Recommendations and prospects for introducing the experience of foreign countries into the system of forming the genesis of the development of cyber technologies in the sphere of security and defense of Ukraine
Abstract
Purpose: is to develop recommendations and determine the prospects of introducing the experience of foreign countries into the system of forming the genesis of the development of cyber technologies in the sphere of security and defense of Ukraine.
Method: the main methods of research are methods of analysis and synthesis, methods of military economic theory, methods of evaluation and comparison, induction and deduction, methods of mathematical statistics.
Findings: In the article: the sequence of formation of the genesis of cyber technologies in the sphere of security and defense of Ukraine is defined; a review of the development of cyber technologies in some countries of the world in the field of security and defense was conducted as of the end of 2021 as part of a positive experience for Ukraine; indicators of funding for the development of cyber technologies in the defense sphere and the country as a whole are disclosed, which reveal the attitude of these countries to the priority of the development of cyber technologies and the attitude of the state leadership to this industry; the directions of further research on the topic of the formation of the genesis of the development of cyber technologies in the sphere of defense of Ukraine were formed.
Theoretical implications: the analysis of theoretical and practical aspects of the experience of foreign countries in the system of forming the genesis of the development of cyber technologies in the sphere of security and defense of Ukraine made it possible to formulate general recommendations for the development of cyber technologies in the sphere of security and defense of Ukraine, as well as to determine the ways and terms of their practical implementation.
Paper type: theoretical, descriptive, practical, methodical.
Downloads
References
Russian-Ukrainian war (since 2014). Available from : https://uk.wikipedia.org/wiki.
Russian-Ukrainian war: historical context. Available from : https://uinp.gov.ua/informaciyni-materialy/rosiysko-ukrayinska-viyna-istorychnyy-kontekst.
Cyber digest. Overview of events in the field of cyber security, December 2022. Prepared with the support of the USAID Project "Cyber security of critical infrastructure of Ukraine". National Cyber Security Coordination Center. 2022. P. 44.
Singer, P.W. and Allan Friedman (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. P. 336.
Alexander, Klimburg (2017). The Darkening Web: The War for Cyberspace. Penguin Books. P. 448.
Dergachev, O. (2018). Cyber security: threats and protection. Lviv Polytechnic National University. C. 312.
Tyshchenko, O. (2016). State information security: cyber aspects. National Academy of Public Administration under the President of Ukraine. C. 232. The author considers the role of cyber technologies in ensuring the information security of the state, highlighting the main challenges and ways to overcome them.
David, E. Sanger. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown. P. 384.
Richard, A. Clarke and Robert K. Knake (2010). Cyber War: The Next Threat to National Security and What to Do About It. Ecco. P. 320.
Gil, O. (2019). Cyber security of the state: tools, methods, practice. “In Yure” Publishing House. P. 400.
Bortnik S., Skasnytskyi O. (2016). Cyber security: threats and challenges. National Technical University of Ukraine "Kyiv Polytechnic Institute". P. 268.
Lester Evans. (2020). Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners. Independently published. P. 240.
Singer P.W. and Allan Friedman. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. C. 336.
Gubarev V. (2020). Cyber security and information protection. Lviv Polytechnic National University. C. 272.
Garan O. (2019). Cybersecurity of Ukraine: state, priorities, risks. Institute of World Politics. C. 120.
P.W. Singer and August Cole. (2015). Ghost Fleet: A Novel of the Next World War. Eamon Dolan/Mariner Books. P. 416.
Richard A. Clarke and Robert K. Knake. (2019). The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats. Penguin Press. P. 320.
Mishechkina L. (2020). Cyber security in the national security system of Ukraine. “In Yure” Publishing House. C. 400.
Sokirko, V. (2017). Cyber Security: Issues, Threats and Challenges. Publisher: Center for Educational Literature. C. 336.
Abstract views: 224 PDF Downloads: 90
Copyright (c) 2023 Oleh Semenenko, Serhii Ostrovskyi, Maksym Bondarenko, Yaroslav Vovk, Dmutro Kutsenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).