information security

Freedom of Information and State Security: Features of Legal Regulation under Martial Law Conditions

Freedom of information is a fundamental right that ensures transparency and accountability in a democratic society. However, in times of war, governments often impose legal restrictions on access to public information to protect national security and maintain public order. This article examines the balance between freedom of information and state security in Ukraine under martial law. It analyzes the legal framework governing access to public information and the limitations introduced during wartime.

The Problem of Legal Security in the Information Space in the Context of the Expansion of the Use of Artificial Intelligence at the Modern Stage

The article examines the problem of organizing legal security in the information sphere. Based on the provisions of Article 17 of the Constitution of Ukraine and the Information Security Strategy, one of the most important functions of the Ukrainian state at the present stage is to ensure information security. The problem of legal security in Ukraine acquires particular relevance and importance today, during the full-scale invasion of the Russian aggressor, when his insidious aggressive actions are implemented on all fronts, including in the information space.

Adaptation of Information Security in the Agile World

The article investigates the integration of information security into Agile software development processes, focusing on the adaptation of DevSecOps methods. The goal was to enhance the implementation of security practices by reducing vulnerability detection time, simplifying the integration of security into the development cycle, and improving team collaboration. The analysis revealed that automation of security testing reduces vulnerability detection time by 40%, while cross-functional teams improve collaboration by 30%.

Research of Existing Osint Tools and Approaches in the Context of Personal and State Information Security

The article examines modern tools and approaches to conducting OSINT — the analysis of open sources of information. The key role of OSINT, along with other intelligence methods such as HUMINT, IMINT, SIGINT, MASINT and GEOINT, lies in creating a holistic information field that combines open, technical, human and geospatial sources. The constant development of methodologies and improvement of automation tools allows to increase the efficiency and accuracy of the analysis of the received information, which makes OSINT one of the most important elements of modern intelligence.

Development of a Method for Ensuring the Reliability and Security of Personal Data in Blockchain Systems of State Registers

The article considers the problem of ensuring the reliability and security of personal data processed in state registers by using blockchain technologies. The growing requirements for transparency and stability of state data management systems pose new challenges to protecting information from unauthorized changes, interference, and forgery. A method based on implementing a decentralized blockchain architecture is proposed to ensure data integrity, traceability, and transparency during processing and storage.

HYBRID MODEL OF NETWORK ANOMALIES DETECTION USING MACHINE LEARNING

The increasing complexity of cyber threats requires the development of effective methods for detecting and classifying attacks in network traffic. This study analyzes the effectiveness of three popular machine learning algorithms: Random Forest, which is used for anomaly detection, Support Vector Machines (SVM), which performs cyber threat classification, and autoencoders, which are used for data preprocessing and deep traffic analysis.

Criminal Liability for Offenses Against National Security: Domestic and Foreign Perspectives

The article deals with the issue of criminal liability for crimes against the foundations of national security on the example of domestic and foreign experience of certain countries.

The author specifically analyzes the legislative regulation of criminal liability for crimes against national security in the Republic of Lithuania, the Republic of Latvia, the Republic of Estonia, Georgia, the Republic of Armenia, the Republic of Poland, Switzerland, the Federal Republic of Germany, and the French Republic.

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

Legal Mechanisms for Ensuring Information Security in Ukraine

The article considers the legal mechanisms for ensuring information security. It has been proven that today, more than ever, when there is a war in Ukraine, the issue of ensuring information security becomes especially relevant and significant, as the information space becomes a “battlefield” on a par with the war front. Enemy forces actively use informational and psychological operations to destabilize the situation inside our country, create panic, spread fakes and undermine trust in state institutions.

Overview of the Cis Benchmarks Usage for Fulfilling the Requirements From International Standard ISO/IEC 27001:2022

nding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out.