained in the current scientific literature to solve the above problems.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


Author(s):  
Turhut Salayev

The article deals with scientific and theoretical understanding and the provision of the definition of the category "actors of administrative and legal support of information security in the customs area". The author has disclosed and analyzed the provisions of the administrative and legal doctrine of the above questio, besides, the problematic issues of the definition of "subjects of administrative and legal support of information security in the customs sphere" are identified, andthe necessity of distinguishing this concept from other related concepts and categories is defined. Disclosing issues of actors of administrative and legal support of information security in the cus-toms sphere, it is necessary to avoid substitution of concepts and clearly understand the difference between the concepts of "institutional mechanism of administrative and legal support of information security in customs" and "state mechanism of administrative and legal support of information security in the customs sphere "from the concept of" subjects of administrative and legal support of information security in the customs sphere ". After all, the concept that is the subject of our study, of all the above, has the most comprehensive and broad scope and meaning. That is why, disclosing a set of subjects of administrative and legal support of information security in the customs sphere, it is advisable to apply a broad approach to understanding this category, given that among such subjects must be considered non-state subjects. objects - local governments, public organizations, etc. Because without their activities such a list will not be complete, and the mechanism of administrative and legal support of information security in the customs sphere will not be such that covers all possible spheres of public life and methods of information security. The current general information and administrative legislation, as well as special legislation gov-erning the procedure of customs, is considered in order to more clearly disclose the features and legal status of the actors of administrative and legal support of information security in the customs area. Each of these entities plays an appropriate role and occupies the necessary place in the system of national security of Ukraine, information security of Ukraine in general and information security in the customs area in particular. This role can be described as the implementation of general control over information security in the customs area, as well as taking measures to respond to violations of information legislation and the emergence of threats to information in the customs area within the powers defined by law. At the same time, the administrative and legal provision of information security is carried out directly by the customs authorities.


2018 ◽  
Vol 6 (3) ◽  
pp. 26-30
Author(s):  
Тимур Чукаев ◽  
Timur Chukaev

The Article is devoted to the theoretical and legal heritage of the prominent Russian lawyer Vasily Nikolaevich Leshkov (1810–1881), his ideas about society as a subject of public administration, about the interaction of civil society and the police as subjects of the implementation of the law enforcement function. The methodological basis of the research is general scientific (historical, systemic, functional) and special (formal-legal, historical-legal, comparative-legal) methods of legal research. A theoretical legacy, V. N. Leshkov, which contemporaries did not understand, and the descendants of the forgotten, to comprehend the researchers in the twenty-first century.


Author(s):  
Yurii I. Khlaponin ◽  
Svitlana V. Kondakova ◽  
Yevheniia Ye. Shabala ◽  
Liliia P. Yurchuk ◽  
Pavlo S. Demianchuk

The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.


2021 ◽  
Vol 7 (Extra-A) ◽  
pp. 293-303
Author(s):  
Yury Alexandrovic Svirin ◽  
Vladimir Aleksandrovich Gureev ◽  
Alexandr Anatolievich Mokhov ◽  
Eduard Eduardovich Artyukhov ◽  
Igor Mikhaylovich Divin

The authors examine the emergence of the institution of restrictions on the right to property from a historical perspective and also justify the need to introduce a mechanism of restrictions on the right in the modern world. The disclosure of the topic was carried out from the standpoint of general scientific, the method of theoretical analysis, and special scientific methods (comparative jurisprudence, technical and legal analysis, concretization, interpretation). The methodological basis of the study was the method of the theory of knowledge. The necessity of developing a mechanism for limiting the absolute right of ownership was justified, the difference between the restriction and encumbrance of the right of ownership was proved, and the place of the easement in the system of restriction on the right was investigated.  


2021 ◽  
Vol 10 (39) ◽  
pp. 238-244
Author(s):  
Serhii Bratel ◽  
Nataliia Makarenko ◽  
Valentyn Bortnyk ◽  
Yurii Levchenko ◽  
Andrii Mykytchyk

The purpose of the article: is to study the threats to the information security of Ukraine and to analyze the legislative acts that define the tasks and functions entrusted to rule-of-law institutions to ensure information security of the State. Research methods: Logical method, normative and dogmatic method, monographic method, system and structural method, grouping method, the method of generalization are applied in the course of the study. Results of the research. Scientific approaches to the concepts of "information security", "cyber security" and "rule-of-law institutions" are considered. The threats to legal relations in this area are identified. Practical meaning. The role, mission and powers of the rule-of-law institutions in ensuring information and cyber security of Ukraine are established. Scientific novelty. The normative and legal acts, which enshrine the tasks and powers of rule-of-law institutions in ensuring the information security of the State in general and cyber security in particular, are analyzed in detail.


2016 ◽  
Vol 78 (4) ◽  
pp. 551-570 ◽  
Author(s):  
Paulina Kewes

AbstractThis essay provides a contextual reading of Titus Andronicus, paying close attention to the play's collaborative authorship. Peele and Shakespeare are shown to have manufactured a superficially compelling but in reality utterly fake image of the Roman state as an imaginary laboratory for political ideas, especially the elective principle. Topical allusions and deliberate anachronisms encourage the audience to relate the subject matter to the present, viz., late Elizabethan England in the throes of a succession crisis and rent by confessional divisions. Unlike Peele's solo works, which exhibit a potent anti-Catholic bias, Titus remains confessionally elusive. The play invites the audience to reflect on the viability of particular modes of succession without committing itself either way, and shows that it is not institutional structures and processes but those who use and abuse them that make the difference to the state of the polity.


1910 ◽  
Vol 56 (235) ◽  
pp. 700-714 ◽  
Author(s):  
George M. Robertson

I have been asked by the President to open a discussion on the “Treatment of Mental Excitement in Asylums.” The subject is a very important and practical one, and goes to the root of many of the most difficult problems connected with the management of the insane. Of cases of mental excitement in asylums it may be said, “they are always with us,” and the manner in which they are treated and the success attending their treatment may be taken as tests of the good management of an asylum. The difference between the state of the madhouses of the past and of the mental hospitals of the present day is largely the result of better methods of dealing with it.


Sign in / Sign up

Export Citation Format

Share Document