The mechanism for ensuring cyber security of the law enforcement system
Abstract
Purpose: is analysis of the state of cybercrime and hacker attacks in Ukraine and the world as a whole; study of state policy mechanisms for ensuring cyber security of the law enforcement system in Ukraine and European countries on the basis of legal documents for the development and improvement of a comprehensive mechanism for ensuring cyber security of the law enforcement system of Ukraine.
Method: analysis method and synthesis, method of comparison.
Findings: a comprehensive mechanism for ensuring the cyber security of the law enforcement system was developed.
Theoretical implications: identification of the main active mechanisms of state policy to ensure cyber security in Ukraine and European countries, a selection of statistical data on the state of cybercrimes in Ukraine and hacker attacks in the world in recent years for comparison and assessment of their state.
Paper type: analytical, theoretical-methodical, descriptive.
Downloads
References
Slipchenko, T. (2020). Kiberbezpeka yak skladova systemy zakhystu natsionalnoi bezpeky: yevropeiskyi dosvid. Aktualni problemy pravoznavstva [Cyber security as a component of the national security protection system: European experience. Actual problems of jurisprudence], (Vyp. 1 (21)), 128–133. Available from : http://dspace.wunu.edu.ua/bitstream/316497/38497/1/%D0%A1%D0%BB%D1%96%D0%BF%D1%87%D0%B5%D0%BD%D0%BA%D0%BE.pdf
Husieva, V. O. Teoretychni osnovy metodyky rozsliduvannia zlochyniv proty avtorytetu orhaniv derzhavnoi vlady u sferi pravookhoronnoi diialnosti [Theoretical foundations of the methodology of investigating crimes against the authority of state authorities in the field of law enforcement]: dys.… d-ra yuryd. nauk: 12.00. 09. MVS Ukrainy, Khark. nats. un-t vnutr. sprav. Kharkiv (2021).
Bilas A. I (2016). Pravookhoronna diialnist krain YeS: porivnialno-pravove doslidzhennia [Law enforcement activities of the EU countries: a comparative legal study]: avtoref. dys.…kand. yuryd. nauk: 12.00.01. Lviv, 2016. 24 s.
Kuchuk A. M. (2007). Teoretyko-pravovi zasady pravookhoronnoi diialnosti v Ukraini [Theoretical and legal foundations of law enforcement activities in Ukraine]: avtoref. dys. ... kand. yuryd. nauk (12.00.01). Kyiv, 22 s.
Lisovska Yu. P. Cyber security: risks and measures: training. manual. Kyiv: Kondor Publishing House, 2019. 272 p.
Pro Stratehiiu kiberbezpeky Ukrainy, Rishennia Rady natsionalnoi bezpeky i oborony Ukrainy (2021) (Ukraina). Available from : https://www.rnbo.gov.ua/files/2021/STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_kyberbezpeki_Ukr.pdf
Kaplia, A. V. (2021, 29 sichnia). Kiberbezpeka yak vazhlyvyi aspekt sohodennia. Konferentsii Derzhavnoho universytetu «Zhytomyrska politekhnika». Available from : https://conf.ztu.edu.ua/wp-content/uploads/2021/01/29-2.pdf
Cydorzhevs'kyj M. (2020). Kiberzlochyny u 2020 rotsi zavdaly zbytkiv na tryl'jon dolariv. Media company DW. Available from : https://www.dw.com/uk/kiberzlochyny-u-2020-rotsi-zavdaly-svitu-zbytkiv-na-trylion-dolariv-doslidzhennia/a-55857766 [in Ukrainian].
Vadovs'kyj V. (2021). Kiberzlochynnist' v Ukraini: najposhyrenishi zlochyny ta iak hromadianam podbaty pro vlasnu informatsijnu bezpeku. Equity. Available from : https://equity.law/press-center/publications/1169.html
Zvit Holovy Natsional'noi politsii Ukrainy pro rezul'taty roboty vidomstva u 2019 rotsi. Natsional'na politsiia Ukrainy. Available from :https://www.kmu.gov.ua/storage/app/sites/1/17-civik-2018/zvit_2019/zvit-npu-2019.pdf
Krutov M.(2022). Pustoschi chy preliudiia do vijny? Khakers'ki ataky na Ukrainu Radio Svoboda. Available from : https://www.radiosvoboda.org/a/khakerski-ataky-na-ukrayinu/31709601.html
Duma V., Tsymbaliuk V.(2006). Pravozastosuvannia ta formy joho zdijsnennia Pravova informatyka. 3(11),61-64.
Kil'kist' khakers'kykh atak za misiats' vijny zrosla utrychi, ale bil'shist' z nykh neuspishni, – Derzhspetszv'iazku. Espreso. Available from : https://espreso.tv/kilkist-khakerskikh-atak-za-misyats-viyni-zrosla-utrichi-ale-bilshist-z-nikh-neuspishni-derzhspetszvyazku
Krainy-zhertvy ta krainy-ahresory u khakerskykh viinakh. (b. d.). Slovo i Dilo. Available from : https://www.slovoidilo.ua/2021/10/22/infografika/svit/krayiny-zhertvy-ta-krayiny-ahresory-xakerskyx-vijnax
Konventsiia pro kiberzlochynnist. (b. d.). Ofitsiinyi vebportal parlamentu Ukrainy. Available from : https://zakon.rada.gov.ua/laws/show/994_575/conv#o39
Bukhariev, V. V. (2018). Administratyvno-pravovi zasady zabezpechennia kiberbezpeky Ukrainy [Master's thesis, Sumskyi derzhavnyi universytet]. eSSUIR – Electronic Sumy State University Institutional Repository. Available from : http://essuir.sumdu.edu.ua/handle/123456789/69047
Shakhoval, O. A., Lozova, I. L., & Hnatiuk, S. O. (2016). Recommendations for cybersecurity strategy of Ukraine development. Ukrainian Information Security Research Journal, 18(1). https://doi.org/10.18372/2410-7840.18.10113
Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy, Zakon Ukrainy № 2163-VIII (2022) (Ukraina). Available from : https://zakon.rada.gov.ua/laws/show/2163-19#Text
Kryminalnyi kodeks Ukrainy, Kodeks Ukrainy № 2341-III (2023) (Ukraina). Available from : https://zakon.rada.gov.ua/laws/show/2341-14#Text
Cyber Security Strategy for Germany. Federal Ministry of the Interior. (2011), Berlin. Available from : https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/CyberSecurity/Cyber_Security_Strategy_for_Germany.pdf?__blob=publicationFile
Cyber Security Strategy of Estonia. Ministry of Economic Affairs and Communication.(2014). Available from : https://www.mkm.ee/sites/default/files/cyber_security_strategy_2014-2017_public_version.pdf
Cyberspace Protection Policy of the Republic of Poland. (2013). Ministry of Administration and Digitisation, Internal Security Agency. Warsaw. Available from : https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-securitystrategies-ncsss/copy_of_PO_NCSS.pdf
Strategy on Cyber Security of Montenegro to 2017. (2013) Podgorica. Available from : https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-securitystrategies-ncsss/CyberSecurityStrategyforMontenegro.pdf
Austrian Cyber Security Strategy. (2013). Vienna Available from : https://www.bka.gv.at/DocView.axd?CobId=50999
National Cyber Security Strategy of Hungary.(2013) Prime Minister’s Office. Budapest. Available from : https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-securitystrategies-ncsss/HU_NCSS.pdf
Abstract views: 129 PDF Downloads: 128
Copyright (c) 2023 Dimitriy Grycyshen, Kostyantyn Malyshev, Valery Nonik, Valery Molotai
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).