cybersecurity

Encrypting the File System on a Single-Board Computers Platform and Using Linux Unified Key Setup With Physical Access Keys

The object of the research is the security of the file system of a single-board platform. As part of the research reported in this paper, a method has been proposed to protect the file system using encryption. Implementing a Linux Unified Key Setup paired with a password or Universal Serial Bus key has been demonstrated. The advantages of Linux Unified Key Setup for this task and the possibilities for system configuration and encryption method depending on the use case and hardware configuration has been outlined.

Overview of the Cis Benchmarks Usage for Fulfilling the Requirements From International Standard ISO/IEC 27001:2022

nding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out.

Legal aspects of cybersecurity in Ukraine: current challenges and the role of national legislation

Summary. The article identifies the peculiarities of the current state of cybersecurity in Ukraine and emphasizes the importance of applying effective legislation aimed at protecting the cyber structure, as well as choosing the best tools and mechanisms to combat cyber threats.

Regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU

Today, the internet is a tool used in many activities, especially in the public administration system which increases the amount of time EU states are exposed to cyberspace and its risks.

The article examines the regulatory and institutional support of digitalization and cybersecurity of the public administration system in the EU.

The semantic content of the terms “digitalization”, “сyber security” and “eGovernment” was studied.

About one approach to increasing the security of computer systems against intrusion

The article considers an approach to increasing the security of computer systems from intrusion. The importance of the problem of information security and cybersecurity is substantiated. Strategies of attack and destructive actions used by intruders (hackers) are considered. 16 different attack and intrusion strategies are identified.

Principles of Monitoring and Control of the Network of Charging Stations of Electric Vehicles

This paper explores the principles of construction, monitoring, management, and safety organization in the network of charging stations for electric vehicles. The use of elements of modern client-server technologies and elements of cyber-physical systems in such networks is offered. The basic structure of the cyber-physical control system of the charging station network has been developed. Network server and client tools have been researched and developed. Structural and functional server solutions and client parts are submitted.

TREND EXTRAPOLATION METHOD FOR QUALITATIVE PROGNOSIS OF THE GLOBAL CYBERSECURITY INDEX IN UKRAINE

In the paper, the research problem of cybersecurity in Ukraine and constituent elements of the cybersecurity global index were considered. The study object is the methods of predicting the indicator of the cybersecurity global index in Ukraine based on the trend extrapolation methods using one dynamic sequence. The purpose of the work is to apply predicting methods to build a prediction of the global cybersecurity index in Ukraine.

Load-sharing Accounting Between the Renewable Communication Channels of the System of Three Iot-devices Connected by a Triangle

The k-terminal dynamic fault trees for a system of three IoT-devices connected by a triangle are formed. Based on the fault tree a state and transition diagram is generated. This model can take into account adequately) load-sharing effects between renewable communication channels. Availability characteristics and failure causes characteristics are calculated based on Monte-Carlo simulation and comparative analysis for obtained results is done.