scholarly journals Essence, Elements, Risks and Statistical Dimensions of Ukraine’s National Security

2021 ◽  
pp. 207-229
Author(s):  
Tetiana FASOLKO ◽  
Petro SEMYANCHUK ◽  
Olha FEDORCHUK

The exceptional importance, extreme necessity and permanent relevance of the study of national security problems of Ukraine are substantiated. The essence of Ukraine’s national security is clarified through protection of national interests and strengthening of national position in the spheres of health care, childhood protection, social policy, pension provision, housing and communal services, migration policy, financial services market, property rights protection, stock market and securities circulation, fiscal and customs policy, trade, business, banking services, investment policy, auditing, monetary policy, licensing, industry, agriculture, transport, communications, energy and energy saving, operation natural monopolies, subsoil use, land and water resources, minerals, education, science, science technology and innovation policy, cultural development, information protection, information technology, freedom of speech and information security, cyber security and cyber defence, ecology and environmental protection, law enforcement, anti-corruption, border activities, defence, and other areas of public administration. Elements of national security of Ukraine are grouped into economic, social, informational, educational-scientific, law enforcement, defence, ecological and cultural blocks, as well as a block of other spheres of public administration. The technique of calculation of the parameters defining level of stability and durability of national security of Ukraine is developed and offered on the basis of theoretical approach. The essence of risks, dangers and threats to the national security of Ukraine is highlighted. Variants and cases of inverse curvilinear dependence between the probability of occurrence of risks in the sphere of national security of Ukraine and the degree of stability and strength of national security of Ukraine are established, modelled and characterized. With the help of the defined integral, the methods of calculating losses and loss of benefits of the state, legal entities and individuals due to the occurrence of risks, as well as the field of spread of national security risks of Ukraine are outlined. The classification and attempt to calculate the probability of occurrence of national security risks of Ukraine by elements and blocks is made.

Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
Vol 6 (44) ◽  
Author(s):  
N. Tkachova ◽  
R. Martyanova ◽  
O. Kazanska

The article states that under the influence of global migration processes and international obligations Ukraine’s migration policy has also changed. Significant development of migration policy began after the country's independence and Ukraine's choice of European integration.The article is devoted to the analysis of risks of implementation of the state migration policy for temporary stay of foreigners and stateless persons. Measures to introduce effective control over compliance with migration legislation within the country aimed at strengthening national security are considered. The issue of the content and main characteristics of the concepts of «state migration policy» and «public administration» in the field of migration is studied. The peculiarities of the status of the State Migration Service of Ukraine as a subject of the state migration policy are determined.Key words: state migration policy, public administration, subject of state migration policy, illegal migration, national safety


2018 ◽  
Vol 6 (8) ◽  
pp. 49-55
Author(s):  
E. V. Kubanov

The article analyzed the scientific approaches to the concept of «cybersecurity». The author defined the concept of «cybersecurity of the public administration system», which is understood as the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. The article identified internal and external threats. The author highlighted the main elements of the cybersecurity system of public administration, in particular: information, information and communication systems; threats; mechanisms of providing cybersecurity of the public administration system; subjects of the cybersecurity of the public administration system.Integration of Ukraine into the European space and the reform of the spheres of economy, industry and defense has called for a radically new approach to information and cybernetic security. Cyberspace as an arena of conflicts between states, organizations, and officials is one of the most pressing problems of the present.The article analyzes the scientific approaches to the concept of «cyber security» and states that cybersecurity of the system of public administration is the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. Separate internal (corruption actions; hardware bookmarks in chips and firmware of computer and network equipment; weak organization of the cyberspace management system) and external threats (targeted attacks, cyberterrorism, cyberwar, hatcism, attacks on banking systems, attacks on e-government).


2016 ◽  
pp. 100-128
Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


Author(s):  
Anatolii Yugov ◽  
Sergey Belykh

The Constitution, as the main universal and comprehensive legal document, establishes fundamental principles and defines the legal basis for development of public and state life in all politically significant spheres, serves as a guarantor of legitimacy and order, gives a boost to the development of society. The special political and legal nature of the constitution, the issues of its operation and the mechanism of its implementation are of great importance. In accordance to the authors’ approach, the mechanism of implementation of the Constitution of the Russian Federation includes the following components: 1) entry of the constitution into legal force; 2) its functions; 3) constitutional algorithm of unity and differentiation of public authority; 4) forms of implementation; 5) ways of implementation; 6) subjects of implementation; 7) objects of implementation; 8) institutions for modernization; 9) guarantees of implementation. The authors conclude that the modern scientific ideas of a rational mechanism of implementation of the Constitution of the Russian Federation contribute to solving the issues of economic and cultural development of the Russian society, help creating favorable conditions for proper law enforcement, strengthening legitimacy and order.


2020 ◽  
Vol 22 (5) ◽  
pp. 51-55
Author(s):  
OLEG N. KORCHAGIN ◽  
◽  
ANASTASIA V. LYADSKAYA ◽  

The article is devoted to the current state of digitalization aimed at solving urgent problems of combating corruption in the field of public administration and private business sector. The work considers the experience of foreign countries and the influence of digital technologies on the fight against corruption. It is noted that the digitalization of public administration is becoming one of the decisive factors for increasing the efficiency of the anti-corruption system and improving management mechanisms. Big Data, if integrated and structured according to the given parameters, allows the implementation of legislative, law enforcement, control and supervisory and law enforcement activities reliably and transparently. Big Data tools allow us to analyze processes, identify dependencies and predict corruption risks. The author describes the most significant problems that complicate the transfer of offline technologies into the online environment. The paper analyzes promising directions for the development of digital technologies that would lead to solving the arising problems, as well as to implement tasks that previously seemed unreachable. The article also describes current developments in the field of collecting and managing large amounts of data, the “Internet of Things”, modern network architecture, and other advances in the field of IT; the work provides applied examples of their potential use in the field of combating corruption. The study gives reasons that, in the context of combating corruption, digitalization should be allocated in a separate area of activity that is controlled and regulated by the state.


Author(s):  
Omer Tene

Israel is a democracy committed to the protection of human rights while at the same time trying to contain uniquely difficult national security concerns. One area where this tension is manifest is government access to communications data. On the one hand, subscriber privacy is a constitutional right protected by legislation and Supreme Court jurisprudence; on the other hand, communications data are a powerful tool in the hands of national security and law enforcement agencies. This chapter examines Israel’s attempt to balance these competing interests by empowering national security agencies while at the same time creating mechanisms of accountability. In particular, Israel utilizes the special independent status of the attorney general as a check on government power.


2021 ◽  
pp. 000486582110039
Author(s):  
Benoît Dupont ◽  
Chad Whelan

‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing ( Brodeur, 2010 ) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber- crime and cyber- security and to call for more fruitful alliances between cybercrime and cybersecurity researchers.


Sign in / Sign up

Export Citation Format

Share Document