Vol. 11 No. 60 (2022)
Articles

Ukrainian policy in the field of information security

Inna Pidbereznykh
Petro Mohyla Black Sea National University, Ukraine.
Bio
Oleg Koval
Taras Shevchenko National University of Kyiv, Ukraine.
Bio
Yevhen Solomin
Uzhhorod National University, Ukraine.
Bio
Vitaliy Kryvoshein
Oles Honchar Dnipro National University, Ukraine.
Bio
Tetyana Plazova
Hetman Petro Sahaidachny National Army Academy, Ukraine.
Bio

Published 2022-12-30

Keywords

  • cybersecurity, fake, information security culture, information influence of Russia, protection of personal data.

How to Cite

Pidbereznykh, I., Koval, O., Solomin, Y., Kryvoshein, V., & Plazova, T. (2022). Ukrainian policy in the field of information security. Amazonia Investiga, 11(60), 206–213. https://doi.org/10.34069/AI/2022.60.12.22

Abstract

The article analyzes the modern challenges of the time, which shape the information security policy of Ukraine. The paper analyzes the approaches to the definition of information security to understand this concept. Conclusions are made that information security is a constant movement, changeable, versatile concept, which cannot be stable. The article studies the information security of Ukraine as a component in the system of international information security. It is established that in the conditions of war, the role of information security of Ukraine in the international community has sharply increased. Ukraine's policy in the sphere of economic security is clearly marked in its legislation and meets the challenges of our time. The article presents a list of the main threats to the information security of the country: threats to independence and sovereignty through hybrid, information warfare by the aggressor state Russia, threats in the systems of the interaction of state bodies, threats related to the media, threats due to the lack of awareness and culture of information security among the population. Conclusions are made that future cases in the field of information security will be related to the elimination of threats. A list of goals for achieving information security is presented.

Downloads

Download data is not yet available.

References

Andersson, A., Hedström, K., & Karlsson, F. (2022). Standardizing information security – a structurational analysis. Information & Management, 59(3), 103623. https://doi.org/10.1016/j.im.2022.103623

Cheng, L., & Bao, R. (2022). Media literacy and national security awareness: The formation of Chinese higher education groups' attitude to the Russia-Ukraine war. Social Sciences & Humanities Open, 6(1), 100373. https://doi.org/10.1016/j.ssaho.2022.100373

Decree of the President of Ukraine No. 685/2021. On Information Security Strategy. of December 28, 2021. https://zakon.rada.gov.ua/laws/show/685/2021#Text

Duan, Q., Xu, Z., Hu, Q., & Luo, S. (2022). Neural variability fingerprint predicts individuals’ information security violation intentions. Fundamental Research, 2(2), 303-310. https://doi.org/10.1016/j.fmre.2021.10.002

European Parliament and Council of the European Union. (2016). General Data Protection Regulation 2016/679. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679

Kaplina, ?. (2022). Prisoner of War: Special Status in the Criminal Proceedings of Ukraine and the Right to Exchange. Access to Justice in Eastern Europe, 4-2(17), 8-24. https://doi.org/10.33327/AJEE-18-5.4-a000438

Krasnozhon, N. (2021). Ukrainian-Latvian communication ties in the conditions of informatization and digitalization of societies (1991-2020). Society. Document. Communication. Society. Document. Communication, 11, 160-185. https://doi.org/10.31470/2518-7600-2021-11-160-185

Kyytsönen, M., Ikonen, J., Aalto, A., & Vehko, T. (2022). The self-assessed information security skills of the Finnish population: A regression analysis. Computers & Security, 118, 102732. https://doi.org/10.1016/j.cose.2022.102732

Nevelska-Hordieieva, O., & Nechytailo, V. (2022). The phenomenon of fake news in the context of information security of the state. Vestnik (Herald) of the Yaroslav the Wise National University. Series: Philosophy, Philosophy of Law, Political Science, Sociology, 1(52). https://doi.org/10.21564/2663-5704.52.250655

Pliekhova, H. A., & Kostikova, M. V. (2022). Modeling and information technology in science, technology, cybersecurity, and education. Actual problems of information security. Proceedings of the All-Ukrainian Scientific and Practical Internet-Conference "Modeling and Information Technologies in Science, Technology, Cyber-security, and Education". Kharkov National Automobile and Road University. http://surl.li/eosaf

Siemko, M. O. (2022). UN normative activities on information security in the military sphere. Legal Scientific Electronic Journal, 8/2022, 580-583. https://doi.org/10.32782/2524-0374/2022-8/132

Shevchuk, L. (2021). Environmental rights of citizens and legal safeguards for their protection: challenges for the future. Futurity Economics & Law, 2(1). https://doi.org/10.57125/FEL.2021.06.25.1

Shopina, I. M. (2022). The concept of information preservation: conceptual approaches to the definition. Scientific and Informational Bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi. Law Series, 13(25). https://doi.org/10.33098/2078-6670.2022.13.25.133-140

Steffen, B., & Patt, A. (2022). A historical turning point? Early evidence on how the Russia-Ukraine war changes public support for clean energy policies, Energy Research & Social Science, 91, 2022, 102758. https://doi.org/10.1016/j.erss.2022.102758

Taherdoost, H. (2022). Cybersecurity vs. Information Security. Procedia Computer Science, 215, 483-487. https://doi.org/10.1016/j.procs.2022.12.050

Tejay, G. P., & Mohammed, Z. A. (2022). Cultivating Security Culture for Information Security Success: A Mixed-Methods Study Based on Anthropological Perspective. Information & Management, 103751. https://doi.org/10.1016/j.im.2022.103751

Toffler, A. (1993). War and Anti-War. N.Y.: Little, Brown and Company, 302 p.

van Daalen, O. (2022). In defense of offense: Information security research under the right to science. Computer Law & Security Review, 46, 105706. https://doi.org/10.1016/j.clsr.2022.105706

Zalievska, I. I., & Udrenas, H. I. (2022). Ukraine's information security in the face of Russian military anger. Law Journal, 20. https://doi.org/10.32850/sulj.2022.1-2.4