СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з метою приведення її до вимог сучасності та за...
| Published in: | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
|---|---|
| Main Authors: | Oleksandr M. Kosohov, Аnatoliy O. Siryk |
| Format: | Article |
| Language: | English |
| Published: |
Національний університет оборони України
2015-12-01
|
| Subjects: | |
| Online Access: | http://sit.nuou.org.ua/article/view/75505 |
Similar Items
Islamic Republic of Iran Army Cyber Offensive Evaluation Model
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
Modelling Cyberspace to Determine Cybersecurity Training Requirements
by: Adrian Venables
Published: (2021-11-01)
by: Adrian Venables
Published: (2021-11-01)
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01)
by: Miroslav Feix, et al.
Published: (2017-09-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Influence of cyberculture on human rights
by: Magdalena Sitek, et al.
Published: (2019-02-01)
by: Magdalena Sitek, et al.
Published: (2019-02-01)
Security pattern in the cyberspace of the Islamic Republic of Iran with a futuristic approach
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
I.R.I Army cybersecurity effective factors. (Case study: I.R.I Army general staff )
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
by: Aybala Lale Kahraman
Published: (2024-12-01)
by: Aybala Lale Kahraman
Published: (2024-12-01)
CYBERSPACE RISKS AND THREATS TO CRITICAL INFORMATION INFRASTRUCTURE
by: Constantin MINCU, et al.
Published: (2011-12-01)
by: Constantin MINCU, et al.
Published: (2011-12-01)
Cyber hygiene of the digital twin of the civil aviation occupational safety management system in the context of quantum transformation
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures
by: Jang Jisoo, et al.
Published: (2024-01-01)
by: Jang Jisoo, et al.
Published: (2024-01-01)
HOW THE RUSSIA-UKRAINE WAR MAY CHANGE THE CYBERCRIME ECOSYSTEM
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
A Study on Cyber Target Importance Quantification and Ranking Algorithm
by: Kookjin Kim, et al.
Published: (2022-02-01)
by: Kookjin Kim, et al.
Published: (2022-02-01)
The system of cybersecurity bodies in Ukraine
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
The influence of the digital environment on the spread of cyber terrorism
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
Cyber Sanctions as a Tool of Competition in Global Cyberspace
by: S. I. Balakhonova
Published: (2023-04-01)
by: S. I. Balakhonova
Published: (2023-04-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution
by: Marko Arik, et al.
Published: (2024-06-01)
by: Marko Arik, et al.
Published: (2024-06-01)
Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness
by: Kookjin Kim, et al.
Published: (2023-02-01)
by: Kookjin Kim, et al.
Published: (2023-02-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Assessing Attribution and Credible Deterrence in Cyberspace
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
The use of cyberspace in the context of hybrid warfare
by: Vuletić Dejan V.
Published: (2017-01-01)
by: Vuletić Dejan V.
Published: (2017-01-01)
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
National security and the challenges of the digital age
by: Lakušić Milovan, et al.
Published: (2022-01-01)
by: Lakušić Milovan, et al.
Published: (2022-01-01)
Artificial Intelligence Enabled Cyberspace Security Defense
by: Jia Yan, et al.
Published: (2021-06-01)
by: Jia Yan, et al.
Published: (2021-06-01)
Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01)
by: Gheorghe BOARU
Published: (2025-09-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Optimization of cyber security through the implementation of AI technologies
by: Nawaf Liqaa, et al.
Published: (2025-02-01)
by: Nawaf Liqaa, et al.
Published: (2025-02-01)
Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
by: Virgínia de Melo Dantas Trinks, et al.
Published: (2022-09-01)
Detection of unseen malware threats using generative adversarial networks and deep learning models
by: Chirag Joshi, et al.
Published: (2025-10-01)
by: Chirag Joshi, et al.
Published: (2025-10-01)
Criminological Aspects of Current Cyber Security
by: Andrejs Vilks, et al.
Published: (2022-10-01)
by: Andrejs Vilks, et al.
Published: (2022-10-01)
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)
by: Bader Al-Sada, et al.
Published: (2024-01-01)
Øving på cybersikkerheit: Ein casestudie av ei cybersikkerheitsøving
by: Mass Soldal Lund
Published: (2022-09-01)
by: Mass Soldal Lund
Published: (2022-09-01)
Cyber Potential Metaphorical Map Method Based on GMap
by: Dongyu Si, et al.
Published: (2025-01-01)
by: Dongyu Si, et al.
Published: (2025-01-01)
ТЕНДЕНЦІЇ РОЗВИТКУ КІБЕРЗАГРОЗ У СВІТОВОМУ ІНФОРМАЦІЙНОМУ ПРОСТОРІ
by: Oleg R. Cherniak, et al.
Published: (2015-01-01)
by: Oleg R. Cherniak, et al.
Published: (2015-01-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
Problems of Russia's Cyber-Security in the Arctic
by: Yu. F. Lukin
Published: (2020-05-01)
by: Yu. F. Lukin
Published: (2020-05-01)
CYBER THREATS TO OT SYSTEMS IN THE ENERGY INDUSTRY
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
Similar Items
-
Islamic Republic of Iran Army Cyber Offensive Evaluation Model
by: Mohammad Ghasemi, et al.
Published: (2023-08-01) -
Modelling Cyberspace to Determine Cybersecurity Training Requirements
by: Adrian Venables
Published: (2021-11-01) -
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01) -
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01) -
Influence of cyberculture on human rights
by: Magdalena Sitek, et al.
Published: (2019-02-01)
