Challenges for Cooperation of the Participating States in the Bucharest Nine Format in the Conditions of the Evolution of Security Threats on NATO's Eastern Borders. (Research Article)

The article reveals the challenges for cooperation of the participating states in the Bucharest Nine initiatives in the conditions of the evolution of security threats on NATO’s eastern borders. The preconditions, purpose and goals of the Bucharest Nine have been highlighted. The group composition of B9 participants on a territorial basis has been considered, namely: the Baltic countries (Estonia, Latvia, and Lithuania), the Visegrad Four countries (Poland, Slovakia, Hungary, and the Czech Republic), and the Black Sea countries (Bulgaria and Romania).

Модель системи протидії вторгненням в інформаційних системах

The article proposes a model of intrusion detection systems (IDS), which reflects the main
processes that take place in the system in order to optimize the processes of anti-intrusion. Such
processes in general can be represented as processes of allocation and use of resources that are
allocated for the protection of information. The use of modeling techniques to ensure the
appropriate level of information security has led to the development of many formal security

Problems combating the threat of bioterrorism in Ukraine

The characteristic spectrum of infectious diseases, which are suitable for use with bioterrorism purpose is given. Possibility of modern microbiological identification methods using for biosafety of the state is grounded. The features of interaction units and the Ministry of Internal Affairs, Security Service, the Ministry of Health to respond effectively to the threat bioterrorism in Ukraine.

Data Protection With Intellectual Support of Organizational and Technical and Operational Management

For the successful use of modern information technologies, it is necessary to effectively manage not only the network, but also information systems security (ISS), the information system on the level of the system must operate autonomously implementing the management structure of information security events, planning the composition of modular ISS and audit.