Trends in the development of modern cyber space and its security in conditions of information conflict.
DOI:
https://doi.org/10.18372/2225-5036.26.14967Keywords:
information confrontation, information space, cyberspace, cybersecurity, information securityAbstract
The article considers the topical issue of cyberspace formation. The tendencies of its development in the conditions of information confrontation are determined, namely: information security directly depends on cybersecurity, ie the security policy implemented in cyberspace; cyberspace is gradually becoming the fifth theater of operations; to ensure the advantage in cyberspace, the world's leading countries are beginning to form a military-network complex; problems of information security in cyberspace and the formation of a military-network complex lead to a redistribution of powers of existing players in the field of information protection; the provision of information security services in cyberspace is becoming a new type of business. It is concluded that in the current conditions, ie information confrontation, it is essential to support the development and production in Ukraine of competitive information and communication tools (including the use of domestic microelectronics, which needs to be restored and developed) and software in the interests of Ukrainian users, as well as the use of such tools in Ukraine, and especially in the defense industry and critical civilian infrastructure, in order to counter information influences.References
Cyber Space Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. — Washington D.C.: The White House, 2009.
Informational Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. — Washington D.C.: The White House, 2011.
Department of Defense Strategy for Operating in Cyberspace. — Washington D.C.: U.S. Department of Defense, 2011.
AFDD 3-12. Cyberspace Operations. — USAF, 2010. — 60 p.
AFDD 3-13. Information Operations. — USAF, 2011. — 65 p.
AFPD 10-7. Information Operations. — USAF, 2006. — 29 p.
DoDD 3600.1. Information Operations. — US DoD, 2013. — 12 p
Стандарт ISO/IEC 27032:2012. Інформаційні технології. Методи забезпечення безпеки. Керівні вказівки по забезпеченню кібербезпеки. 2012.
Стандарт ITU-T X.1205:2008. Огляд кібербезпеки. 2008. — Женева: МСЭ-Т, 2008. — 162 с. — URL: www.itu.int/ITU-T.
Безпека в електрозв'язку та інформаційних технологіях. Огляд змісту та застосування діючих Рекомендацій МСЭ-Т для забезпечення захищеного електрозв'язку. — Женева: МСЭ-Т, 2009. — 162 с. — URL: www.itu.int/ITU-T.
JP 3-13. Information Operations. — US Joint Chiefs of Staff, 2012. — 69 p.
JP 3-13.1. Electronic Warfare. — US Joint Chiefs of Staff, 2007. — 115 p.
Воєнно-промисловий комплекс // https://uk.wikipedia.org/wiki/Воєнно-промисловий комплекс.
Интернет как оружие. Что скрывает Google, Tor и ЦРУ / Левин Яша; Пер.с англ. - М.: Индивидуум, 2019. - 360 с.
Кибервойн@: Пятый театр военных действий / Шейн Харис; Пер.с англ. - М.: Альпина нон-фикшин, 2020. - 390 с.
Информационное противоборство в современных условиях: [монография] / Л.Г.Пирцхалава, В.А.Хорошко, Ю.Е.Хохлачова, М.Е.Шелест / Под ред. профессора В.А. Хорошко. - К.: ЦП "Компринт", 2019. - 226 с.
Ткач Ю.М. Захищене інформаційне середовище / Карпінський М., Ткач Ю., Усов Я. // ITSec: Безпека інформаційних технологій: ІХ міжнародна науково-технічна конференція, 22-27 березня 2019 р. – К.: НАУ, 2019. – стор. 45-46.
Ткач Ю.Н. О развитии киберпространства и его защищенности / Ткач Ю.Н., Шелест М.Е., Карпинський М.П. // І міжнародна науково-практична конференція «Безпека ресурсів інформаційних систем» (Information Systems of Security Resources), Чернігів, 16-17 квітня 2020 р. – Чернігів, 2020. - стор.103-105.
Фурашев В.М. Кіберпростір та інформаційний простір, кібербезпека та інформаційна безпека: сутність, визначення, відмінності / Інформація і право, №2(5)/2012, с.162-169.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.