information security

Legal Status of Specialized Bodies of the European Union in the Field of Cybersecurity

The article is devoted to the study of the legal status of specialized bodies of the European Union in the field of cybersecurity. The relevance of the study is due to the policy of European integration defined by the Constitution of Ukraine. The object of the study is the social relations that take place when ensuring cybersecurity in the member states of the European Union.

Legal Support of Information Security in the Field of Personal Data Protection

The article examines current issues related to the legal aspects of personal data protection in the context of ensuring information security amid the digitalization of society. It argues that personal data are among the most vulnerable assets in today’s information environment, and that improper processing or leaks can lead to significant violations of human rights and freedoms, undermine trust in state institutions, and create threats to national security.

Problems of Legal Regulation of the Information Sphere in the Conditions of Global Digitalization: Theoretical, Legal and Industry-related Aspects of the Application of Information Technologies and Artificial Intelligence Technologies

The article systematically examines some problematic issues of legal regulation of public relations in the global information space, in particular, concerning the provision of information security and cybersecurity in the information sphere in the conditions of global digitalization of society, especially concerning the use of information technologies and artificial intelligence technologies.

Features of Teaching Information Disciplines: Integration of Knowledge About the Security of Information Systems and Complexes

The article discusses current challenges and conceptual approaches to teaching information disciplines with the integration of knowledge about the security of information systems and complexes in higher education. Given the rapid development of digital technologies, cloud services, automated control systems, and the growth of cyber threats, in particular hybrid influence, the problem of forming a holistic vision among students of both the principles of building information systems and their effective protection is becoming particularly important.

Cloud Computing Technology: Architecture, Models and Information Security Aspects

Due to the need to store large amounts of data, automate processes, support business continuity, and organize remote work, there is a need for a deep understanding of the concepts and capabilities of cloud computing. The use of this technology is becoming a key factor in the competitiveness of enterprises in the digital age.

Freedom of Information and State Security: Features of Legal Regulation under Martial Law Conditions

Freedom of information is a fundamental right that ensures transparency and accountability in a democratic society. However, in times of war, governments often impose legal restrictions on access to public information to protect national security and maintain public order. This article examines the balance between freedom of information and state security in Ukraine under martial law. It analyzes the legal framework governing access to public information and the limitations introduced during wartime.

The Problem of Legal Security in the Information Space in the Context of the Expansion of the Use of Artificial Intelligence at the Modern Stage

The article examines the problem of organizing legal security in the information sphere. Based on the provisions of Article 17 of the Constitution of Ukraine and the Information Security Strategy, one of the most important functions of the Ukrainian state at the present stage is to ensure information security. The problem of legal security in Ukraine acquires particular relevance and importance today, during the full-scale invasion of the Russian aggressor, when his insidious aggressive actions are implemented on all fronts, including in the information space.

Adaptation of Information Security in the Agile World

The article investigates the integration of information security into Agile software development processes, focusing on the adaptation of DevSecOps methods. The goal was to enhance the implementation of security practices by reducing vulnerability detection time, simplifying the integration of security into the development cycle, and improving team collaboration. The analysis revealed that automation of security testing reduces vulnerability detection time by 40%, while cross-functional teams improve collaboration by 30%.

Research of Existing Osint Tools and Approaches in the Context of Personal and State Information Security

The article examines modern tools and approaches to conducting OSINT — the analysis of open sources of information. The key role of OSINT, along with other intelligence methods such as HUMINT, IMINT, SIGINT, MASINT and GEOINT, lies in creating a holistic information field that combines open, technical, human and geospatial sources. The constant development of methodologies and improvement of automation tools allows to increase the efficiency and accuracy of the analysis of the received information, which makes OSINT one of the most important elements of modern intelligence.

Development of a Method for Ensuring the Reliability and Security of Personal Data in Blockchain Systems of State Registers

The article considers the problem of ensuring the reliability and security of personal data processed in state registers by using blockchain technologies. The growing requirements for transparency and stability of state data management systems pose new challenges to protecting information from unauthorized changes, interference, and forgery. A method based on implementing a decentralized blockchain architecture is proposed to ensure data integrity, traceability, and transparency during processing and storage.