cybersecurity

Anomalies Detection and Traffic Monitoring System in Computer Networks

The paper addresses the problem of anomaly detection in network traffic and proposes a comprehensive solution to enhance the level of cybersecurity for organizations of various scales. A comparative analysis of existing monitoring and anomaly detection systems has been carried out, including both open-source solutions and commercial products.

Overview of Microservice Architecture and Analysis of Typical Vulnerabilities

The article examines the security of microservice architectures in the context of common vulnerabilities that arise in distributed systems. The authors analyze the essence of the microservice approach, which, despite its advantages in scalability and flexibility, introduces new challenges in the field of cybersecurity. The main focus is on issues of access management, network configuration, and data protection during transmission between services, which can create additional attack vectors.

Research Into the Possibility of Integrating the Compartmentalization Method Into the Protection of Information in Open Sources

The article examines the integration of the compartmentalization method as a fundamental cybersecurity principle in the strategy of protecting information in open sources, in particular to counter OSINT technologies. The authors emphasize that modern cyber threats, enhanced by the massive use of open sources, create risks of leakage of personal data and confidential information, especially through social networks and other platforms where the human factor is a key element of vulnerability.

On Some Approaches to Intelligent Counteracting Cyberattacks Within Microservice Architecture

An approach to counteracting cyberattacks based on state machines within a microservice architecture is suggested. It focuses on intelligent analysis of actual and possible intrusions. The approach is devised for applications with a microservice architecture deployed on the Kubernetes platform. For purposes of the study, a special dataset has been developed. We have reproduced selected common vulnerabilities and exposures reported in 2024 and collected network traffic of intrusion cyberattacks based on them.

Mathematical modeling of the hierarchical ordering of the most significant cybersecurity threats in the public administration system: pairwise and comparative analysis

In this work, an in-depth modeling of cybersecurity threats in state authorities was carried out, which includes the creation of a hierarchical structure, multiple expert evaluation (Delphi method) and the application of the hierarchical analysis method with pairwise comparisons.  Initially, a global goal was defined — to rank threats by their degree of criticality.  For this purpose, a set of criteria was formed, in particular, the scale of damage, the probability of implementation, the impact on critical resources, the complexity of countering attacks and legal conseq

The Problem of Legal Security in the Information Space in the Context of the Expansion of the Use of Artificial Intelligence at the Modern Stage

The article examines the problem of organizing legal security in the information sphere. Based on the provisions of Article 17 of the Constitution of Ukraine and the Information Security Strategy, one of the most important functions of the Ukrainian state at the present stage is to ensure information security. The problem of legal security in Ukraine acquires particular relevance and importance today, during the full-scale invasion of the Russian aggressor, when his insidious aggressive actions are implemented on all fronts, including in the information space.

Information Security in the Context of National Security: Legal Mechanisms for Protecting State Information Resources

Abstract. The purpose of the article is to analyze the mechanisms of ensuring information security in
Ukraine, including legal, technical, organizational, preventive, control, and sanction components. Special
attention is paid to identifying the strengths and weaknesses of these mechanisms in the context of modern
information challenges.
The article identifies the main elements of information security mechanisms, their functions, and
interconnections. The legal mechanism provides a regulatory framework but contains outdated provisions

Electronic Voting іn Ukraine: Legal Aspects іn the Context of Technological Innovations and Prospects

The legal aspects of the organization of electronic voting (e-voting) in Ukraine in the context of technological innovations and prospects for implementation are considered. The essence and forms of e-voting as an innovative tool for the realization of citizens’ electoral rights are investigated. The main technological solutions used in the world practice are considered: Internet voting (i-voting), use of electronic terminals (DRE), biometric identification, smart card technologies and two-factor authorization.

Ensuring Human Rights in the Context of Digital Technologies During an Armed Conflict

In the context of the full-scale armed conflict caused by the russian federation's aggression against Ukraine, digital technologies have become an integral part of both hostilities and the daily lives of the civilian population. This poses unprecedented challenges for ensuring and protecting human rights. The article analyzes the key issues arising at the intersection of digital technologies, human rights, and armed conflict in the Ukrainian context.

Creating secure communication channel with LoRa technology

This article addresses secure information transmission using LoRa technology in peer-to-peer mode, without relying on LoRaWAN. Such communication is vital in areas lacking centralized network infrastructure, such as rural, remote, emergency, or combat situations, where confidential data must be exchanged over several kilometers. The study explores methods for secure data transmission with LoRa devices, focusing on improving efficiency by optimizing encoding for higher data rates within limited byte sizes.