Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (1722)Зведений електронний каталог «Правова освіта. Правова культура» (25)
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=КІБЕР$<.>)

Загальна кількість знайденихдокументів : 8
Показані документи с 1 по 8
1.

S98
Yevseiev, S.
    Synergy of building cybersecurity systems [Электронный ресурс] : monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milova, O. Korol, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2021. - 175 p.
Перевод заглавия: Синергія побудови систем кібербезпеки
   Перевод заглавия: Синергія побудови систем кібербезпеки
УДК
РУБ DOI: 10.15587/978-617-7319-31-2

Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Свободных экз. нет

Найти похожие

2.
Nizovtsev, Y. Y..
    Mechanisms of money laundering obtained from cybercrime: the legal aspect [Текст] / Y. Y. Nizovtsev, O. A. Parfylo, O. O. Barabash, S. G. Kyrenko, N. V. Smetanina // Journal of money laundering control. - 2021. - Ранний доступ
   Перевод заглавия: Механізми відмивання грошей, одержаних в результаті кіберзлочинності: правовий аспект
УДК
РУБ DOI: 10.1108/JMLC-02-2021-0015

Аннотация: Purpose: The use of computer technology to commit cyber laundering increases their social danger, creates new ways to commit cyber laundering, causes the masking of traces of cyber laundering and expands the geography of cyber laundering, while eliminating traditional state borders. That is why, the researched problems have a high level of relevance. The purpose of this research is to promote the spread of international standards in the field of combating money laundering, as well as an analysis of the mechanisms of money laundering obtained from cybercrime. Design/methodology/approach: The leading methods that were used in the article for the purpose of conducting research were a number of general scientific methods, such as analysis and synthesis, deduction, induction, forecasting, modeling, analogy and a number of special methods of study and cognition, which include comparative legal, historical legal, formal legal and structural functional methods. Findings: The main results prospects for further research and the applied value of the material. Large-scale cyber laundering of illegal income has long become a global problem that requires a solution from all states of the world, which means that these problems can only be overcome through active interstate cooperation. Originality/value: The article analyzes inter alia the international legislation in the field of money laundering mechanisms obtained from cybercrime and examines the activities of international organizations in this area.

Анотація - 0 байт
Анотація

Найти похожие

3.
Yevseiev, S. .
    Development of a method for assessing forecast of social impact in regional communities [Текст] / S. Yevseiev, Y. Ryabukha, O. Milov, S. Milevskyi, S. Pohasii, Y. Ivanchenko, I. Ivanchenko, Y. Melenti, I. Opirskyy, I. Pasko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P. 30-43
   Перевод заглавия: Розробка методики оцінки прогнозу соціального впливу в регіональних громадах
УДК
РУБ DOI: 10.15587/1729-4061.2021.249313

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст

Найти похожие

4.
Yevseiev, S.
    Development and analysis of gametheoretical models of security systems agents interaction [Текст] / S. Yevseiev, O. Milov, S. Milevskyi, O. Voitko, M. Kasianenko, Y. Melenti, S. Pohasii, H. Stepanov, O. Turinskyi, S. Turinskyi // Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P. 15-29
   Перевод заглавия: Разработка и анализ теоретико-игровых моделей взаимодействия агентов систем безопасности
УДК
ББК З81
РУБ DOI: https://doi.org/10.15587/1729-4061.2020.201418

Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

5.
Vakulyk, O.
    Cybersecurity as a component of the national security of the state [Текст] / O. Vakulyk, P. Petrenko, I. Kuzmenko, M. Pochtovyi, R. Orlovskyi // Journal of Security and Sustainability Issues. - 2020. - Vol. 9, Issue 3. - P. 775-784
   Перевод заглавия: Кибербезопасность как составляющая национальной безопасности государства
УДК
ББК Х621.162
РУБ https://doi.org/10.9770/jssi.2020.9.3(4)

Аннотация: Abstract. The article is devoted to the study of cybersecurity as a component of the national security of the state. It has been established that the development of information and telecommunication technologies testifies to the progress of society but also determines the security risks of their use. In particular, this refers to a cyberattack and other cyberthreats. It has been determined that cybersecurity should be understood as the protection of the vital interests of a person and citizen, society and the state when using cyberspace. An important role in ensuring such a security is played by the cyberthreat protection mechanism, which provides for the development and adoption of a cybersecurity strategy, the creation of a national cybersecurity system, strengthening of the security and defense sector’s capabilities to effectively combat military cyberthreats, cyberterrorism, and ensuring cyberprotection of state electronic information resources and information infrastructure. The existence of the Cybersecurity Strategy of Ukraine and other acts as the legal basis for countering cyberthreats has been noted. In turn, the national cybersecurity system provides for the activities of the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine, and intelligence agencies. In turn, in France, Finland, Germany, the central place in the cybersecurity system belongs to the National Cybersecurity Agency, the National Cybersecurity Center, and the Cyberdefense Center, respectively. Despite Ukraine’s significant steps towards increasing cybersecurity in the state, there is no public-private cooperation in this area. Due to this, authorized entities should establish cooperation with the non-state sector and establish effective institutional and legal instruments for such cooperation. At the same time, the issue of public-private cooperation in the field of cybersecurity is relevant for all states of the world in view of the global nature of existing cyberthreats.

Текст - 0 байт
Текст

Найти похожие

6.
Holovkin, B. M..
    Corruption as a Cybersecurity Threat in the New World Order [Текст] / B. M. Holovkin, O. V. Tavolzhanskyi, O. V. Lysodyed // Connections. - 2021. - Vol. 20, Iss. 2. - P. 75-87
   Перевод заглавия: Корупція як загроза кібербезпеці в новому світовому порядку
УДК
РУБ DOI: 10.11610/Connections.20.2.07

Аннотация: The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cogni-tion. Using the dialectical method, theoretical background, and contempo-rary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a mod-ern understanding of multicultural communication and well-being.

Текст - 0 байт
Текст

Найти похожие

7.
Teremetskyi, V. .
    Combatting Disinformation And Cyber Threats In The European Union And United States: Lessons For Ukraine [Текст] / V. Teremetskyi, K. Tokarieva, I. Dziuba, N. Shelukhin, O. Predmestnikov, U. Parpan // Journal of Legal, Ethical and Regulatory Issues. - 2021. - Vol. 24, Spec. Iss. 1. - P. 1-10
   Перевод заглавия: Боротьба з дезінформацією та кіберзагрозами в Європейському Союзі та США: уроки для України
УДК

Аннотация: The article analyzes the main means of counteracting misinformation, disinformation and cyber threats used by the European and international communities. It is determined that the main challenges of our time, which exacerbate the problem of disinformation, are Russia's information policy and the COVID-19 pandemic. The main institutions and regulations of Europe, which are aimed at overcoming the spread of false information in the media, are analyzed. The experience of France is mentioned, which created a powerful legal mechanism to prevent misinformation and combat its manifestations. The current state of US information security and the effectiveness of the US policy of combating disinformation are described. Special attention is paid to the issues of media and cyber education of the population. The latest trends in the institutionalization of countering misinformation and disinformation in Ukraine and ways to improve the strengthening of information security in the country are studied. It is established that Ukraine, as a direct participant in the information war, is obliged to support and involve at the national level European initiatives to strengthen information security and cyber security. The first steps include updating the legislation on information, increasing the role of information security in national security acts, approving the Strategy for Counteracting Disinformation and the Strategy for Ensuring Information Security, and institutionalizing the fight against misinformation and disinformation.

Текст - 0 байт
Текст

Найти похожие

8.
Ovcharenko, М. О.
    Combating illegal drugs trafficking using the internet by means of the profiling method [Text] / М. О. Ovcharenko, O. V. Tavolzhanskyi, T. M. Radchenko, K. D. Kulyk, N. V. Smetanina // Journal of Advanced Research in Law and Economics. - 2020. - Vol. 11, Iss. 4. - P. 1296-1304
   Перевод заглавия: Противодействие незаконному обороту наркотиков через Интернет с помощью метода профилирования
ББК Х628.322
РУБ DOI: 10.14505/jarle.v11.4(50).26

Аннотация: The paper actualizes the issues of combating drug trafficking using the Internet on the example of Ukraine. Given the significant difference in the approach to this issue among Ukrainian and foreign scientists, this allowed to carry out a multifaceted analysis. The purpose of the article is to conduct a comprehensive study (criminological and forensic) on the use of the Internet in the commission of crimes related to drug trafficking, on the example of Ukraine. Profiling was used as the main method. The novelty of this work is the extrapolation of the method of profiling cybercriminals to persons who commit illicit drug distribution using the Internet in Ukraine as a special category of cybercriminals. The specific objectives of the study are: to study the characteristics of an offender who commits crimes related to drug trafficking via the Internet using the method of profiling; study of typical investigative situations that arise when committing crimes related to drug trafficking on the Internet; development of comprehensive recommendations for combating this group of crimes, taking into account both the identity of an offender and investigative situations that most often arise in practice. Based on the study, the article conducted (using secondary data) profiling of people who distribute drugs using the Internet in Ukraine. The profiling also includes a comprehensive portrait of such a criminal, which includes both socio-demographic and psychological characteristics of this category of criminals, studied their motivation, conducted a study of the victimological aspect and features of the study of evidence in this category of crimes.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст

Найти похожие

 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава