scholarly journals Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)

2021 ◽  
pp. 98-105
Author(s):  
Y. MANUILOV

The provisions of the updated Cyber Security Strategy of Ukraine are analyzed. The effectiveness of the Cyber Security Strategy of Ukraine in 2016 has been determined. The issue of organizational and legal bases of cyber security is studied. The components of the national cyber security system are considered. The practical component of the Cyber Security Strategy of Ukraine and the priority tasks of the security and defense sector are detailed. The strategic principles of cyber security in Japan are highlighted. The prospects of implementation of the Cyber Security Strategy of Ukraine in the conditions of modern geopolitical confrontation are generalized.

2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


2021 ◽  
Vol 21 (3) ◽  
pp. 593
Author(s):  
Sulaiman ghani ◽  
Sahalu Junaidu ◽  
Afolayan Obiniyi ◽  
Mustapha Bagiwa ◽  
Garba Aliyu

Author(s):  
Andreas HAGGMAN

This paper introduces readers to core concepts around cyber wargaming. Wargames can be powerful learning tools, but few wargames exist to teach players about cyber security. By way of highlighting possibilities in this space, the author has developed an original educational tabletop wargame based on the UK National Cyber Security Strategy and deployed the game to a variety of organisations to determine its pedagogic efficacy. Overall, it is found that the game was effective in generating high-engagement participation and clear learning opportunities. Furthermore, there are design lessons to be learned from existing games for those seeking to use wargames for cyber security training and education.


Author(s):  
Ion PARASCHIVA

The field of cyber security is evolving at an alert pace and requires constantly updated strategies, and from the IT specialists, extensive knowledge and experience. In addition to the technical knowledge regarding cyber security, IT specialists of the Romanian Police need to understand very well the nature of the activity carried out. It should be made aware that there is no valid general success recipe and that the development of security policies should start from analyzing the particularities of human resources. Once their activity is understood, a dedicated security strategy can be outlined, ensuring a high degree of security for the organization and the information held by it.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Sign in / Sign up

Export Citation Format

Share Document