Author:
Semenenko Oleh,Dobrovolskyi Uzef,Sliusarenko Maryna,Levchenko Ihor,Mytchenko Serhii
Abstract
The research relevance is determined by the development of the digital sphere, which entails an increase in the number of cybercrimes and cyberattacks that pose a threat to the security of people and organisations and can lead to serious consequences. The study aims to examine how cyber technologies are formed and developed, as well as how they are used in the field of state defence in Ukraine and some European Union countries, namely Germany, France, the United Kingdom, and Indonesia. In the course of the study, were used structural-functional and dialectical methods, the method of synthesis, logical and comparative analysis, and the method of generalisation. It is established that cybertechnologies are gaining more and more development both in the world and in Ukraine, and cyberweapons, due to their effectiveness and negative consequences, are equated with methods of mass destruction. That is why the issue of cyber defence is one of the main challenges of our time. Ukraine needs to adopt international experience to successfully formulate policies and create its own legal and organisational framework for cybersecurity. Using the experience of other countries, Ukrainian experts will be able to improve their technologies and strategies, strengthen defences in the information space, and develop new advanced defence systems. The importance of the National Coordination Centre for Cybersecurity should be emphasised. The body’s work is focused on ensuring coordination of the activities of the national security and defence entities of Ukraine in the implementation of the cybersecurity strategy in the country and on improving the efficiency of the public administration system in the formation and implementation of the state policy in the field of cybersecurity. The study is practically important, since all the theoretical provisions, conclusions and recommendations can be used by legislators and other specialists to improve the system of legal guarantees of cybersecurity in the field of defence of the State
Publisher
Scientific Journals Publishing House
Reference25 articles.
1. [1] Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla, & D. Ronfeldt (Eds.), Athena’s Camp: Preparing for conflict in the information age (pp. 23-60). Santa Monica: RAND Corporation.
2. [2] Biliuha, A.D. (2021). Cyber weapons: Modern threats to national security and countermeasures. Science and Defense, 2, 42-49. doi: 10.33099/2618-1614-2021-15-2-42-49.
3. [3] Cao, J., Ding, D., Liu, J., Tian, E., Hu, S., & Xie, X. (2021). Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks. Information Sciences, 548, 69-84. doi: 10.1016/j.ins.2020.09.046.
4. [4] Chernysh, Yu.O., Maltseva, I.R., & Shtonda, R.M. (2023). Cyber protection in organizations of various spheres of activity. In General scientific approaches to knowledge in the different sciences: Proceedings of the XV International scientific and practical conference (pp. 17-19). Vilnius: InterSci.
5. [5] Collins, S., & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 80-91. doi: 10.1080/18335330.2012.653198.