Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Бази даних


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (2041)Зведений електронний каталог «Правова освіта. Правова культура» (25)
Формат представлення знайдених документів :
полный информационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=КІБЕР$<.>)

Загальна кількість знайденихдокументів : 19
Показані документи с 1 по 19
1.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Vakulyk O., Petrenko P., Kuzmenko I., Pochtovyi M., Orlovskyi R.
Заглавие : Cybersecurity as a component of the national security of the state
Место публикации : Journal of Security and Sustainability Issues. - 2020. - Vol. 9, Issue 3. - P.775-784
УДК : 343.34
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): national security--национальная безопасность--національна безпека--cybersecurity--кибер-безопасности--кібер-безпека--cyberdefense--киберзащита--киберзахист--cyberthreats--киберугроз--кіберзагроз--cyberattack--кибератака--кібератака--information--информация--інформація--information infrastructure--информационная инфраструктура--інформаційна інфраструктура
Аннотация: Abstract. The article is devoted to the study of cybersecurity as a component of the national security of the state. It has been established that the development of information and telecommunication technologies testifies to the progress of society but also determines the security risks of their use. In particular, this refers to a cyberattack and other cyberthreats. It has been determined that cybersecurity should be understood as the protection of the vital interests of a person and citizen, society and the state when using cyberspace. An important role in ensuring such a security is played by the cyberthreat protection mechanism, which provides for the development and adoption of a cybersecurity strategy, the creation of a national cybersecurity system, strengthening of the security and defense sector’s capabilities to effectively combat military cyberthreats, cyberterrorism, and ensuring cyberprotection of state electronic information resources and information infrastructure. The existence of the Cybersecurity Strategy of Ukraine and other acts as the legal basis for countering cyberthreats has been noted. In turn, the national cybersecurity system provides for the activities of the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine, and intelligence agencies. In turn, in France, Finland, Germany, the central place in the cybersecurity system belongs to the National Cybersecurity Agency, the National Cybersecurity Center, and the Cyberdefense Center, respectively. Despite Ukraine’s significant steps towards increasing cybersecurity in the state, there is no public-private cooperation in this area. Due to this, authorized entities should establish cooperation with the non-state sector and establish effective institutional and legal instruments for such cooperation. At the same time, the issue of public-private cooperation in the field of cybersecurity is relevant for all states of the world in view of the global nature of existing cyberthreats.
Текст - 0 байт
Текст
Найти похожие
2.

Вид документа : Однотомное издание
Шифр издания :
Автор(ы) : Yevseiev S., Milov O., Milevskyi S., Voitko O., Kasianenko M., Melenti Y., Pohasii S., Stepanov H., Turinskyi O., Faraon S.
Заглавие : Development and analysis of gametheoretical models of security systems agents interaction
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P.15-29
УДК : 007
ББК : З81
Ключевые слова (''Своб.индексиров.''): game theory--теория игры--теорія гри--cybersecurity--кибербезопасность--кібербезпека--stackelberg games--игры штакельберга--ігри штакельберга--nash games--нэш игры--неш ігри--game equilibrium--игровое равновесие--ігрова рівновага--strategy--стратегия--стратегія
Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
Текст - 0 байт
Текст,
Текст - 0 байт
Текст
Найти похожие
3.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Ovcharenko М. О., Tavolzhanskyi O. V., Radchenko Т. М., Kulyk, Kateryna Dmitryevna, Smetanina, Nataliia Volodumurivna
Заглавие : Combating illegal drugs trafficking using the internet by means of the profiling method
Место публикации : Journal of Advanced Research in Law and Economics. - 2020. - Vol. 11, Iss. 4. - P.1296-1304
Примечания : [Припинена індексація в Scopus 18.01.2024]
ББК : Х628.322
Ключевые слова (''Своб.индексиров.''): cybercrime--digital evidence--drug trafficking--victimology--киберпреступность--цифровые доказательства--распространение наркотиков--виктимология--кіберзлочинність--цифрові докази--віктимологія--розповсюдження наркотиків
Аннотация: The paper actualizes the issues of combating drug trafficking using the Internet on the example of Ukraine. Given the significant difference in the approach to this issue among Ukrainian and foreign scientists, this allowed to carry out a multifaceted analysis. The purpose of the article is to conduct a comprehensive study (criminological and forensic) on the use of the Internet in the commission of crimes related to drug trafficking, on the example of Ukraine. Profiling was used as the main method. The novelty of this work is the extrapolation of the method of profiling cybercriminals to persons who commit illicit drug distribution using the Internet in Ukraine as a special category of cybercriminals. The specific objectives of the study are: to study the characteristics of an offender who commits crimes related to drug trafficking via the Internet using the method of profiling; study of typical investigative situations that arise when committing crimes related to drug trafficking on the Internet; development of comprehensive recommendations for combating this group of crimes, taking into account both the identity of an offender and investigative situations that most often arise in practice. Based on the study, the article conducted (using secondary data) profiling of people who distribute drugs using the Internet in Ukraine. The profiling also includes a comprehensive portrait of such a criminal, which includes both socio-demographic and psychological characteristics of this category of criminals, studied their motivation, conducted a study of the victimological aspect and features of the study of evidence in this category of crimes.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
4.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Nizovtsev, Yuriy Yu., Parfylo, Oleg A., Barabash, Olha O., Kyrenko, Sergij G., Smetanina, Nataliia V.
Заглавие : Mechanisms of money laundering obtained from cybercrime: the legal aspect
Место публикации : Journal of money laundering control. - 2021. - С. Ранний доступ
УДК : 343.9
Ключевые слова (''Своб.индексиров.''): відмивання грошей--кіберзлочинність--кіберпростір--міжнародне право--міжнародна злочинність--отмывание денег--киберпреступность--киберпространство (кибернетическое пространство)--cyber laundering--cybercrime--cyberspace--international law--international organizations--money laundering
Аннотация: Purpose: The use of computer technology to commit cyber laundering increases their social danger, creates new ways to commit cyber laundering, causes the masking of traces of cyber laundering and expands the geography of cyber laundering, while eliminating traditional state borders. That is why, the researched problems have a high level of relevance. The purpose of this research is to promote the spread of international standards in the field of combating money laundering, as well as an analysis of the mechanisms of money laundering obtained from cybercrime. Design/methodology/approach: The leading methods that were used in the article for the purpose of conducting research were a number of general scientific methods, such as analysis and synthesis, deduction, induction, forecasting, modeling, analogy and a number of special methods of study and cognition, which include comparative legal, historical legal, formal legal and structural functional methods. Findings: The main results prospects for further research and the applied value of the material. Large-scale cyber laundering of illegal income has long become a global problem that requires a solution from all states of the world, which means that these problems can only be overcome through active interstate cooperation. Originality/value: The article analyzes inter alia the international legislation in the field of money laundering mechanisms obtained from cybercrime and examines the activities of international organizations in this area.
Анотація - 0 байт
Анотація
Найти похожие
5.

Вид документа : Статья из журнала
Шифр издания : 323.2:007/T37
Автор(ы) : Teremetskyi, Vladyslav, Tokarieva, Kseniia, Dziuba, Iurii, Shelukhin, Nikolay, Predmestnikov, Oleh, Parpan, Ulyana
Заглавие : Combatting Disinformation And Cyber Threats In The European Union And United States: Lessons For Ukraine
Место публикации : Journal of Legal, Ethical and Regulatory Issues. - 2021. - Vol. 24, Spec. Iss. 1. - P.1-10
УДК : 323.2:007
Ключевые слова (''Своб.индексиров.''): hybrid war--cyber threats--disinformation--infodemia--information security--information society--mass media--misinformation--гібридна війна--кіберзагрози--дезінформація--інфодемія--інформаційна безпека--інформаційне суспільство--засоби масової інформації (змі)--гибридная война--киберугроза--дезинформация--инфодемия--информационная безопасность--информационное общество--средства массовой информации (сми)
Аннотация: The article analyzes the main means of counteracting misinformation, disinformation and cyber threats used by the European and international communities. It is determined that the main challenges of our time, which exacerbate the problem of disinformation, are Russia's information policy and the COVID-19 pandemic. The main institutions and regulations of Europe, which are aimed at overcoming the spread of false information in the media, are analyzed. The experience of France is mentioned, which created a powerful legal mechanism to prevent misinformation and combat its manifestations. The current state of US information security and the effectiveness of the US policy of combating disinformation are described. Special attention is paid to the issues of media and cyber education of the population. The latest trends in the institutionalization of countering misinformation and disinformation in Ukraine and ways to improve the strengthening of information security in the country are studied. It is established that Ukraine, as a direct participant in the information war, is obliged to support and involve at the national level European initiatives to strengthen information security and cyber security. The first steps include updating the legislation on information, increasing the role of information security in national security acts, approving the Strategy for Counteracting Disinformation and the Strategy for Ensuring Information Security, and institutionalizing the fight against misinformation and disinformation.
Текст - 0 байт
Текст
Найти похожие
6.

Вид документа : Однотомное издание
Шифр издания : DOI: 10.15587/978/S98-711876
Автор(ы) : Yevseiev S., Ponomarenko V., Laptiev O., Milov O., Korol O., Melenti, Yevgen
Заглавие : Synergy of building cybersecurity systems : monograph
Выходные данные : Kharkiv: PC TECHNOLOGY CENTER, 2021
Колич.характеристики :175 p.
ISBN, Цена 978-617731931-2: Б.ц.
ISBN, Цена 978-617731932-9: Б.ц.
УДК : 004.056
Ключевые слова (''Своб.индексиров.''): algebraic geometric codes--classifiers of cyber threats--crypto-code constructions--cybersecurity--modeling of conflict-cooperative interaction--алгебраїчні геометричні коди--класифікатори кіберзагроз--конструкції криптокоду--кібербезпека--моделювання конфліктно-кооперативної взаємодії
Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
7.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Ryabukha, Yurii, Milov, Oleksandr, Milevskyi, Stanislav, Pohasii, Serhii, Ivanchenko, Yevheniia, Ivanchenko, Ihor, Melenti, Yevgen, Opirskyy, Ivan, Pasko, Igor
Заглавие : Development of a method for assessing forecast of social impact in regional communities
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P.30-43
УДК : 004.056:004.738.5(045)
Ключевые слова (''Своб.индексиров.''): models of influence--rating of political parties--regional society--social networks--socio-cyber-physical system--моделі впливу--рейтинг політичних партій--регіональне товариство--соціальні мережі--соціально-кібер-фізична система--модели влияния--рейтинг политических партий--региональное общество--социальные сети--социо-кибер-физическая система
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
8.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Holovkin, Bohdan M., Tavolzhanskyi, Oleksii V., Lysodyed, Oleksandr V.
Заглавие : Corruption as a Cybersecurity Threat in the New World Order
Место публикации : Connections. - 2021. - Vol. 20, Iss. 2. - P.75-87
УДК : 343.85 + 343.35:35.08
Ключевые слова (''Своб.индексиров.''): corruption--covid-19 pandemic--cybersecu-rity threats--cybersecurity--fight against corruption--post-pandemic conditions--корупція--пандемія covid-19--загрози кібербезпеці--кібербезпека--боротьба з корупцією--коррупция--борьба с коррупцией--пандемия covid-19--кибербезопасность
Аннотация: The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cogni-tion. Using the dialectical method, theoretical background, and contempo-rary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a mod-ern understanding of multicultural communication and well-being.
Текст - 0 байт
Текст
Найти похожие
9.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Marcinauskaite, Renata, Razmetaeva, Yulia
Заглавие : Privacy protection in the digital age: a criminal law perspective
Место публикации : International Comparative Jurisprudence. - 2021. - Vol. 7, Iss. 2. - P.153-168
УДК : 343.4
Ключевые слова (''Своб.индексиров.''): digital age--eu privacy approach--inviolability of privacy--lithuanian privacy approach--principle of equivalent treatment--privacy--ukrainian privacy approach--us privacy approach--цифрова епоха--кіберпростір--конфіденційність--недоторканність приватного життя--кримінальна відповідальність--цифровая эпоха--конфиденциальность--неприкосновенность личной жизни--киберпространство (кибернетическое пространство)--уголовная ответственность
Аннотация: Privacy as a fundamental right faces considerable challenges as people’s activities have moved into cyberspace. The development of technology has had an impact on a various areas related to personal privacy. This article discusses changes to the concept of privacy in the digital age, presents approaches to privacy issues in the law of the European Union (EU) and United States (US) today, and reveals the aspects of privacy protection in criminal law based on the relevant Lithuanian case law and Ukrainian law. This analysis showed that legal regulation and practice must be adapted to the changed situation. The use of technology has created new ways of committing serious privacy violations; therefore, criminal law must be ready to properly respond to the changing nature of crimes against personal privacy in the digital age.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
10.

Вид документа : Статья из сборника (однотомник)
Шифр издания : 343.34:004.7/M70
Автор(ы) : Milov, Oleksandr, Melenti, Yevgen, Milevskyi, Stanislav, Pohasii, Serhii, Yevseiev, Serhii
Заглавие : Cyber Terrorism as an Object of Modeling
Место публикации : CEUR Workshop Proceedings: Proceedings of the 3rd International Conference on Information Security and Information Technologies (ISecIT 2021), co-located with 1st International Forum "Digital Reality" (DRForum 2021), Odesa, Ukraine, September 13-19, 2021. - Odesa, 2021. - Vol. 3200: Information Security and Information Technologies, ISecIT 2021. - P.204-210
УДК : 343.34:004.7 + 004.7:343.34
Ключевые слова (''Своб.индексиров.''): cyber terrorism--cyberspace--кібертероризм--кіберзагроза--кіберпростір--кибертерроризм (компьютерный терроризм)--киберугроза
Аннотация: The article examines issues related to the characteristics of cyber terrorism, as well as related concepts of terrorism and cyberspace. The definitions of these concepts are given. The types of cyber threats directly related to cyber terrorism are identified. The differences and similarities of the mentioned cyber threats are described. A structure that reflects the main features of cyber terrorism, which should be included in the model of cyber terrorism is presented.
Текст - 0 байт
Текст
Найти похожие
11.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Getman, Anatolii P., Danilyan, Oleg G., Dzeban, Aleksander P., Kalynovskyi, Yurii Yuriiovych
Заглавие : Modern ontology: reflection on the continuity of cyberspace and virtual reality
Параллельн. заглавия :Ontología moderna: reflexión sobre la continuidad del ciberespacio y realidad virtual
Место публикации : Revista de Filosofia. - 2022. - Vol. 39, № 102. - P.78-94
УДК : 141.12:004
Ключевые слова (''Своб.индексиров.''): cyberspace--computer technologies--information processes--internet space--virtual reality--комп'ютерні технології--кіберпростір--інформаційні процеси--інтернет-простір--віртуальна реальність--філософія--онтологія--соціальнa філософія--компьютерные технологии--киберпространство--информационные процессы--интернет-пространство--виртуальная реальность--социальная философия--философия--онтология
Аннотация: The article demonstrates that information and communication technologies, which are actively implemented in modern life, have no analogues in the past. Reality, characterized by the concept of “cyberspace”, has become one of the main factors of sociocultural reality, a special living environment with which all spheres of public life are connected − economic, social, political, spiritual. Modernity is characterized by the emergence of electronic virtual reality, which significantly changes the language, bringing in new elements of communication. Today, the Internet in some way is a global information space that unites all existing telecommunications and information networks. It is stated that the formation of global information networks has become a direct consequence of computer technology, so the global information space is primarily cybernetic (computer) in nature. The question is raised about the spatial and temporal characteristics of virtual reality and their ontological substantiation, because cyberspace presupposes the existence of a certain world, characterized by the length and metrics represented in consciousness. The thesis about the sociality of cyberspace is substantiated. It is shown that cyberspace is artificially maintained and developed by real space, so it is concluded that it is impossible and inexpedient to study it as an independent phenomenon.
Текст - 0 байт
Текст
Найти похожие
12.

Вид документа : Статья из журнала
Шифр издания : 681.32:007.5/Y47
Автор(ы) : Yevseiev, Serhii, Milov, Oleksandr, Opirskyy, Ivan, Dunaievska, Olha, Huk, Oleksandr, Pogorelov, Volodymyr, Bondarenko, Kyrylo, Zviertseva, Nataliia, Melenti, Yevgen, Tomashevsky, Bogdan
Заглавие : Development of a concept for cybersecurity metrics classification
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2022. - Vol. 4, No. 4 (118). - P.6-18
УДК : 681.32:007.5
Ключевые слова (''Своб.индексиров.''): security assessment model--security metrics--security metrics classifier--threat synergy--безпека--кібербезпека--синергія загроз--кибербезопасность--синергия угроз
Аннотация: The development of the IT industry and computing resources allows the formation of cyberphysical social systems (CPSS), which are the integration of wireless mobile and Internet technologies and the combination of the Internet of things with the technologies of cyberphysical systems. To build protection systems, while minimizing both computing and economic costs, various sets of security profiles are used, ensuring the continuity of critical business processes. To assess/compare the level of CPSS security, various assessment methods based on a set of metrics are generally used. Security metrics are tools for providing up-to-date information about the state of the security level, cost characteristics/parameters from both the defense and attack sides. However, the choice of such sets is not always the same/understandable to the average person. This, firstly, leads to the absence of a generally accepted and unambiguous definition, which means that one system is more secure than another. Secondly, it does not take into account the signs of synergy and hybridity of modern targeted attacks. Without this knowledge, it is impossible to show that the metric measures the security level objectively. Thirdly, there is no universal formal model for all metrics that could be used for rigorous analysis. The paper explores the possibility of defining a basic formal model (classifier) for analyzing security metrics. The proposed security assessment model takes into account not only the level of secrecy of information resources, the level of provision of security services, but also allows, based on the requirements put forward, forming the necessary set of security assessment metrics, taking into account the requirements for the continuity of business processes. The average value of the provision of security services to CPSS information resources is 0.99, with an average value of the security level of information resources of 0.8
Текст англ. - 0 байт
Текст англ.,
Текст рос. - 0 байт
Текст рос.
Найти похожие
13.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yemanov, Vladislav, Pasichnyk, Vasyl, Yevtushenko, Ihor, Larin, Stanislav, Mykhailenko, Olena
Заглавие : Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment
Место публикации : Ingenierie des Systemes d'Information. - 2023. - Vol. 28, Iss. 1. - P.77-84
УДК : 004.056:338.244
Ключевые слова (''Своб.индексиров.''): cybersecurity--information--ranking--security--threats--захист інформації--кібербезпека--ранжування--соціально-економічна система--защита информации--кибербезопасность
Аннотация: The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
14.

Вид документа : Статья из журнала
Шифр издания : 351.75:004/Z39
Автор(ы) : Zavhorodnia, Yuliia, Povydys, Vladyslav, Kozminykh, Alona, Mamontova, Ella
Заглавие : Information Policy of the State in the Context of Growing Cyber Threats
Место публикации : Pakistan Journal of Criminology. - 2023. - Vol. 15, No. 1. - P.111-124
Примечания : References : p. 120-124
УДК : 351.75:004
Ключевые слова (''Своб.индексиров.''): cyber threats--cybersecurity--cybersecurity standards--digital transformation--e-governance--information space--political conflicts--political process--кіберзагрози--кібербезпека--цифрова трансформація--електронне урядування--інформаційний простір--політичні конфлікти--політичний процес
Аннотация: The research subject matter is the foundations of the National concept of the state policy on information in the era of digitalization with an emphasis on cybersecurity. The study aim is to determine possible means to increase the level of information policy efficiency, considering the concept of technological society in the context of digitalization, research into international standards for ensuring cyber security, ideas of a national model of information policy for providing cyber security. The comparison was used to analyze and summarize the approaches to the implementation of digital transformation in public relations. Apart from that, the specific parameters of the activities of the National Agency on Corruption Prevention in terms of digitalization were singled out. Besides, the inductive and deductive methods allowed to distinguish approaches to the information policy model. The authors established that the components of state policy in the context of digitalization include the following components: 1) electronic governance; 2) cyber security. Moreover, the elements of the national model of information were singled out. The results of the research proved that the introduction of the latest information technologies in the activities of government entities creates the need to improve cyber defense.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
15.

Вид документа : Статья из журнала
Шифр издания : 343.3/S56
Автор(ы) : Shulzhenko, Nadiia, Romashkin, Snizhana
Заглавие : Internet fraud and transnational organized crime
Место публикации : Juridical Tribune - Tribuna Juridica. - 2020. - Vol. 10, Iss. 1. - P.162-172
Примечания : References : p. 172
УДК : 343.3
ББК : Х628.1
Ключевые слова (''Своб.индексиров.''): internet frauds--интернет- мошенничества--інтернет- шахрайства--banking frauds--банковские мошенничества--банківські шахрайства--transnational crimes--транснациональные преступления--транснаціональні злочини--cybercrimes--киберпреступность--кіберзлочинність--phishing--фишинг--фішинг
Аннотация: The present research paper describes the most traditional ways of today's mass-marketing financial crimes such as fraud. Digital banking is now used daily for checking account data, making purchases, paying the bills, transfer money, print statements, etc. Online fraud is a crime committed with on-line software to unlawfully allocate money from both bank' and payment systems' account and/or transfer money to another bank account. Banks are not so much targeted in today's world, there's a lot of money in cyberspace, in modern digital systems and data networks. The main task of this article is to determine the most common forms of online financial crimes, such as "Hacking" or electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. The article discusses the features of legal regulation and the activities of the Ukraine to protect citizens form Internet frauds and to avoid Internet scams, phishing and other cybercrimes in Internet. In this article, we review some principles of qualitative data collection, analysis, and strategic planning to help scientists, lawyers, and law students interested in conducting research in their practice to continue their learning in this area.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
16.

Вид документа : Однотомное издание
Шифр издания : DOI: 10.15587/978/M78-797934
Автор(ы) : Yevseiev, Serhii, Hryshchuk, Ruslan, Molodetska, Kateryna, Nazarkevych, Mariia, Melenti, Yevgen
Заглавие : Modeling of security systems for critical infrastructure facilities : monograph
Выходные данные : Б.м., 2022
Колич.характеристики :181 p.
ISBN, Цена 978-617-7319-57-2 (on-line): Б.ц.
ISBN, Цена 978-617-7319-56-5 (print): Б.ц.
УДК : 004.056
Ключевые слова (''Своб.индексиров.''): concept of a multi-loop security system--post-quantum security mechanisms--socio-cyber-physical systems--кібербезпека--система безпеки--критична інфраструктура--багатоконтурна система безпека--інформаційна безпека--соціальна інженерія
Аннотация: The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
17.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Holovkin, Bohdan, Cherniavskyi, Serhii, Tavolzhanskyi, Oleksii
Заглавие : Factors of cybercrime in Ukraine
Место публикации : Relacoes Internacionais no Mundo Atual. - 2023. - Vol. 3, No. 41. - P.464-488
Примечания : References : p. 485-488
УДК : 343.3:004.056
Ключевые слова (''Своб.индексиров.''): criminal market--cyber vulnerabilities--electronic communications--factors of cybercrime--hacker groups--russian cyber aggression--кримінальний ринок--кіберуразливості--електронні комунікації--чинники кіберзлочинності--хакерські групи--російська кіберагресія
Аннотация: The relevance of the research topic is determined by the need to form a holistic scientific approach to explaining the factors of cybercrime in the context of the global COVID-19 pandemic, the armed aggression of the Russian Federation against Ukraine, the accelerated digital transformation of the economy and society, the intensification of hybrid cyber threats, and the existence of a general upward trend in cybercrime. The purpose of the article is to identify, analyse and classify the factors of cybercrime, and to assess their impact on the level of cyberattacks and cybercrime. To achieve this goal, the author uses general scientific methods of cognition (system analysis, classification, synthesis, comparison) and special methods of criminological research (document study, factor analysis, statistical methods, expert opinions). It is found that the most significant impact on the growth of cybercrime is exerted by political (geopolitical and military-political), economic, socio-cultural, socio-psychological, technological factors, which are expressed in the escalation of geopolitical struggle, Russia's use of cyber means to gain an information advantage in the war against Ukraine, and functioning in the dark web of the criminal market of goods and services, insufficient social control over the digital environment, increased connectivity, ease of cyberattacks, low income, social exclusion, informal norms and values, opportunistic attitudes, criminogenic stereotypes of thinking and behaviour in cyberspace during electronic communications and online business. It is stated that favourable conditions for committing cybercrime are the depletion of resources and overload of cybersecurity entities of Ukraine due to the protracted war, vulnerabilities in computer and mobile device software, shortcomings in the cyber security system of public and private information resources, critical infrastructure facilities, and users' non-compliance with the rules of safe behaviour.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
18.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Orlovskyi, Ruslan, Kharytonov, Sergiy, Samoshchenko, Igor, Us, Olha, Iemelianenko, Volodymyr
Заглавие : Countering Cybercrime Under Martial Law
Место публикации : Journal of Cyber Security and Mobility. - 2023. - Vol. 12, Iss. 6 . - P.893-910
Примечания : References : p. 905-907
УДК : 343.97:004]“364”
Ключевые слова (''Своб.индексиров.''): countering cybercrime--cyberattack--cybercrime--cyberspace--martial law--протидія кіберзлочинності--кібератака--кіберзлочинність--кіберпростір--військовий стан
Аннотация: To date, it is impossible to imagine your life without all kinds of gadgets, the Internet and social networks. The active using of social networks has long been carried out by all state bodies in order to cause confidence of the population to their actions, to see feedback in the format of comments, as well as to show people all topical processes. It is also important to note that Ukraine is an advanced state in the field of electronic document circulation, and therefore almost all processes, starting from the activities of banking institutions and ending with the activity of air and railway transport are carried out by automated electronic systems. Accordingly, the coordinated and uninterrupted functioning of all of the above is due to the stability of cyberspace. In connection with Russia's attack the information space became the second battlefield. Cyberattacks and official state sites hacking was immediately started, there were active attempts to abduct electronic data of banking institutions and private enterprises. The relevance of this article is determined by it, because a detailed analysis of the characteristic features of cybercrime, the search for methods and mechanisms of countering cybercrime in the conditions of war are the primary tasks and contribution to victory. The purpose of the article is to analyze the current state of countering cybercrime and varieties of cybercrime, to identify features and characteristics of cybercrime, as well as to make proposals for improving the current legislation in this area. The study used the following methods: analysis and synthesis, legal, static, systemic and formal-legal methods, method of interpretation of law. The conclusions, which we will make, can be a basis for further improvement of legislation, research and discussions between theorists and practitioners.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
19.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Serohina, Svitlana, Harashchuk, Ilona, Murtishcheva, Alina, Poproshaieva, Olena, Fomina, Svitlana
Заглавие : International Experience in Ensuring Cybersecurity in Local Self-Government Management as a Component of the National Security of Ukraine
Место публикации : Pakistan Journal of Criminology. - 2024. - Vol. 16, iss. 2. - P.827-841
Примечания : DOI: https://doi.org/10.62271/pjc.16.2.827.841
УДК : 352:[351.746:004.056](477)
Ключевые слова (''Своб.индексиров.''): cybersecurity--cybersecurity entities--international experience--local self-government management--national security--кібербезпека--суб’єкти кібербезпеки--міжнародний досвід--місцеве самоврядування--управління місцевого самоврядування--національна безпека
Аннотация: The study examines the critical relationship between cyber security as a component of national security and its provision in local government administration. The purpose of the study is to evaluate the international experience of ensuring cyber security in the management of local self-governments in Germany, Poland and Ukraine. In research were used visual and graphic methods, a set of methods of processing, comprehension and interpretation of information. This highlights the level of trust in local authorities in Poland, Germany and Ukraine, as well as a comparison of the systems of local self-government entities in the selected countries. It was established that there is a need to create and develop an adequate cybersecurity system. The result of the study is an analysis of the cyber security strategies of Germany, Poland and Ukraine. Prospects for further research are the analysis of the possibility of consolidation and differentiation of powers by subjects of local self-government in ensuring cyber security. An analysis of the real need for the powers related to providing cyber security and the ability to perform them is appropriate.
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Найти похожие
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Григорія Сковороди, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава