інформаційна безпека

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

Legal Mechanisms for Ensuring Information Security in Ukraine

The article considers the legal mechanisms for ensuring information security. It has been proven that today, more than ever, when there is a war in Ukraine, the issue of ensuring information security becomes especially relevant and significant, as the information space becomes a «battlefield» on a par with the war front. Enemy forces actively use informational and psychological operations to destabilize the situation inside our country, create panic, spread fakes and undermine trust in state institutions.

Overview of the Cis Benchmarks Usage for Fulfilling the Requirements From International Standard ISO/IEC 27001:2022

nding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out.

Security Methodology of Cyber-Physical Systems and the Internet of Things in Intellectualization of Infrastructure Objects

A multi-level structure of safe intellectualization of society’s infrastructure “objects – cyber-physical systems” in the functional space “selection – exchange of information – processing – management” is proposed according to the profiles – confidentiality, integrity, availability for “smart environmental monitoring”, “smart education”, “smart energy”, “intelligent transport system” and other subject areas.

Features of organizational and legal provision of information security in the conditions of war with russia

Abstract. The article, based on a theoretical and practical study of the essence and features of the regulation of information and legal relations in the conditions of russian aggression, focuses on the problematic issues of organizational and legal provision of information security as an activity aimed at the prevention, timely detection and termination of threats that destructively affect vital interests of the individual, society and the state in the information sphere.

Метод шифрування інформації на основі Ateb-функцій

Розроблено алгоритми та програмне забезпечення для шифрування інформації на основі теорії Ateb-функцій, що пропонується застосувати для захисту інформації. Шифрування здійснюється за допомогою числових значень Ateb-функцій на певному діапазоні. Для того, щоб збільшити надійність шифрування, розроблено алгоритм приховання ключа у файлі.

Information threats on the internet in the conditions of war in Ukraine: problematic issues of legal regulation

The article examines the issue of information security as a state of protection of the vital interests of a person, society and the state, in which damage should be prevented due to: incompleteness, untimeliness and implausibility of the information used.

Analysis of the security of on-board information systems in vehicles

The features of the functioning of the on-board information systems of a car are considered. Threats to their security are analyzed, and methods for ensuring information security and functional security of on-board information systems are proposed. The design of road networks in the organization of road traffic is one of the factors in ensuring the functional security of modern intelligent transport systems, that is, compliance with such information security attributes as data confidentiality, integrity, availability, authenticity and novelty of data.

About one approach to increasing the security of computer systems against intrusion

The article considers an approach to increasing the security of computer systems from intrusion. The importance of the problem of information security and cybersecurity is substantiated. Strategies of attack and destructive actions used by intruders (hackers) are considered. 16 different attack and intrusion strategies are identified.

Legal principles of electronic commerce in social networks

The article examines the theoretical aspects of the concept of "e-commerce". It is noted that the regulatory framework of Ukraine in the field of e-commerce is in a state of rapid development. By signing the Association Agreement, Ukraine has undertaken considerable commitments, including ensuring the gradual adaptation of Ukrainian legislation to that of the European Union, in accordance with the areas set out in the Agreement, thus one of which is e-commerce.