інформаційна безпека

Information and psychological war of Russia against Ukraine: how to counteract it

The question of using by the Russian Federation means and methods of information and psychological influence against Ukraine are considered, the reasons for lack of resistance to these actions are studied, specific approaches to protecting the national information field are suggested.

Administrative and legal nature of information security

The article considers issues related to the administrative and legal nature of information security of the population of Ukraine and its provision in the economic crisis, reducing social protection, increasing external threats from other countries and waging an information war against Ukraine by individual countries. It should be noted that the measures taken by the Ukrainian authorities to protect the state, its territorial integrity and the security of the country's population are timely.

State Center of the Ukrainian National Republic and Patriarch Joseph Slipiy: restoration of independence in the spiritual dimension

The article highlights that the research topic is relevant in the context of preparations for the 30th anniversary of Ukraine’s independence. An in-depth comparative analysis of the political activity of the State Center of the Ukrainian National Republic in exile and the religious activity of Patriarch J. Slipy was carried out.

National and information security (current update)

The focus is on information security issues. There are always cyber threats in a globalized society, but in times of certain world or state problems and difficulties, their impact is particularly acute. It is stated that the world now is facing a new problem - a new disease whose treatment does not have treatment and prevention in the form of vaccination. The set of measures taken at the state level causes the weakening of the state and non-state sectors of the economy and applies to all spheres of life of both individuals and the state and international institutions.

Parallel Combining Different Approaches to Multi-pattern Matching for Fpga-based Security Systems

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching.

Establishment of the ukrainian national instituteof information security:institutional aspect of information security policy of national state formations of 1917–1921

The institutional aspect of the information protection policy of Ukrainian national state
formations of the revolutionary wave of 1917–1921 is researched. The opinion on the general insufficient
attention of national Ukrainian state formations regarding the development of institutions aimed at
ensuring their information security is expressed. It is emphasized that the underestimation of the factor
of information security not only negatively affected the process of state building, but also to some extent

On the Problem of Complex Security System Management of Cyber-physical Systems

Models of information security (IS) management of cyber-physical systems (CPS) were analyzed according to ISO/IEC TR 13335 and ISO/IEC 27001, which are the basis for developing a management methodology of a complex security system (CSS) within the management model “plan – do – check – act”. The CSS management structure of CPS was proposed at the level of an information life cycle and the multilevel model “cyberspace – communication environment – physical space” based on the conception “object – threat – protection”, which extends an application of the IS management system.

The Quintessence of Information Security of a Cyber-physical System

The quintessence of an information security (IS) of cyber-physical systems (CPS) was presented, which is deployed on the level of complex security system (CSS) creation paradigm and conception as well as the CSS universal platform in the field “threats – profiles – tools”; it is also implemented in the part of CSS integral model of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” and cryptographic protection of CPS wireless communication environment based on block data encryption of algorithm “Kalyna”.

Russian information war against Ukraine: peculiarities and mechanisms of countering (Review Article)

The article deals with the problem of Russian information war against Ukraine. The authors explain the primary sense of the information war, its interpretation in the framework of wide and narrow approaches. Basing on the use of historic, systemic and structural-functional methods, the main disadvantages of the information sphere of Ukraine and the central mechanisms of its protection are identified. The tools of counteraction to the Russian information war against Ukraine are divided into two groups: legislative and institutional.