hacker attacks

Methods and techniques for the information and analytical systems of data protection and conversion assessment

The goal of the research is to create an algorithm for analyzing vulnerabilities discovered and to enhance the data protection technique based on system penetration testing as a means of evaluating data security. The primary responsibility is to modify established security assessment techniques to fit the evolving technical landscape, namely cloud technologies and security system requirements. The issue of data protection evaluation of electronic documents is discussed in the article, and specifically, an A/B test was conducted.

Dynamics of the world government reaction to cyber threats: lessons for Ukraine

The article analyzes the dynamics of the world government reaction to cyber threats and the ways the public administration provides information security of Ukraine under systematic cyber threats. Taking into account the experience of the world’s leading countries in managing counteraction to cyber threats, and, from the point of view of systems analysis, the ways to improve information security of Ukraine are outlined.