首页 > 最新文献

Information Security of the Person, Society and State最新文献

英文 中文
INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE 信息恐怖主义是当代对人类、社会和国家信息安全的威胁
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-1
Julia Andrusyshyn, Valeria Barannik
The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters).The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware.It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of inf
文章论述了信息恐怖主义在当代环境下对国家和国际安全构成威胁的内容和特征。本专题的相关性源于这样一个事实,即新闻目前被认为是一种战略资源,而故意操纵公众舆论和为此目的采取恐怖主义行动已成为当代国际舞台上混合对抗的最危险表现之一。由于无法与普通计算机犯罪和国内操纵大众媒体明确区分,“信息恐怖主义”和“网络恐怖主义”的概念没有明确的解释。因此,信息恐怖主义可以从广义上(操纵公众意识,制造紧张、不稳定、混乱,以实现恐怖分子的政治或经济目标)和狭义上(对关键政府基础设施信息系统进行网络攻击,使其瘫痪,这可能导致经济、环境和其他灾难)来看待。定义了信息恐怖主义的一般特征(有组织的暴力形式、心理影响、引起对特定问题的注意、示范性),并挑出了信息领域恐怖主义行为所固有的具体特征(保密性、规模、同步性、远程性、国际性和公共性)。介绍了信息恐怖主义的方法,其目的是通过使用虚假信息、宣传、舆论多样化、心理压力、谣言、操纵、恐吓等手段,大规模影响人们的意识,并将其意志强加于社会和国家机构。主要描述了信息恐怖主义的形式:信息心理恐怖主义(媒介恐怖主义)和信息技术恐怖主义(网络恐怖主义)。委员会注意到,媒体恐怖主义/媒体杀手活动涉及组织特别的媒体运动,利用多种传播影响模式(民族主义、宗教、煽动模式),营造一种公民不服从、公众不信任政府及其执法机构的行动和意图的氛围。网络恐怖主义是一种社会危险活动,通过使用以下方法,利用计算机和电信网络危害或实施威胁社会并导致其他严重后果的行动/威胁:apt攻击、恶意软件、DoS / ddos攻击、未经授权的访问、勒索软件。总结和结论是,今天虚拟空间和大众媒体被各种恐怖主义导向的团体广泛用于他们自己的目的,因为可访问性,缺乏审查,大量潜在的用户受众,信息传播的速度以及呈现和接收的复杂性都有助于信息恐怖主义在当今世界的传播。利用媒体和网络空间的恐怖主义威胁是我们这个时代面临的一项复杂挑战。这种恐怖主义的危险在于没有地理和国家边界,因为恐怖主义行为可以在世界任何地方进行,以及在信息空间中识别恐怖分子的身份和确定其行踪的困难,因为黑客通过使用计算机技术间接地进行网络和媒体攻击。因此,鉴于技术和大众传媒的进一步发展,打击信息恐怖主义的问题将特别重要。
{"title":"INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE","authors":"Julia Andrusyshyn, Valeria Barannik","doi":"10.51369/2707-7276-2021-(1-3)-1","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-1","url":null,"abstract":"The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters).\u0000The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware.\u0000It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of inf","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Informational Dimension of Ukrainian National Security Policy in the Conditions of Modern Geopolitic Competition 现代地缘政治竞争条件下乌克兰国家安全政策的信息维度
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-10
V. Kozma
The problem of maintaining security has been relevant throughout world history. This task is relevant today. Ensuring Ukraine’s national security is a complex and multidimensional process. The complexity of this task increases when considering it in the new geopolitical environment. In the modern world, contradictions of a geopolitical nature are growing, and competition between countries is intensifying. These processes take place against the background of the humanity entering a new phase of its development associated with the formation of the information society. Issues of formation and development of the global information society are in the focus of world politics. In its turn, the information space is closely connected with world geopolitical processes, as the struggle of geopolitical actors to achieve information superiority is becoming the main direction of modern geopolitical competition.The information factor is playing an increasingly important role in the political upheavals and conflicts that are emerging in different parts of the world. Crises in modern society are diverse and can affect everyone without exception. Crises such as political and military, economic and financial, social and ethical, ecological and energy, etc. occur most often and are well studied. The entry of modern society into the information phase of its development has created the conditions for the emergence of social crises associated with the information sphere of human life. The information spheres of society and the state are closely interconnected. The process of their interaction and merging goes on intensively. Today we can observe a pronounced manifestation of information and political crises both in the domestic life of individual states and in the world political arena as a whole.
维护安全的问题在整个世界历史上都是相关的。这项任务与今天息息相关。确保乌克兰的国家安全是一个复杂而多方面的过程。在新的地缘政治环境中,这项任务的复杂性增加了。当今世界,地缘政治矛盾增多,国家间竞争加剧。这些进程是在信息社会的形成使人类进入新的发展阶段的背景下发生的。全球信息社会的形成和发展问题是当今世界政治关注的焦点。信息空间又与世界地缘政治进程密切相关,地缘政治行动者为获取信息优势而进行的斗争正成为现代地缘政治竞争的主要方向。信息因素在世界不同地区出现的政治动荡和冲突中发挥着越来越重要的作用。现代社会的危机是多种多样的,无一例外地会影响到每个人。政治和军事、经济和金融、社会和伦理、生态和能源等危机最常发生,也得到了很好的研究。现代社会进入信息化发展阶段,为与人类生活信息领域相关的社会危机的出现创造了条件。社会和国家的信息领域是紧密相连的。它们相互作用和融合的过程持续不断。今天,我们可以在个别国家的国内生活和整个世界政治舞台上观察到信息和政治危机的明显表现。
{"title":"Informational Dimension of Ukrainian National Security Policy in the Conditions of Modern Geopolitic Competition","authors":"V. Kozma","doi":"10.51369/2707-7276-2021-(1-3)-10","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-10","url":null,"abstract":"The problem of maintaining security has been relevant throughout world history. This task is relevant today. Ensuring Ukraine’s national security is a complex and multidimensional process. The complexity of this task increases when considering it in the new geopolitical environment. In the modern world, contradictions of a geopolitical nature are growing, and competition between countries is intensifying. These processes take place against the background of the humanity entering a new phase of its development associated with the formation of the information society. Issues of formation and development of the global information society are in the focus of world politics. In its turn, the information space is closely connected with world geopolitical processes, as the struggle of geopolitical actors to achieve information superiority is becoming the main direction of modern geopolitical competition.\u0000The information factor is playing an increasingly important role in the political upheavals and conflicts that are emerging in different parts of the world. Crises in modern society are diverse and can affect everyone without exception. Crises such as political and military, economic and financial, social and ethical, ecological and energy, etc. occur most often and are well studied. The entry of modern society into the information phase of its development has created the conditions for the emergence of social crises associated with the information sphere of human life. The information spheres of society and the state are closely interconnected. The process of their interaction and merging goes on intensively. Today we can observe a pronounced manifestation of information and political crises both in the domestic life of individual states and in the world political arena as a whole.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International-Legal Approaches and National-Legal Regulation of Counteraction to Misinformation 反虚假信息的国际法律途径与国家法律规制
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-7
A. Marushchak
The article analyzes some aspects pertaining to the issues of counteraction to misinformation. The subject of the study encompasses the relations arising in the field of international-legal and national-legal regulation of this activity. In March 2021, the Center for Counteracting Disinformation was established in Ukraine. Its development under the influence of threats to the state’s information security requires a detailed analysis of theoretical and legal foundations of countering disinformation, taking into account the fundamental principles of freedom of thought and speech. The aim of the article is to reveal international legal approaches and national legal regulation of countering disinformation. Theoretical methods of analysis, synthesis and comparison were used in the process of research. In particular, the work provided an analysis of international law, as well as the European Union initiatives aimed at combating misinformation. The comparative-legal method was used in conducting a comparative study of international and Ukrainian legislation. The article presents the outcomes of the analysis of the empirical basis of the study, namely: international law and domestic regulations of Ukraine, research works, etc. The methodological approach to the study of international legal issues and national legal regulation of countering disinformation is based on the fundamental principles of freedom of thought and speech and their mandatory consideration in the development of a new legislation. The research reveals the presence of several groups of government experts within the UN system who focused on studying the issues related to cyber operations, the use of ICT that contradicts the norms of a responsible behavior of states. They proved that the issue of countering misinformation had not yet been resolved. On the basis of the Tallinn Handbook 2.0 analysis, the author concluded that the interference in the spheres of elections, health care system and other areas pertaining to state sovereignty through disinformation operations could be interpreted as contrary to the international law provisions.
文章分析了与虚假信息对抗问题有关的几个方面。这项研究的主题包括在国际法律和国家法律管理这一活动方面所产生的关系。2021年3月,乌克兰成立了反虚假信息中心。在国家信息安全受到威胁的影响下,它的发展需要对打击虚假信息的理论和法律基础进行详细分析,同时考虑到思想和言论自由的基本原则。本文的目的是揭示反虚假信息的国际法律途径和国家法律规制。在研究过程中采用了分析、综合、比较的理论方法。特别是,这项工作分析了国际法以及欧洲联盟旨在打击虚假信息的倡议。在对国际和乌克兰立法进行比较研究时使用了比较法方法。文章介绍了研究成果的实证分析基础,即:乌克兰的国际法和国内法规、研究成果等。研究国际法律问题和打击虚假信息的国家法律规定的方法方法是基于思想和言论自由的基本原则以及在制定新立法时必须考虑这些原则。该研究显示,联合国系统内存在几个政府专家小组,他们专注于研究与网络操作相关的问题,以及与负责任的国家行为规范相矛盾的信息通信技术的使用。他们证明,打击虚假信息的问题尚未得到解决。根据《塔林手册2.0》的分析,发件人的结论是,通过虚假信息行动干预选举、医疗保健系统和其他涉及国家主权的领域可以被解释为违反国际法规定。
{"title":"International-Legal Approaches and National-Legal Regulation of Counteraction to Misinformation","authors":"A. Marushchak","doi":"10.51369/2707-7276-2021-(1-3)-7","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-7","url":null,"abstract":"The article analyzes some aspects pertaining to the issues of counteraction to misinformation. The subject of the study encompasses the relations arising in the field of international-legal and national-legal regulation of this activity. In March 2021, the Center for Counteracting Disinformation was established in Ukraine. Its development under the influence of threats to the state’s information security requires a detailed analysis of theoretical and legal foundations of countering disinformation, taking into account the fundamental principles of freedom of thought and speech. \u0000The aim of the article is to reveal international legal approaches and national legal regulation of countering disinformation. \u0000Theoretical methods of analysis, synthesis and comparison were used in the process of research. In particular, the work provided an analysis of international law, as well as the European Union initiatives aimed at combating misinformation. The comparative-legal method was used in conducting a comparative study of international and Ukrainian legislation. The article presents the outcomes of the analysis of the empirical basis of the study, namely: international law and domestic regulations of Ukraine, research works, etc. \u0000The methodological approach to the study of international legal issues and national legal regulation of countering disinformation is based on the fundamental principles of freedom of thought and speech and their mandatory consideration in the development of a new legislation. \u0000The research reveals the presence of several groups of government experts within the UN system who focused on studying the issues related to cyber operations, the use of ICT that contradicts the norms of a responsible behavior of states. They proved that the issue of countering misinformation had not yet been resolved. On the basis of the Tallinn Handbook 2.0 analysis, the author concluded that the interference in the spheres of elections, health care system and other areas pertaining to state sovereignty through disinformation operations could be interpreted as contrary to the international law provisions.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directions and Prospects of Interaction of the Security Service of Ukraine With the ember-Countries of the Guam Organization in the Sphere of Ensuring Cyber Security and Countering Cyber Threats 乌克兰安全部门与关岛组织成员国在确保网络安全和打击网络威胁领域互动的方向和前景
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-6
Larisa Komarova, O. Tkachenko
Analysis of cyberattacks on the critical information infrastructure of Ukraine, and the fact of its increased complexity and more sophisticated relevant tools show the engagement of unfriendly countries, especially such as the Russian Federation, in destructive activities in Ukrainian cyberspace: in fact, Ukraine has become a testing ground for new cyber weapons and malicious strategies.Considering the cross-border nature of modern cyber threats and the priority of the Euro-Atlantic course of our country, an important vector of the activities of the Security Service of Ukraine has been to establish effective cooperation with international partners in combating cyber terrorism and hybrid aggression in cyberspace.Having this in mind the Security Service of Ukraine has established and maintained a high level of cooperation with intelligence services and law enforcement agencies in Europe, Asia and North America, as well as with key international organizations such as NATO, the OSCE, the Council of Europe, the UNO, the GUAM and others.At the same time, the Security Service of Ukraine has recently taken a proactive role as an initiator of innovations in the field of regional and international cybersecurity in relevant organizations.The issues of international cooperation of the Security Service of Ukraine in the field of cybersecurity within the framework of international and regional organizations were examined by such Ukrainian experts as V. Petrov, V. Khlevytsky, S. Bondarenko, O. Klimchuk, S. Petrov, N. Tkachuk, D. Melnyk and others.At the same time, these works, according to the authors’ opinion, do not reveal the features of international cooperation between the Security Service of Ukraine and the relevant special and law enforcement agencies of the Organization for Democracy and Economic Development GUAM in the field of cybersecurity and countering cyber threats.Given that Ukraine has recently been the object of cyberattacks, the sources of which originate from the Russian Federation, the establishment of the GUAM Regional Cybersecurity Center in Ukraine will help to strengthen the cyber security capacity of GUAM member countries.Moreover, the operation of this centre in our country, taking into account existing strong international contacts of Ukraine with NATO, EU, Council of Europe, OSCE, will help to create additional mechanisms for GUAM member states to exchange best world practices in cybersecurity as well as combating cybercrime, to increase the level of expertise of GUAM member states’ experts in these fields and to help improve the Organization’s image on the international arena.In this regard the Security Service of Ukraine should support the possible deployment of the technological component of the Center on the basis of the GUAM Secretariat in Ukraine, with the purpose of establishing the educational processes, information exchange, as well as remote access of relevant state bodies of GUAM member states. The provision of cor
对乌克兰关键信息基础设施的网络攻击的分析,以及其日益复杂和更复杂的相关工具的事实表明,不友好国家,特别是俄罗斯联邦,参与了乌克兰网络空间的破坏性活动:事实上,乌克兰已成为新型网络武器和恶意战略的试验场。考虑到现代网络威胁的跨国界性质和我国欧洲-大西洋进程的优先事项,乌克兰安全局活动的一个重要方向是与国际伙伴在打击网络恐怖主义和网络空间混合侵略方面建立有效合作。考虑到这一点,乌克兰安全局与欧洲、亚洲和北美的情报部门和执法机构以及北约组织、欧安组织、欧洲理事会、联合国、古阿姆集团等主要国际组织建立并保持了高度合作。与此同时,乌克兰安全局最近在相关组织中作为区域和国际网络安全领域创新的发起者发挥了积极作用。乌克兰安全部门在国际和地区组织框架内的网络安全领域国际合作问题由V. Petrov、V. Khlevytsky、S. Bondarenko、O. Klimchuk、S. Petrov、N. Tkachuk、D. Melnyk等乌克兰专家进行了审查。与此同时,根据作者的观点,这些作品并未揭示乌克兰安全局与民主和经济发展组织古阿姆在网络安全和应对网络威胁领域的相关特别和执法机构之间的国际合作特征。鉴于乌克兰最近受到来自俄罗斯联邦的网络攻击,在乌克兰建立古阿姆集团区域网络安全中心将有助于加强古阿姆集团成员国的网络安全能力。此外,考虑到乌克兰与北约、欧盟、欧洲委员会、欧安组织现有的密切国际联系,该中心在我国的运作将有助于为古阿姆集团成员国建立新的机制,以交流网络安全和打击网络犯罪方面的最佳世界做法,提高古阿姆集团成员国专家在这些领域的专业知识水平,并帮助改善本组织在国际舞台上的形象。在这方面,乌克兰安全局应支持可能在乌克兰古阿姆秘书处的基础上部署该中心的技术部分,目的是建立教育进程、信息交流以及古阿姆集团成员国有关国家机构的远程访问。未来中心的核心资金的提供应在古阿姆集团与美国、日本、欧盟等的国际合作框架内制定。
{"title":"Directions and Prospects of Interaction of the Security Service of Ukraine With the ember-Countries of the Guam Organization in the Sphere of Ensuring Cyber Security \u0000and Countering Cyber Threats","authors":"Larisa Komarova, O. Tkachenko","doi":"10.51369/2707-7276-2021-(1-3)-6","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-6","url":null,"abstract":"Analysis of cyberattacks on the critical information infrastructure of Ukraine, and the fact of its increased complexity and more sophisticated relevant tools show the engagement of unfriendly countries, especially such as the Russian Federation, in destructive activities in Ukrainian cyberspace: in fact, Ukraine has become a testing ground for new cyber weapons and malicious strategies.\u0000Considering the cross-border nature of modern cyber threats and the priority of the Euro-Atlantic course of our country, an important vector of the activities of the Security Service of Ukraine has been to establish effective cooperation with international partners in combating cyber terrorism and hybrid aggression in cyberspace.\u0000Having this in mind the Security Service of Ukraine has established and maintained a high level of cooperation with intelligence services and law enforcement agencies in Europe, Asia and North America, as well as with key international organizations such as NATO, the OSCE, the Council of Europe, the UNO, the GUAM and others.\u0000At the same time, the Security Service of Ukraine has recently taken a proactive role as an initiator of innovations in the field of regional and international cybersecurity in relevant organizations.\u0000The issues of international cooperation of the Security Service of Ukraine in the field of cybersecurity within the framework of international and regional organizations were examined by such Ukrainian experts as V. Petrov, V. Khlevytsky, S. Bondarenko, O. Klimchuk, S. Petrov, N. Tkachuk, D. Melnyk and others.\u0000At the same time, these works, according to the authors’ opinion, do not reveal the features of international cooperation between the Security Service of Ukraine and the relevant special and law enforcement agencies of the Organization for Democracy and Economic Development GUAM in the field of cybersecurity and countering cyber threats.\u0000Given that Ukraine has recently been the object of cyberattacks, the sources of which originate from the Russian Federation, the establishment of the GUAM Regional Cybersecurity Center in Ukraine will help to strengthen the cyber security capacity of GUAM member countries.\u0000Moreover, the operation of this centre in our country, taking into account existing strong international contacts of Ukraine with NATO, EU, Council of Europe, OSCE, will help to create additional mechanisms for GUAM member states to exchange best world practices in cybersecurity as well as combating cybercrime, to increase the level of expertise of GUAM member states’ experts in these fields and to help improve the Organization’s image on the international arena.\u0000In this regard the Security Service of Ukraine should support the possible deployment of the technological component of the Center on the basis of the GUAM Secretariat in Ukraine, with the purpose of establishing the educational processes, information exchange, as well as remote access of relevant state bodies of GUAM member states. The provision of cor","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Special Knowledge in the Field of Forensic Computer-Technical Expert xamination in the Pre-Trial Investigation of Crimes Against the Foundations of National Security 在危害国家安全基础犯罪的审前侦查中运用法医计算机技术专家鉴定领域的专业知识
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-13
Iryna Ноra
In modern legal proceedings, the use of various forms of forensic expert exami-nation is important. The article analyzes the current state of forensic computer-technical expert examination and the cur-rent forensic expert practice in this area, considers the issue of the need for spe-cial knowledge to conduct this type of examinations. It is substantiated that fo-rensic computer-technical expert exami-nation is an independent type of forensic expert examination and belongs to the class of engineering and technical exam-ination. The definitions of the object, the subject of computer-technical examina-tion are presented, typical tasks are for-mulated. The issues, faced by the experts when assigning forensic computer-technical examinations for the study of new computer objects are considered. Determination of the expert’s assignment and the formulation of questions are considered as an important stage in the planning of an examination, on which the correct choice of research methodol-ogy depends. With the development of information technologies, investigators are interested in new objects for which it is necessary to prepare individual meth-odological recommendations, manuals for determining the sequence of conduct-ing various types of examinations. It has been substantiated that the conclusions of forensic experts on computer-technical examination are of great evi-dentiary value. They make it possible to: decipher the encoded information; find information that was considered missing, lost or destroyed; restore the mecha¬nism of a criminal event based on information traces.
在现代法律诉讼中,利用各种形式的法医鉴定是很重要的。文章分析了司法计算机技术鉴定的现状和司法专家在这一领域的实践现状,思考了开展这类鉴定需要具备专业知识的问题。证明了计算机鉴证鉴定是一种独立的鉴证鉴定类型,属于工程技术鉴定范畴。对计算机技术考试的对象、科目进行了界定,并对典型的考试任务进行了阐述。审议了专家在为研究新的计算机对象指派法医计算机技术检查时所面临的问题。确定专家的任务和制定问题被认为是计划考试的重要阶段,正确选择研究方法取决于此。随着信息技术的发展,调查人员对新的对象感兴趣,因此有必要编写个人的方法建议,手册,以确定进行各种类型的检查的顺序。事实证明,法医专家的计算机技术鉴定结论具有重要的证据价值。它们使破译编码信息成为可能;查找被认为丢失、丢失或毁坏的信息;基于信息痕迹还原犯罪事件发生机制。
{"title":"Use of Special Knowledge in the Field of Forensic Computer-Technical Expert xamination in the Pre-Trial Investigation of Crimes Against the Foundations of National Security","authors":"Iryna Ноra","doi":"10.51369/2707-7276-2021-(1-3)-13","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-13","url":null,"abstract":"In modern legal proceedings, the use of various forms of forensic expert exami-nation is important. The article analyzes the current state of forensic computer-technical expert examination and the cur-rent forensic expert practice in this area, considers the issue of the need for spe-cial knowledge to conduct this type of examinations. It is substantiated that fo-rensic computer-technical expert exami-nation is an independent type of forensic expert examination and belongs to the class of engineering and technical exam-ination. The definitions of the object, the subject of computer-technical examina-tion are presented, typical tasks are for-mulated. The issues, faced by the experts when assigning forensic computer-technical examinations for the study of new computer objects are considered. Determination of the expert’s assignment and the formulation of questions are considered as an important stage in the planning of an examination, on which the correct choice of research methodol-ogy depends. With the development of information technologies, investigators are interested in new objects for which it is necessary to prepare individual meth-odological recommendations, manuals for determining the sequence of conduct-ing various types of examinations. It has been substantiated that the conclusions of forensic experts on computer-technical examination are of great evi-dentiary value. They make it possible to: decipher the encoded information; find information that was considered missing, lost or destroyed; restore the mecha¬nism of a criminal event based on information traces.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability of the Russian Expansionist Ideology: a Global Comparative Dimension 俄罗斯扩张主义意识形态的稳定性:一个全球比较维度
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-5
O. Ivanov
The article analyzes the factors that led to the fall of colonial regimes in the world leading countries of the world in different historical periods and in this context clarifies the reasons for the preservation of aggressive features pertaining to the current foreign policy of the Russian Federation. The aim of the article is to identify the reasons for the stability of the Russian expansionist ideology by means of historical and comparative analyses. The dynamic development of the system of international relations at different stages of historical development has proved the inviability of large colonial empires and the incompliance of expansionist means of implementing the geopolitical course of a state to the values of a civilized world. However, the Russian Federation continues to resort to them more actively, getting successfully adapted to emerging world realities and doing harm at the same time to the national interests of a number of independent states, including Ukraine. On analyzing the processes of the fall of colonial empires in England, Spain and Portugal, France and Japan, as well as the decline of expansion provide by the United States, the research proves that the occurrence of these events was caused by objective factors of development of a number of states and their inconsistency at the same time with the tendencies of further democratic and economic development. It has as well been proved by the author that all the tendencies of economic or political modernization, which are favorable for all other countries of the world, do not agree with the guarantees of an unhindered development provided by the Russian Federation nowadays. Particular attention has been paid to the historical origins of the “Russian world (“Russkii mir”)” ideology, its relationship with the ancient Roman concept of “Pax Romana”. There are some additional arguments presented in the research that prove the artificiality of the basic postulates of state Russia’s ideology.
本文分析了导致不同历史时期世界主要国家殖民政权垮台的因素,并在此背景下澄清了俄罗斯联邦目前外交政策中保留侵略特征的原因。本文的目的是通过历史分析和比较分析,找出俄罗斯扩张主义意识形态稳定的原因。国际关系体系在不同历史发展阶段的动态发展已经证明,大型殖民帝国是不可能存在的,一个国家在实施地缘政治方针时采用的扩张主义手段是不符合文明世界价值观的。然而,俄罗斯联邦继续更加积极地诉诸这些手段,成功地适应了正在出现的世界现实,同时损害了包括乌克兰在内的一些独立国家的国家利益。通过分析英国、西班牙、葡萄牙、法国、日本等殖民帝国的衰亡过程,以及美国提供的扩张衰落过程,证明了这些事件的发生是由一些国家自身发展的客观因素以及与进一步民主和经济发展的趋势不一致所造成的。作者还证明,经济或政治现代化的所有趋势,虽然对世界上所有其他国家都是有利的,但与俄罗斯联邦今天所提供的不受阻碍的发展的保证并不一致。特别注意“俄罗斯世界”意识形态的历史起源,以及它与古罗马“罗马和平”概念的关系。研究中还提出了一些额外的论点,证明了国家俄罗斯意识形态的基本假设是人为的。
{"title":"Stability of the Russian Expansionist Ideology: a Global Comparative Dimension","authors":"O. Ivanov","doi":"10.51369/2707-7276-2021-(1-3)-5","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-5","url":null,"abstract":"The article analyzes the factors that led to the fall of colonial regimes in the world leading countries of the world in different historical periods and in this context clarifies the reasons for the preservation of aggressive features pertaining to the current foreign policy of the Russian Federation. \u0000The aim of the article is to identify the reasons for the stability of the Russian expansionist ideology by means of historical and comparative analyses. The dynamic development of the system of international relations at different stages of historical development has proved the inviability of large colonial empires and the incompliance of expansionist means of implementing the geopolitical course of a state to the values of a civilized world. However, the Russian Federation continues to resort to them more actively, getting successfully adapted to emerging world realities and doing harm at the same time to the national interests of a number of independent states, including Ukraine. \u0000On analyzing the processes of the fall of colonial empires in England, Spain and Portugal, France and Japan, as well as the decline of expansion provide by the United States, the research proves that the occurrence of these events was caused by objective factors of development of a number of states and their inconsistency at the same time with the tendencies of further democratic and economic development. It has as well been proved by the author that all the tendencies of economic or political modernization, which are favorable for all other countries of the world, do not agree with the guarantees of an unhindered development provided by the Russian Federation nowadays. \u0000Particular attention has been paid to the historical origins of the “Russian world (“Russkii mir”)” ideology, its relationship with the ancient Roman concept of “Pax Romana”. There are some additional arguments presented in the research that prove the artificiality of the basic postulates of state Russia’s ideology.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction 当前在信息领域对乌克兰国家安全的威胁:识别和应对问题
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-2
D. Melnyk
The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in other vitally important spheres. Therefore, their content and forms of manifestation should be borne on mind to effectively counteract their emergence and localization. Under current conditions, the information security of Ukraine directly depends on the high-quality management of the system of countering threats to the national security in the information sphere and effective protection of national interests under the guidance of authorized entities.One of the state’s primary tasks for today is the creation and development of a stably functioning mechanism to ensure the national security of Ukraine in the field of information for the counteraction to existing threats and prevention of potential ones. The efficiency of such a counteraction depends on the authorized bodies’ capabilities to timely and accurately detect the threats to the national security in the field of information, recognize and point out their sources, influence them in order to prevent offensive and harmful consequences.The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in ot
文章在分析现行理论和规范性法律文件的基础上,分析了当前乌克兰国家安全在信息领域面临的威胁。考虑到乌克兰立法分析的结果和一些科学研究,作者得出结论,缺乏统一的方法来确定和理解“信息领域对乌克兰国家安全的威胁”的类别,这有时被解释为对信息安全的威胁,网络威胁等。乌克兰在信息领域对国家安全的威胁被视为决定性因素,产生了一些负面现象,这些现象可能影响到相关领域的国家安全和利益,以及整个国家信息空间的组织和运作。对乌克兰国家安全的这种威胁可能具有国家或国际意义,与其他至关重要领域的风险和挑战有关。因此,要注意它们的表现内容和表现形式,有效应对它们的出现和本土化。在当前条件下,乌克兰的信息安全直接取决于在授权实体的指导下,应对信息领域国家安全威胁系统的高质量管理和对国家利益的有效保护。国家目前的主要任务之一是建立和发展一个稳定运作的机制,以确保乌克兰在信息领域的国家安全,以对抗现有威胁和预防潜在威胁。这种对抗的效率取决于授权机构是否有能力及时和准确地发现信息领域对国家安全的威胁,识别和指出其来源,并对其施加影响,以防止攻击性和有害后果。文章在分析现行理论和规范性法律文件的基础上,分析了当前乌克兰国家安全在信息领域面临的威胁。考虑到乌克兰立法分析的结果和一些科学研究,作者得出结论,缺乏统一的方法来确定和理解“信息领域对乌克兰国家安全的威胁”的类别,这有时被解释为对信息安全的威胁,网络威胁等。乌克兰在信息领域对国家安全的威胁被视为决定性因素,产生了一些负面现象,这些现象可能影响到相关领域的国家安全和利益,以及整个国家信息空间的组织和运作。对乌克兰国家安全的这种威胁可能具有国家或国际意义,与其他至关重要领域的风险和挑战有关。因此,要注意它们的表现内容和表现形式,有效应对它们的出现和本土化。在当前条件下,乌克兰的信息安全直接取决于在授权实体的指导下,应对信息领域国家安全威胁系统的高质量管理和对国家利益的有效保护。国家目前的主要任务之一是建立和发展一个稳定运作的机制,以确保乌克兰在信息领域的国家安全,以对抗现有威胁和预防潜在威胁。这种对抗的效率取决于授权机构是否有能力及时和准确地发现信息领域对国家安全的威胁,识别和指出其来源,并对其施加影响,以防止攻击性和有害后果。
{"title":"Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction","authors":"D. Melnyk","doi":"10.51369/2707-7276-2021-(1-3)-2","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-2","url":null,"abstract":"The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in other vitally important spheres. Therefore, their content and forms of manifestation should be borne on mind to effectively counteract their emergence and localization. \u0000Under current conditions, the information security of Ukraine directly depends on the high-quality management of the system of countering threats to the national security in the information sphere and effective protection of national interests under the guidance of authorized entities.\u0000One of the state’s primary tasks for today is the creation and development of a stably functioning mechanism to ensure the national security of Ukraine in the field of information for the counteraction to existing threats and prevention of potential ones. \u0000The efficiency of such a counteraction depends on the authorized bodies’ capabilities to timely and accurately detect the threats to the national security in the field of information, recognize and point out their sources, influence them in order to prevent offensive and harmful consequences.\u0000The article analyzes current threats to the national security of Ukraine in the field of information on the basis of the analysis of the present doctrine and normative-legal documents. Considering the results of the Ukrainian legislation analysis and a number of scientific researches the author concludes about the absence of a unified approach to determine and comprehend the category of a “threat to the national security of Ukraine in the field of information”, that is sometimes interpreted as a threat to information security, cyber threat, etc. The threats to the national security in the field of information of Ukraine are viewed as determining factors, generating a number of negative phenomena that can affect the national security and interests in related sphere, organization and functioning of the national information space on the whole. Such threats to Ukraine’s national security can be both of the national or international significance, related to the risks and challenges in ot","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Countering Informational Influences of the Russian Federation: National Experience 抵制俄罗斯联邦的信息影响:国家经验
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-4
Vitaly Khodanovych
The urgency of the chosen issue is due to the fact that since the beginning of the hybrid aggression in 2014, the domestic information space has been subject to various interventions from Russia: from biased Russian media coverage of events in Ukraine to outright lies from the Russian authorities. At the same time, such attention to our state by Russia has led to the formation in Ukrainian society of a certain level of resistance to hostile information influences and the acquisition by domestic state and public institutions, as well as scientific circles of unique experience in countering Russia in this area. The methods of counteraction developed so far are quite diverse in nature, and therefore require critical evaluation in order to improve the foundations of information security of both Ukraine and the world democratic community.The purpose of this article is to assess the state of information security of the nation and to determine further directions for its improvement on the basis of a retrospective analysis of the process of counteracting Russian information influences on Ukrainian society and the state.Reflective approach was chosen as the main one to study the national experience of counteracting the information influences of the Russian Federation, as it provides an opportunity to comprehend Ukraine's experience as a purposeful and organized process of strengthening the resilience of domestic state and public institutions to clearly planned multilevel aggression and creation of the foundations for the development of own information space.A comparison of main information operations of the Russian Federation targeting Ukraine, of the described in the article stages of Russian aggression with the measures taken by the Ukrainian state and society gives an opportunity to allege that the crisis stage in the information struggle and the formation of domestic sovereign information space as a phenomenon is over. So, if at the early stages of information aggression the Kremlin relied on the attractiveness of its civilizational concepts, such as "Russian World" or "Moscow - Third Rome", which should have led to Russia's victory by "soft power", today we observe the change of course towards cluster influences, tendencies (problems in the Ukrainian energy sector, "anti-vaccination" campaigns, etc.) aimed at destabilizing the domestic political situation in the country and bringing discord in relations with foreign partners. Currently, the information campaigns of the Russian Federation from an individual phenomenon (operational line of hybrid war) have been transformed into secondary (service) tool of other areas of aggression: military, economic, etc.Under the difficult conditions of multifaceted opposition to the aggressor, Ukraine managed to create a basis for the development of its own information space and its protection from unfriendly influences not only of Russia but also of other potentially interested geopolitical actors. At the same
选择这个问题的紧迫性是由于这样一个事实,即自2014年混合侵略开始以来,国内信息空间一直受到俄罗斯的各种干预:从俄罗斯媒体对乌克兰事件的有偏见的报道到俄罗斯当局的彻头彻尾的谎言。同时,俄罗斯对我们国家的这种关注导致乌克兰社会对敌对信息影响形成了一定程度的抵抗,国内国家和公共机构以及科学界获得了在这一领域对抗俄罗斯的独特经验。迄今为止制定的对抗方法在性质上相当多样化,因此需要进行批判性评价,以便改善乌克兰和世界民主社会的信息安全基础。本文的目的是评估国家的信息安全状况,并在回顾分析对抗俄罗斯信息对乌克兰社会和国家影响的过程的基础上,确定进一步的改进方向。选择反思方法作为研究抵制俄罗斯联邦信息影响的国家经验的主要方法,因为它提供了一个机会,可以理解乌克兰的经验是一个有目的和有组织的过程,旨在加强国内国家和公共机构对明确规划的多层次侵略的抵御能力,并为发展自己的信息空间奠定基础。将俄罗斯针对乌克兰的主要信息行动与文章中描述的俄罗斯侵略阶段与乌克兰国家和社会采取的措施进行比较,可以断言,信息斗争的危机阶段和国内主权信息空间的形成作为一种现象已经结束。因此,如果说在信息侵略的早期阶段,克里姆林宫依赖于其文明概念的吸引力,如“俄罗斯世界”或“莫斯科-第三罗马”,这些概念本应通过“软实力”导致俄罗斯的胜利,那么今天,我们观察到朝着集群影响、趋势(乌克兰能源部门的问题、“反疫苗”运动、等),目的是破坏国内政治局势的稳定,挑拨与外国伙伴的关系。目前,俄罗斯联邦的信息战已经从单个现象(混合战争的作战路线)转变为其他侵略领域的次要(服务)工具:在多方面反对侵略者的困难条件下,乌克兰设法为发展自己的信息空间和保护自己免受不友好的影响奠定了基础,这些影响不仅来自俄罗斯,也来自其他可能感兴趣的地缘政治参与者。与此同时,国家和社会都需要把重点放在进一步发展自己的对抗体系上——完善现有立法,建立适当的制度,为使用适当的、可能不对称的手段对抗俄罗斯形成科学和方法论的基础。
{"title":"Countering Informational Influences of the Russian Federation: National Experience","authors":"Vitaly Khodanovych","doi":"10.51369/2707-7276-2021-(1-3)-4","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-4","url":null,"abstract":"The urgency of the chosen issue is due to the fact that since the beginning of the hybrid aggression in 2014, the domestic information space has been subject to various interventions from Russia: from biased Russian media coverage of events in Ukraine to outright lies from the Russian authorities. At the same time, such attention to our state by Russia has led to the formation in Ukrainian society of a certain level of resistance to hostile information influences and the acquisition by domestic state and public institutions, as well as scientific circles of unique experience in countering Russia in this area. The methods of counteraction developed so far are quite diverse in nature, and therefore require critical evaluation in order to improve the foundations of information security of both Ukraine and the world democratic community.\u0000The purpose of this article is to assess the state of information security of the nation and to determine further directions for its improvement on the basis of a retrospective analysis of the process of counteracting Russian information influences on Ukrainian society and the state.\u0000Reflective approach was chosen as the main one to study the national experience of counteracting the information influences of the Russian Federation, as it provides an opportunity to comprehend Ukraine's experience as a purposeful and organized process of strengthening the resilience of domestic state and public institutions to clearly planned multilevel aggression and creation of the foundations for the development of own information space.\u0000A comparison of main information operations of the Russian Federation targeting Ukraine, of the described in the article stages of Russian aggression with the measures taken by the Ukrainian state and society gives an opportunity to allege that the crisis stage in the information struggle and the formation of domestic sovereign information space as a phenomenon is over. So, if at the early stages of information aggression the Kremlin relied on the attractiveness of its civilizational concepts, such as \"Russian World\" or \"Moscow - Third Rome\", which should have led to Russia's victory by \"soft power\", today we observe the change of course towards cluster influences, tendencies (problems in the Ukrainian energy sector, \"anti-vaccination\" campaigns, etc.) aimed at destabilizing the domestic political situation in the country and bringing discord in relations with foreign partners. Currently, the information campaigns of the Russian Federation from an individual phenomenon (operational line of hybrid war) have been transformed into secondary (service) tool of other areas of aggression: military, economic, etc.\u0000Under the difficult conditions of multifaceted opposition to the aggressor, Ukraine managed to create a basis for the development of its own information space and its protection from unfriendly influences not only of Russia but also of other potentially interested geopolitical actors. At the same ","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security of Ukraine in the Context of National Security 国家安全背景下的乌克兰信息安全
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-9
Sergiy Knyazev
The article considers issues related to the study of modern views and features of the regulatory framework of information security of Ukraine in the context of information security.It is noted that the current actions of the Russian Federation aimed at violating the territorial integrity, destabilization of the situation in Ukraine, which are implemented, including due to the destructive information impact have become a serious challenge for our state.According to the results of the analysis, it is determined that the security of any country comprehensively embodies all important areas of life and development of man, society and the state. Its components are informational, intellectual, political, military, economic, environmental and other factors. The place and role, as well as the priority of each of them are determined by the circumstances that actually develop over a period of time within and around the state.It is proposed to improve the legal and institutional arrangements for the management of State security by:– further development of national security legislation;– development and implementation of national standards and technical regulations for the use of information and communication technologies, harmonized with relevant European standards;– introduction of a nationwide system for determining and monitoring the level of protection of national interests in various spheres of life and taking into account real and potential threats to the information security of the state;– intellectual and personnel and resource support;– bringing legislation on the protection of various types of information with limited access to European standards, etc.
本文考虑了与信息安全背景下乌克兰信息安全监管框架的现代观点和特征研究相关的问题。我们注意到,俄罗斯联邦目前正在实施的旨在侵犯乌克兰领土完整、破坏乌克兰局势稳定的行动,包括破坏性的信息影响,已成为我国面临的严重挑战。根据分析结果确定,任何国家的安全都综合体现了人、社会和国家生活和发展的所有重要领域。其构成因素有信息、智力、政治、军事、经济、环境等因素。它们的位置和作用,以及它们的优先级都是由国家内部和周围一段时间内实际发展的情况决定的。建议通过以下方式改进管理国家安全的法律和体制安排:——进一步发展国家安全立法;——制定和实施信息和通信技术使用的国家标准和技术法规;-引入一个全国性的系统,以确定和监测在生活的各个领域对国家利益的保护水平,并考虑到对国家信息安全的实际和潜在威胁;-智力,人员和资源支持;-立法保护有限获取欧洲标准的各种信息,等等。
{"title":"Information Security of Ukraine in the Context \u0000of National Security","authors":"Sergiy Knyazev","doi":"10.51369/2707-7276-2021-(1-3)-9","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-9","url":null,"abstract":"The article considers issues related to the study of modern views and features of the regulatory framework of information security of Ukraine in the context of information security.\u0000It is noted that the current actions of the Russian Federation aimed at violating the territorial integrity, destabilization of the situation in Ukraine, which are implemented, including due to the destructive information impact have become a serious challenge for our state.\u0000According to the results of the analysis, it is determined that the security of any country comprehensively embodies all important areas of life and development of man, society and the state. Its components are informational, intellectual, political, military, economic, environmental and other factors. The place and role, as well as the priority of each of them are determined by the circumstances that actually develop over a period of time within and around the state.\u0000It is proposed to improve the legal and institutional arrangements for the management of State security by:\u0000– further development of national security legislation;\u0000– development and implementation of national standards and technical regulations for the use of information and communication technologies, harmonized with relevant European standards;\u0000– introduction of a nationwide system for determining and monitoring the level of protection of national interests in various spheres of life and taking into account real and potential threats to the information security of the state;\u0000– intellectual and personnel and resource support;\u0000– bringing legislation on the protection of various types of information with limited access to European standards, etc.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Analysis of Crimes in the Sphere of Information Technologies 信息技术领域犯罪的法医分析
Pub Date : 2021-12-20 DOI: 10.51369/2707-7276-2021-(1-3)-14
Valery Kolesnyk
The article deals with the issues of foren-sic support for preventing commission of crimes in the field of information tech-nology. It is called to attention that alt-hough introduction of modern infor-mation processes in various spheres of government activities, production and public relations has brought positive re-sults, it has also led to an increase in the cases of committing cyber crimes. Cyber crimes are a new phenomenon in general crime, therefore, the development of ad-vanced techniques to combat them is re-quired. In this process, the forensic sci-ence plays an important role, first of all, for the preparation of recommendations on methods for investigating cyber crimes. Forensic analysis of information technology crimes which are called cyber crimes indicates that their investigation is different from the investigation of other crimes. This is largely due to the fact that computer objects can be both means of committing such crimes and objects of criminal encroachment. Information stored on computer media can be per-ceived and evaluated solely by using computer equipment and digital technol-ogy. Without this, it is impossible to iden-tify persons involved in committing a crime and obtain the evidence necessary to solve the crime. To study and evaluate them as sources of evidence, one needs to resort to the help of specialists, com-puter equipment and sophisticated soft-ware. It distinguishes computer objects from other material objects that is why it is necessary to put computer objects into a separate category of sources of evi-dence in forensic science and criminal procedure.
本文论述了信息技术领域预防犯罪的法医支持问题。值得注意的是,尽管在政府活动、生产和公共关系的各个领域引入现代信息流程带来了积极的结果,但它也导致了网络犯罪案件的增加。网络犯罪是一般犯罪中的一种新现象,因此,需要发展先进的技术来打击网络犯罪。在这个过程中,法医学起着重要的作用,首先是为调查网络犯罪的方法提出建议。对被称为网络犯罪的信息技术犯罪的法医分析表明,其调查不同于其他犯罪的调查。这在很大程度上是由于这样一个事实,即计算机对象既可以是实施此类犯罪的手段,也可以是犯罪侵犯的对象。存储在计算机媒体上的信息只能通过使用计算机设备和数字技术来感知和评价。没有这一点,就不可能确定犯罪嫌疑人的身份,也不可能获得破案所必需的证据。为了研究和评估它们作为证据的来源,人们需要求助于专家、计算机设备和复杂软件的帮助。它将计算机对象与其他物质对象区分开来,这就是为什么有必要在法医学和刑事诉讼中将计算机对象纳入单独的证据来源类别。
{"title":"Forensic Analysis of Crimes in the Sphere of Information Technologies","authors":"Valery Kolesnyk","doi":"10.51369/2707-7276-2021-(1-3)-14","DOIUrl":"https://doi.org/10.51369/2707-7276-2021-(1-3)-14","url":null,"abstract":"The article deals with the issues of foren-sic support for preventing commission of crimes in the field of information tech-nology. It is called to attention that alt-hough introduction of modern infor-mation processes in various spheres of government activities, production and public relations has brought positive re-sults, it has also led to an increase in the cases of committing cyber crimes. Cyber crimes are a new phenomenon in general crime, therefore, the development of ad-vanced techniques to combat them is re-quired. In this process, the forensic sci-ence plays an important role, first of all, for the preparation of recommendations on methods for investigating cyber crimes. Forensic analysis of information technology crimes which are called cyber crimes indicates that their investigation is different from the investigation of other crimes. This is largely due to the fact that computer objects can be both means of committing such crimes and objects of criminal encroachment. Information stored on computer media can be per-ceived and evaluated solely by using computer equipment and digital technol-ogy. Without this, it is impossible to iden-tify persons involved in committing a crime and obtain the evidence necessary to solve the crime. To study and evaluate them as sources of evidence, one needs to resort to the help of specialists, com-puter equipment and sophisticated soft-ware. It distinguishes computer objects from other material objects that is why it is necessary to put computer objects into a separate category of sources of evi-dence in forensic science and criminal procedure.","PeriodicalId":133220,"journal":{"name":"Information Security of the Person, Society and State","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Security of the Person, Society and State
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1