кібербезпека

Regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU

Today, the internet is a tool used in many activities, especially in the public administration system which increases the amount of time EU states are exposed to cyberspace and its risks.

The article examines the regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU.

The semantic content of the terms “digitalization”, “сyber security” and “eGovernment” was studied.

Ensurance of artificial intelligence systems cyber security: analysis of vulnerabilities, attacks and countermeasures

In recent years, many companies have begun to integrate artificial intelligence systems (AIS) into their infrastructures. AIS is used in sensitive areas of society, such as the judicial system, critical infrastructure, video surveillance, and others. This determines the need for a reliable assessment and guaranteed provision of cyber security of AIS. The study analyzed the state of affairs regarding the cyber security of these systems. Possible types of attacks are classified and the main ones are considered in detail.

About one approach to increasing the security of computer systems against intrusion

The article considers an approach to increasing the security of computer systems from intrusion. The importance of the problem of information security and cybersecurity is substantiated. Strategies of attack and destructive actions used by intruders (hackers) are considered. 16 different attack and intrusion strategies are identified.

Is a Dialogue between Philosophy and the Educational Technologies Possible? (Based on the Results of Webinars by Experts of the “SoftServe” Company, 2022)

      Based on analysis of the Tech Summer for Teachers Bootcamp webinars for the educational community organized by the IT Company SoftServe, attention is focused on their interdisciplinary approach, in particular in the teaching of philosophical disciplines. Special attention was paid to the anthropological component in the field of information technologies, artificial intelligence, cybersecurity and virtual communication.

Principles of Monitoring and Control of the Network of Charging Stations of Electric Vehicles

This paper explores the principles of construction, monitoring, management, and safety organization in the network of charging stations for electric vehicles. The use of elements of modern client-server technologies and elements of cyber-physical systems in such networks is offered. The basic structure of the cyber-physical control system of the charging station network has been developed. Network server and client tools have been researched and developed. Structural and functional server solutions and client parts are submitted.

TREND EXTRAPOLATION METHOD FOR QUALITATIVE PROGNOSIS OF THE GLOBAL CYBERSECURITY INDEX IN UKRAINE

In the paper, the research problem of cybersecurity in Ukraine and constituent elements of the cybersecurity global index were considered. The study object is the methods of predicting the indicator of the cybersecurity global index in Ukraine based on the trend extrapolation methods using one dynamic sequence. The purpose of the work is to apply predicting methods to build a prediction of the global cybersecurity index in Ukraine.

Load-sharing Accounting Between the Renewable Communication Channels of the System of Three Iot-devices Connected by a Triangle

The k-terminal dynamic fault trees for a system of three IoT-devices connected by a triangle are formed. Based on the fault tree a state and transition diagram is generated. This model can take into account adequately) load-sharing effects between renewable communication channels. Availability characteristics and failure causes characteristics are calculated based on Monte-Carlo simulation and comparative analysis for obtained results is done.