A paper deals with possibilities and opportunities for cooperation in Central and Eastern European region in the field of information security with particular emphasis on media influenced by Russia. My point of departure is that the information threats to societal security is external and they have relevant impact on the sustainability, conditions for evolution, of traditional patterns of language, culture and religious and ethnic identity, custom and values.
The institutional aspect of the information protection policy of Ukrainian national state
formations of the revolutionary wave of 1917–1921 is researched. The opinion on the general insufficient
attention of national Ukrainian state formations regarding the development of institutions aimed at
ensuring their information security is expressed. It is emphasized that the underestimation of the factor
of information security not only negatively affected the process of state building, but also to some extent
Models of information security (IS) management of cyber-physical systems (CPS) were analyzed according to ISO/IEC TR 13335 and ISO/IEC 27001, which are the basis for developing a management methodology of a complex security system (CSS) within the management model “plan – do – check – act”. The CSS management structure of CPS was proposed at the level of an information life cycle and the multilevel model “cyberspace – communication environment – physical space” based on the conception “object – threat – protection”, which extends an application of the IS management system.
The quintessence of an information security (IS) of cyber-physical systems (CPS) was presented, which is deployed on the level of complex security system (CSS) creation paradigm and conception as well as the CSS universal platform in the field “threats – profiles – tools”; it is also implemented in the part of CSS integral model of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” and cryptographic protection of CPS wireless communication environment based on block data encryption of algorithm “Kalyna”.
The article deals with the problem of Russian information war against Ukraine. The authors explain the primary sense of the information war, its interpretation in the framework of wide and narrow approaches. Basing on the use of historic, systemic and structural-functional methods, the main disadvantages of the information sphere of Ukraine and the central mechanisms of its protection are identified. The tools of counteraction to the Russian information war against Ukraine are divided into two groups: legislative and institutional.
In the scientific article the prerequisites for development of information society in Ukraine and revealed its importance for development. Analyzed the concept of “information society” concept disclosed its application. The level of development of information society in Ukraine, disadvantages and problems on overcoming them according to the Strategy of information society development in Ukraine. Analyzed international rating indicators of information society development in Ukraine.
The article discusses the issue of legal relations in the sphere of information security in Ukraine. The subjects and objects of legal relations in the sphere of information security have been considered. It has been proved that the main aim of information security is to unsure the balance of the interests of the individual, of society and of the State and their effective cooperation within the sphere of global information. It should be coordinated with the state policy in the sphere of security in general.
The article analyzes the scientific works of modern Russian and foreign scientists in the context of studies of various aspects of information security. After the collapse of the USSR information security of the state, society and the individual became the subject of scientific research of political scientists, sociologists, jurists, philosophers, and experts in the information technology. But in historical perspective defined perspective is seen for the first time.
The classification of network information resource semantic threats associated with resource’s information manipulation is proposed. Some attacks that realize semantic threats are described. For the semantic threats protection proposes the directions of complex network security system modification are shown.
The paper considers specifics of information resources protection in corporate networks and systems. An approach to assessing protection means is described which allows to reduce their deployment cost and adapts easily to specific needs of any organization with an allowance for specifics of its activities and business. Such an approach makes it possible to describe information resources more precisely through their characteristic vulnerabilities and resources cost. It also helps to rank the risks and information resources according to their criticality for organization activities.