Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Бази даних


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (4003)Зведений електронний каталог «Правова освіта. Правова культура» (55)
Формат представлення знайдених документів :
полный информационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>U=Х621.162<.>)

Загальна кількість знайденихдокументів : 6
Показані документи с 1 по 6
1.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Vakulyk O., Petrenko P., Kuzmenko I., Pochtovyi M., Orlovskyi R.
Заглавие : Cybersecurity as a component of the national security of the state
Место публикации : Journal of Security and Sustainability Issues. - 2020. - Vol. 9, Issue 3. - P.775-784
УДК : 343.34
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): national security--национальная безопасность--національна безпека--cybersecurity--кибер-безопасности--кібер-безпека--cyberdefense--киберзащита--киберзахист--cyberthreats--киберугроз--кіберзагроз--cyberattack--кибератака--кібератака--information--информация--інформація--information infrastructure--информационная инфраструктура--інформаційна інфраструктура
Аннотация: Abstract. The article is devoted to the study of cybersecurity as a component of the national security of the state. It has been established that the development of information and telecommunication technologies testifies to the progress of society but also determines the security risks of their use. In particular, this refers to a cyberattack and other cyberthreats. It has been determined that cybersecurity should be understood as the protection of the vital interests of a person and citizen, society and the state when using cyberspace. An important role in ensuring such a security is played by the cyberthreat protection mechanism, which provides for the development and adoption of a cybersecurity strategy, the creation of a national cybersecurity system, strengthening of the security and defense sector’s capabilities to effectively combat military cyberthreats, cyberterrorism, and ensuring cyberprotection of state electronic information resources and information infrastructure. The existence of the Cybersecurity Strategy of Ukraine and other acts as the legal basis for countering cyberthreats has been noted. In turn, the national cybersecurity system provides for the activities of the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine, and intelligence agencies. In turn, in France, Finland, Germany, the central place in the cybersecurity system belongs to the National Cybersecurity Agency, the National Cybersecurity Center, and the Cyberdefense Center, respectively. Despite Ukraine’s significant steps towards increasing cybersecurity in the state, there is no public-private cooperation in this area. Due to this, authorized entities should establish cooperation with the non-state sector and establish effective institutional and legal instruments for such cooperation. At the same time, the issue of public-private cooperation in the field of cybersecurity is relevant for all states of the world in view of the global nature of existing cyberthreats.
Текст - 0 байт
Текст
Найти похожие
2.

Вид документа : Статья из журнала
Шифр издания : Х621.161/S94
Автор(ы) : Survila, Arvydas, Tvaronavičienė, Agnė, Shapoval, Roman, Peleckienė, Valentina
Заглавие : Defence and security public procurement: Analysis of managerial and legal issues
Место публикации : Journal of Security & Sustainability Issues. - 2016. - Vol. 6, Issue 2. - P.299-314
ББК : Х621.161 + Х621.162
Ключевые слова (''Своб.индексиров.''): оборона--общественная безопасность закупки--анализ управленческих и правовых вопросов
Аннотация: Public procurement as a system of procedures for purchasing goods and services is quite complex. Especially having in mind international legal regulation and high requirements for the assurance of such principles as transparency, fair competition, non-discrimination, mutual recognition, proportionality. Thus from the other side of the issue, in special fields as defence and national security, it is not always possible to strictly observe the mentioned rules. Institutions in a state, which is facing threats, must be able to flexibly; this would allow balancing the urgency and competiveness of purchasing procedures. Still such situations require clear managing system and legal regulation supporting it. In this article, the authors present the preliminary analysis of management of public procurement for defence and security via disaster management cycle theory and mostly focus on the phase of response towards certain destructive actions. The managerial aspect of the issue is supplemented by the analysis of the legal regulation, which should support managerial processes. Having in mind that in different phases of the disaster management cycle, different methods of management (requiring special legal regulation, as legitimation of such actions) should be applied, examples of two countries are presented. Lithuania as a member state of European Union is chosen to illustrate the reflections of managerial processes in legal acts, which are passed in the phases of mitigation and preparedness. Ukrainian example is presented to illustrate the difficulties, which state may face, when managerial processes as well as legitimation thereof in legal regulations are developed in the phase of response. To answer these questions, literature review, comparison, analyses of documents, synthesis and other methods were used. It is concluded that the public procurement processes definitely should be prepared in advance and every state should be ready for the urgent purchases before the direct threats for security appears. Ukrainian example shows, how it is difficult, costly and requiring other efforts to develop these processes and implement it in the same time. It should be mentioned that raised questions are in the constant process of learning and this article should be considered as a primary steps towards deep analysis of the continuity of state actions in the situations of real threats and tensions, which Europe is facing today.
Работа с электронной копией документа возможна только в читальном зале библиотеки
,
Текст - 0 байт
Текст
Найти похожие
3.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Melenti, Yevgen, Voitko, Oleksandr, Hrebeniuk, Vitalii, Korchenko, Anna, Mykus, Serhii, Milov, Oleksandr, Prokopenko, Oleksandr, Sievierinov, Oleksandr, Chopenko, Dmytro
Заглавие : Development of a Concept for Building a Critical Infrastructure Facilities Security System
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 3. - P.63-83
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): concept--critical infrastructure--modeling method--security system--threat classifier--концепція--критична інфраструктура--метод моделювання--система безпеки--класифікатор загрози--концепция--критическая инфраструктура--метод моделирования--система безопасности--классификатор угрозы
Аннотация: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)
Текст - 0 байт
Текст
Найти похожие
4.

Вид документа : Статья из журнала
Шифр издания : Х621.162/S53
Автор(ы) : Shapoval, Roman Volodymyrovych, Nastyuk, Vasyl Yakovych
Заглавие : International Expertise in Administrative Legal Support of National Security in Ukraine
Место публикации : Indian Journal of Science & Technology. - 2016. - Vol. 9, Issue 36. - P.1-9
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): административная правовая поддержка--международная экспертиза--национальная безопасность
Аннотация: Abstract Background/Objectives: This articles deals with research of international expertise in administrative legal support of national security aiming at its complex and comprehensive analysis. Methods: Methods of restructuring ideas and theories, system and structural and functional, formal legal analysis and forecasting were applied throughout this research to the very phenomena of national security and activity of subjects shaping and maintaining such phenomenon, based on the methodological position. Their application logics relies on an attempt to integrate methodological approaches of various disciplines into the research of national security, and support forms and methods. Findings: This article concludes that the national security is a complex phenomenon and thus a system of interacting components. This system comprises a certain set of concepts and provisions, social and political and legal institutions and establishments, certain means, methods and forms that prevent or ensure an adequate response to any arising dangers and threats. Comparative legal analysis of international expertise in Western European countries and the USA allowed determining new lines of improvement of the administrative legal regulation in the following areas: counteraction of extremist activity; counteraction of illegal migration; combating human trafficking. This article suggests dividing national security into the following types: foreign policy threats to national security, public security, economic security, foreign economic security, military security, information security, environmental and demographic security. National security doctrine in any country is the original conceptual model of stating and resolving a common integrated set of standardized tasks and problems associated with providing protection of national interests. Applications/Improvements: Academic novelty of this research is in an attempt of fundamental theoretical analysis of the phenomenon of 'national security' as a governmental legal phenomenon with strengthening perspectives in Ukraine, establishing equilibrium of public and personal interests, providing sound protection of individual rights and legal interests.
Текст - 0 байт
Текст
Найти похожие
5.

Вид документа : Статья из журнала
Шифр издания : 343.343 343.34/N89
Автор(ы) : Novikovas A., Tvaronavičienė, Agnė, Shapoval R.
Заглавие : National security maintenance by legal measures: Case study Lithuania/Ukraine
Место публикации : Journal of Security and Sustainability Issues. - 2019. - Vol. 8, Issue 4. - P.737-748
УДК : 343.343 343.34 + 351.75
ББК : Х621.162 + Х811.12
Ключевые слова (''Своб.индексиров.''): национальная безопасность--принципы общественной безопасности--общественная безопасность--угрозы национальной безопасности
Аннотация: The purpose of this article is to fulfil a comparative study of national security legislation, as well as the formation of conceptual foundation for its development and the elaboration of proposals for the improvement thereof with regard to Ukraine. The article analyses in comparative aspect the practice of the Republic of Lithuania as one of the European countries. In the context of globalization, the research focuses on international legal systems of both international and regional levels. The comparative legal analysis of the legal measures to maintain national security revealed similarities in theoretical and methodological approaches. In the study, the author's definition of national security is given; and a typological model of the concept of national security is formed.
Текст - 0 байт
Текст
Найти похожие
6.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Chyzhmar K., Dniprov O., Korotiuk O., Shapoval R., Sydorenko O.
Заглавие : State information security as a challenge of information and computer technology development
Место публикации : Journal of Security and Sustainability Issues. - 2020. - Vol. 9, Iss. 3. - Р.819-828
ББК : Х621.162 + Ч23
Ключевые слова (''Своб.индексиров.''): hybrid war --information--information and computer technologies--information security--information space--information system--гибридная война--информация--информация и компьютерные технологии--информационная безопасность--информационная система--информационное пространство--гібрідна війна--інформація--інформація та компьютерні технології--інформаційна безпека--інформаційна система--інформаційний простір
Аннотация: The article is devoted to study of information security as a challenge of modern development of information and computer technologies. It was found that achievement of a satisfactory level of information security, which is a state of safety of balanced important interests of an individual, society and state against internal and external threats in the information sphere, is possible based on economic, organizational, technical, legal, psychological and other methods. Existing threats to the information security in Ukraine have been identified. The concept and essence of hybrid war as one of the threats to protection of information interests of an individual, society and the state are considered separately. A conclusion was made about the expediency of supplementing the Information Security Doctrine of Ukraine with such a threat as a hybrid war, which actually takes place in the east of the country. A system of information security components in Ukraine has been disclosed, among which a particular attention has been paid to the Ministry of Information Policy of Ukraine and the State Agency for Electronic Governance of Ukraine. In order to improve the mechanism of protection of the information space of Ukraine, it is proposed to differentiate at the legislative level the concepts of "information security" and "cybersecurity", since their understanding is the basis for the formulation and implementation of the state information policy, improve international cooperation between states to exchange experience, as well as to involve general public to protect the information space.
Текст - 0 байт
Текст
Найти похожие
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Григорія Сковороди, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава