безпека

Cyber-Jihad as a Security Threat: Pecularities of Use and Counteraction within the European Union

The authors argue that the impact of globalisation on the transformation of traditional threats to the international community caused the emergence of new asymmetric threats. The newest asymmetric threats come from "weak" states or groups, in various ways, which, without military superiority, can cause significant damage to stronger international actors. The article analyses the main characteristics of asymmetric threats, including their intensity, probability, and timeframe, which allow weaker actors to inflict damage.

The Right to Freedom of Religion: Problems of Implementation During the War in Ukraine

This article analyzes the possibilities for exercising the right to freedom of thought, conscience, and religion in Ukraine during martial law. It emphasizes that although Ukraine is a secular state with constitutionally enshrined separation of church and state, this does not negate its obligations to ensure this right. On the contrary, the secular nature of the state requires a set of legal and organizational measures to guarantee everyone’s right to freedom of belief.

Creating a Safe Educational Environment as a Way to Prevent Bullying in Educational Institutions

The article clarifies that the modern educational environment is one of the main components on which the policy of an educational institution should be based in order to provide the necessary conditions, means, and technologies for teaching students, educators, and parents, both within and outside the educational institution.

Enhancing host intrusion detection systems for Linux based network operating systems

This paper proposes an enhanced model of Host Intrusion Detection Systems (HIDS) adapted for Linux- based Network Operating Systems (NOS), specifically SONiC. The SONiC architecture has been analyzed to identify intrusion-sensitive components, including telemetry data, container logs, and inter-container communications. A machine learning-based HIDS profile has been introduced to detect anomalies within containerized services and network modules. Signature-based, anomaly-based, and hybrid-based detection approaches have been classified with consideration of NOS-specific traits.

DEFINING THE SAFETY INDICATORS OF A UNRECOVERY FAULT-TOLERANT SAFETY CRITICAL SYSTEM BY THE STATE SPACE METHOD

Safety Critical Systems (SCS) play a key role in critical areas of activity where high safety, reliability and continuity of operations are required. Such systems include military, space, energy, aviation, medical and transportation complexes that operate in extreme conditions and must perform their functions regardless of external and internal influences.

PRINCIPLES OF FUNCTIONAL ORGANIZATION AND DESIGN OF CHILDREN'S AMUSEMENT PARKS: THE CASE OF THE "URURU" CHILDREN'S PARK IN STARÉ SELO, LVIV REGION

The modern development of urban environments requires the creation of comfortable, safe, and architecturally thoughtful spaces for children. Children's amusement parks play a crucial role in urban settings, as they combine functionality, aesthetics, and integration with the natural landscape.

DEVELOPMENT OF A PROGRAM FOR MODELING AND SIMULATING A COLLABORATIVE ROBOT WORKSPACE

The article presents the software development for modeling and simulating the workspace of a collaborative robot taking into account the presence of people. This is an important step in creating safe and efficient robotic systems within Industry 5.0 concept. The problem is posed by the need to ensure safety during the interaction of the robot with the operator, which is relevant for modern production processes with high human participation.

Methods and Means of Analyzing Application Security via Distributed Tracing

The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents.

Study of the grain market of Ukraine in the conditions of war

The purpose of the study is to investigate the state and tender development of the Ukrainian grain market in terms of unlocking the export potential of the Ukrainian grain industry, given the need to restore logistics supply chains for export-oriented grain flows in the face of blocked land and water transport corridors. The objectives of the study were:

Problems of the human factor in transport systems

Transport accident statistics and practical safety results indicate that technological solutions cannot ensure the viability (safety, sustainability, reliability and efficiency) of complex systems and structures without addressing human factors. This problem is especially acute for transport systems as highly complex technological and social structures aimed at ensuring the efficiency and safety of an entire sphere of human life. In transportation systems and technologies, the human factor plays a critical role.