Cyber security in the national security & defence sector of Ukraine: todayʼs challenges and ways to avoid possible threats
Abstract
Development of strategic communications is necessary for the effective preparation and use of the Armed Forces, for the coordination of actions of state bodies in defence matters, as well as for the purpose of forming and strengthening the confidence of Ukrainian society in the stateʼs military policy. The basic elements of strategic communications of the Ministry of Defence and the Armed Forces are public relations, public relations in the military sphere, public diplomacy, information and psychological operations.
In turn, one of the components of the information operations system is cyberspace actions. The strategic importance of actions in cyberspace is due to the fact that cyber threats today, with devastating consequences, pose no less danger than direct military intervention. In 2016, during the Summit of Heads of State and Government of the North Atlantic Treaty Organization, the first ever EU-NATO security cooperation agreement was signed, in particular on hybrid wars and cyberattacks. Cyberspace, along with land, air, sea, and space, has been recognized as a new operational space, and cyber-operations (cyberattacks) are an integral part of the hybrid war. Also, cyber weapons in terms of scale of successors are compared with weapons of mass destruction. In this regard, cyber security is one of the top priorities for the state.
The article is devoted to the research of actual problems of providing the cyber security of the Armed Forces units of Ukraine in the current conditions of development of the information society and during hybrid threats from the Russian Federation side. The authors explain the basic concepts and definitions of the scientific field and explain conceptual approaches to cybersecurity and propose some ways to improve the existing cybersecurity mechanism or how to enhance it.
Downloads
References
Law of Ukraine On the Fundamental Principles of Cybersecurity of Ukraine. Law of Ukraine dated 05.10.2017 No. 2163-VIII // Database “Legislation of Ukraine” / Verkhovna Rada of Ukraine. Available from: http://zakon3.rada.gov.ua/laws/show/984_001-16/paran2#n2 (accessed: 01/10/2019) [in Ukrainian]
Ordinance of the Cabinet of Ministers of Ukraine On approving the plan of actions for 2018 on implementation of the Cybersecurity Strategy of Ukraine of July 11, 2018 No. 481-p // Database "Legislation of Ukraine" / Verkhovna Rada of Ukraine. Available from: http://zakon3.rada.gov.ua/laws/show/984_001-16/paran2#n2 (accessed: 01/10/2019) [in Ukrainian]
Network and information security: a proposal for a European policy approach: adopted by the European Commission on 6 June 2001 / European Union. Available from: https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=celex%3A52001DC0298 (accessed 01/06/2019)
About ENISA / European Union Agency for Network and Information Security. Available from: https://www.enisa.europa.eu/about-enisa (accessed 01/05/2019)
Cyber Europe / European Union Agency for Network and Information Security. Available from: https://www.enisa.europa.eu/topics/cyber-exercises/cyber-europe-programme (accessed 01/06/2018)
Council Framework Decision 2005/222 / JHA on attacks against information systems: adopted by the Council of the European Union on 24 February 2005 / European Union. Available from: https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=CELEX:32005F0222 (accessed 03/06/2018)
Towards a general policy on combating cybercrime: adopted by the European Commission on 22 May 2007 / European Union. Available from: https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=LEGISSUM%3Al14560 (accessed 02/06/2018)
Communication from the Commission on Critical Information Infrastructure Protection "Protecting Europe from a large scale of cyber-attacks and disruptions: enhancing preparedness, security and resilience": adopted by the European Commission on 30 March 2009 / European Union. Available from: https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=CELEX%3A52009DC0149 (accessed 04/06/2018)
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU: adopted by the European Commission on 13 September 2017 / European Union. Available from: https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=JOIN:2017:0450:FIN (accessed 05/06/2018).
State of the Union 2017 – Cybersecurity: Commission scales up the EU's response to cyberattacks: European Commission – Press release, 19 September 2017 / European Union. Available from: http://europa.eu/rapid/press-release_IP-17-3193_en.htm (accessed 05/06/2018)
Zabara I.M. Formation of modern legal foundations of European Union cyber security in the conditions of diffusion of new innovative technologies. Journal of European and Comparative Law. 2017. Vol. 3. S. 2-13. [in Ukrainian]
Abstract views: 653 PDF Downloads: 446
Copyright (c) 2020 Ihor Proshchyn , Volodymyr Shypovskyi
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).