cybersecurity

Role, Problems, and Methods of Software Security Testing Automation

In the modern world, where information security becomes a key element of any organization's operations, software security testing automation is more important than ever. The success of an application directly depends on its stability, reliability, and security, which makes the proper implementation of control mechanisms critical. The increase in cyber threats and the growing complexity of software systems make this topic even more relevant.

Docker Container Image Scanning Methods

With the development of containerized environments, the issue of security is becoming critical for application deployments. This article provides a comparative analysis of static and dynamic methods for scanning Docker container images. Static analysis is used to identify potential vulnerabilities before container deployment, while dynamic analysis is performed in an isolated environment at runtime, ensuring product reliability.

Neuro-symbolic models for ensuring cybersecurity in critical cyber-physical systems

This paper presents the results of a comprehensive study on the application of the neuro-symbolic approach for detecting and preventing cyber threats in railway systems, a critical component of cyber-physical infrastructures. The increasing complexity and integration of physical systems with digital technologies have made such infrastructures vulnerable to cyberattacks, where breaches can result in severe consequences, including system failures, financial losses, and threats to public safety and the environment.

Encrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup With Physical Access Keys

The object of the research is the security of the file system of a single-board platform. As part of the research reported in this paper, a method has been proposed to protect the file system using encryption. Implementing a Linux Unified Key Setup paired with a password or Universal Serial Bus key has been demonstrated. The advantages of Linux Unified Key Setup for this task and the possibilities for system configuration and encryption method depending on the use case and hardware configuration has been outlined.

Overview of the Cis Benchmarks Usage for Fulfilling the Requirements From International Standard ISO/IEC 27001:2022

nding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out.

Legal aspects of cybersecurity in Ukraine: current challenges and the role of national legislation

Summary. The article identifies the peculiarities of the current state of cybersecurity in Ukraine and emphasizes the importance of applying effective legislation aimed at protecting the cyber structure, as well as choosing the best tools and mechanisms to combat cyber threats.

Regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU

Today, the internet is a tool used in many activities, especially in the public administration system which increases the amount of time EU states are exposed to cyberspace and its risks.

The article examines the regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU.

The semantic content of the terms “digitalization”, “сyber security” and “eGovernment” was studied.

About one approach to increasing the security of computer systems against intrusion

The article considers an approach to increasing the security of computer systems from intrusion. The importance of the problem of information security and cybersecurity is substantiated. Strategies of attack and destructive actions used by intruders (hackers) are considered. 16 different attack and intrusion strategies are identified.

Principles of Monitoring and Control of the Network of Charging Stations of Electric Vehicles

This paper explores the principles of construction, monitoring, management, and safety organization in the network of charging stations for electric vehicles. The use of elements of modern client-server technologies and elements of cyber-physical systems in such networks is offered. The basic structure of the cyber-physical control system of the charging station network has been developed. Network server and client tools have been researched and developed. Structural and functional server solutions and client parts are submitted.

TREND EXTRAPOLATION METHOD FOR QUALITATIVE PROGNOSIS OF THE GLOBAL CYBERSECURITY INDEX IN UKRAINE

In the paper, the research problem of cybersecurity in Ukraine and constituent elements of the cybersecurity global index were considered. The study object is the methods of predicting the indicator of the cybersecurity global index in Ukraine based on the trend extrapolation methods using one dynamic sequence. The purpose of the work is to apply predicting methods to build a prediction of the global cybersecurity index in Ukraine.